Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe
Resource
win10v2004-20240412-en
General
-
Target
16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe
-
Size
162KB
-
MD5
5b27e0ef1bb13c090df14c54d6c9c197
-
SHA1
494cad13241405ecf50dd461c6d39135a035100e
-
SHA256
16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20
-
SHA512
bb1f1deedbdf5be6db8b888002845aa2e18ffdfc9b7edef185c20f8ea7eb8e98a96f1a2406e51c2d6ce2099394dcc4a3640b967f0f6822e989dba128f0073b64
-
SSDEEP
3072:0ftffjmNoxw1MbQ3whUqS2w/3zJFCj+YC7BIKL7fR0ShMZq92sss9Z1w5pGj:MVfjmNB1Mlh4/3zJIq/N3XJhKsp9Z7j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2948 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1956 Logo1_.exe 2696 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe -
Loads dropped DLL 1 IoCs
pid Process 2948 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{1FD4E3A4-6FE0-492C-90E9-7EE360CDB9FF}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe File created C:\Windows\Logo1_.exe 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe 1956 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2948 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 28 PID 2296 wrote to memory of 2948 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 28 PID 2296 wrote to memory of 2948 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 28 PID 2296 wrote to memory of 2948 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 28 PID 2296 wrote to memory of 1956 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 29 PID 2296 wrote to memory of 1956 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 29 PID 2296 wrote to memory of 1956 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 29 PID 2296 wrote to memory of 1956 2296 16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe 29 PID 1956 wrote to memory of 2580 1956 Logo1_.exe 30 PID 1956 wrote to memory of 2580 1956 Logo1_.exe 30 PID 1956 wrote to memory of 2580 1956 Logo1_.exe 30 PID 1956 wrote to memory of 2580 1956 Logo1_.exe 30 PID 2580 wrote to memory of 2600 2580 net.exe 33 PID 2580 wrote to memory of 2600 2580 net.exe 33 PID 2580 wrote to memory of 2600 2580 net.exe 33 PID 2580 wrote to memory of 2600 2580 net.exe 33 PID 2948 wrote to memory of 2696 2948 cmd.exe 34 PID 2948 wrote to memory of 2696 2948 cmd.exe 34 PID 2948 wrote to memory of 2696 2948 cmd.exe 34 PID 2948 wrote to memory of 2696 2948 cmd.exe 34 PID 1956 wrote to memory of 1256 1956 Logo1_.exe 21 PID 1956 wrote to memory of 1256 1956 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe"C:\Users\Admin\AppData\Local\Temp\16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2156.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe"C:\Users\Admin\AppData\Local\Temp\16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe"4⤵
- Executes dropped EXE
PID:2696
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2600
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD593c7884ef62a600743bf637cc4fcf09e
SHA175553d123ec77fa7d3f91d7d1ac24473f2b50193
SHA256e8b63fe2640fee8691ea34607cf46d6a2b0f6331efa9d7b946b932349350df73
SHA5125abf22a06e7263264272746ec917745acdb06424945b89ec560491cc00d3dbedc23f7416441558f84f269c7340ef46b132ccfbf88d1ca85aa4b2e7ff92cb653a
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
722B
MD51d6c6ec649fd6802f284027ff37a6365
SHA14218764be1885ff660e6b847db6a1acaaccf8df3
SHA256d0f32db821800eeefb72828294da933cae5c48c76adce524803ec003a007ace1
SHA5124cff49f5c5f7b48f701325fe504605ae73d28f67ecc494e2439410418c798e4e8a7b8ad9cd7d4795ced67f4e4823b0e390616142926c4f72bd09a41ecb5da261
-
C:\Users\Admin\AppData\Local\Temp\16f5432e008aa63645c1f3c316502873937aa9ea92eb37df182df21f51796b20.exe.exe
Filesize136KB
MD5df30ded8ea1da63fafed6c01b8bab4de
SHA123efe02590c795fd01f9e35058a769689a54f908
SHA256d79e180fcfc2ba8e34f0b62a61d4ffe7a19ff95a0b6bf28a3400e716973c9c93
SHA512475b08f22ddef00321768d286a95bf61fdda8ae2589bef4bbe0a836a4d00069825dacc7eb98a22c1eac53a3e602c73fc1198566f90db291c7912d2624dce77f0
-
Filesize
26KB
MD599bdef518bf76bb3f924f8cc7d642d9f
SHA101e96d6e05fc1385999a35b943b5b0ab12983294
SHA25624e98d9749b84150f0824850a4b8e5efb17dd208083008b224e3d42541ddab7b
SHA5123ae78e16eabfdab12865165674c8db9c3e332d1d0f73952b5de9ee51eac7bb0077439d420598efcc554cc5a29ea9346eb678f9dc6e57a184043c5d0d934a6718
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0