Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe
Resource
win10v2004-20240412-en
General
-
Target
9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe
-
Size
227KB
-
MD5
408abf04cce71b3fce00e60d7c98d717
-
SHA1
21627b1fb0e31ee0d28512ab38caa5ce09a2bb3a
-
SHA256
9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9
-
SHA512
535e8afd152736249f866e3900628b5ed03b826ec3345dffa18a66b9a5c3686ecc4c0c09c656dd4e28ed53826efc5a86efa46416287c44b94e8cab8b61e5c776
-
SSDEEP
3072:pikuJVLUdeKzC/lzMPySe8DnpeIPipoHbKvXWXz9LRnsaJUS+6wPXD3fxNW7gq5n:JuJWdeKzC/leySe8AIqpoHbnDns1ND9m
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2536 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2112 Logo1_.exe 2040 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe File created C:\Windows\Logo1_.exe 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe 2112 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2536 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 28 PID 2016 wrote to memory of 2536 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 28 PID 2016 wrote to memory of 2536 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 28 PID 2016 wrote to memory of 2536 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 28 PID 2016 wrote to memory of 2112 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 29 PID 2016 wrote to memory of 2112 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 29 PID 2016 wrote to memory of 2112 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 29 PID 2016 wrote to memory of 2112 2016 9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe 29 PID 2112 wrote to memory of 2980 2112 Logo1_.exe 30 PID 2112 wrote to memory of 2980 2112 Logo1_.exe 30 PID 2112 wrote to memory of 2980 2112 Logo1_.exe 30 PID 2112 wrote to memory of 2980 2112 Logo1_.exe 30 PID 2980 wrote to memory of 2680 2980 net.exe 33 PID 2980 wrote to memory of 2680 2980 net.exe 33 PID 2980 wrote to memory of 2680 2980 net.exe 33 PID 2980 wrote to memory of 2680 2980 net.exe 33 PID 2536 wrote to memory of 2040 2536 cmd.exe 34 PID 2536 wrote to memory of 2040 2536 cmd.exe 34 PID 2536 wrote to memory of 2040 2536 cmd.exe 34 PID 2536 wrote to memory of 2040 2536 cmd.exe 34 PID 2112 wrote to memory of 1224 2112 Logo1_.exe 21 PID 2112 wrote to memory of 1224 2112 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe"C:\Users\Admin\AppData\Local\Temp\9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a122A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe"C:\Users\Admin\AppData\Local\Temp\9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe"4⤵
- Executes dropped EXE
PID:2040
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2680
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD52be68344c9b75fc6f528ff990fd8819a
SHA13cc85b2769ff749073bc4caf6d8dc8dd9ca772a5
SHA2569025619ec1492c542300e58dfab2885f5c6ed7e24c7d1505914f2886ea62619c
SHA5126e91b221db37f9eb36638d805b564304fb1c381504026a73fcc809ceda38517691a89d715e07adf2c0e7613d8563e1fd38a6bb3a18864d966c48df6628da5aff
-
Filesize
474KB
MD5db561a5a0ca702db76921a7d2dc14d42
SHA14dcfe5e6439ee9628f6c43e9bbfbfa297f350576
SHA2568475d4035b379da9d6137570957d939e2e4a1a37be6ac2b373a217643b97422f
SHA512004d16a571fc35cf7ee9271411ab1cc72f2f799649ddec53f52297d674eaf6f59a3eed0dc2fb01143f30187ba8a23473ed41fd3e4b0a9434fe52793f085d59d6
-
Filesize
722B
MD5b2fc76d46960b6914f026bbc19ff2448
SHA18ddd90c342e2442460a5cde20c91240da2161a12
SHA2561f30df3d2fe5829e4d17780ac69949135ae0680bf6183f03f19acd98e0076a89
SHA5123996c7b42415073b58c6dc691d83361f1d99041ed2453629a3a2a4a40964f2baa15a168ad60d40cf2645fd800271f669e17fa421cf1a218821f2ffee176580f1
-
C:\Users\Admin\AppData\Local\Temp\9a2f09a935c8a12f9c55f4a6dc0b91774e6143a0f8cebb0e2306c3fd60043ea9.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
29KB
MD546113c3ede06da0a68aaec2dc1e2a1c5
SHA154615f3768d5d6352292496b01fced21556f4761
SHA25676affd765412e9894dc4bb5379c64fcafe5d8dc1afd22c953fd4bb3919a6f62d
SHA512091fd4fada6e424937107fb8244d7e9b261370b32db0cb2f26a62348576fdbb95513670c05007938d64514970584dfffe43dd4aeee8056b66eca3376e192b4c1
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a