Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe
Resource
win10v2004-20240412-en
General
-
Target
b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe
-
Size
203KB
-
MD5
9f6b12e00540dbe57a6cbe8cb92760f2
-
SHA1
80216567175994a7bfbae9c6452e17bf5bee689e
-
SHA256
b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620
-
SHA512
0e8e9b98dc6291b7e493a3b5d8fffe11f29b06b0639890a85828d265e4d459ec3fce3ad9e5720f9a258d49dfd5cd309a2d5ab985079b7990a03a6b1ac767dd4c
-
SSDEEP
3072:C5ftffjmNqfJlhxZ8sHlZgte98JmvSxEyyyyyyyyyCyyyyyyyyFfHZ8sHlZgteTz:MVfjmN2hvn98gKxs5nT80
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3016 Logo1_.exe 2552 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe -
Loads dropped DLL 6 IoCs
pid Process 2996 cmd.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe File created C:\Windows\Logo1_.exe b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2920 2552 WerFault.exe 34 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe 3016 Logo1_.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2996 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 28 PID 2892 wrote to memory of 2996 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 28 PID 2892 wrote to memory of 2996 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 28 PID 2892 wrote to memory of 2996 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 28 PID 2892 wrote to memory of 3016 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 29 PID 2892 wrote to memory of 3016 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 29 PID 2892 wrote to memory of 3016 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 29 PID 2892 wrote to memory of 3016 2892 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 29 PID 3016 wrote to memory of 2672 3016 Logo1_.exe 31 PID 3016 wrote to memory of 2672 3016 Logo1_.exe 31 PID 3016 wrote to memory of 2672 3016 Logo1_.exe 31 PID 3016 wrote to memory of 2672 3016 Logo1_.exe 31 PID 2672 wrote to memory of 2572 2672 net.exe 33 PID 2672 wrote to memory of 2572 2672 net.exe 33 PID 2672 wrote to memory of 2572 2672 net.exe 33 PID 2672 wrote to memory of 2572 2672 net.exe 33 PID 2996 wrote to memory of 2552 2996 cmd.exe 34 PID 2996 wrote to memory of 2552 2996 cmd.exe 34 PID 2996 wrote to memory of 2552 2996 cmd.exe 34 PID 2996 wrote to memory of 2552 2996 cmd.exe 34 PID 2552 wrote to memory of 2920 2552 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 35 PID 2552 wrote to memory of 2920 2552 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 35 PID 2552 wrote to memory of 2920 2552 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 35 PID 2552 wrote to memory of 2920 2552 b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe 35 PID 3016 wrote to memory of 1156 3016 Logo1_.exe 20 PID 3016 wrote to memory of 1156 3016 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe"C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D12.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe"C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 5485⤵
- Loads dropped DLL
- Program crash
PID:2920
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2572
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD50bc939802f6370e31e3c5a2b37a042dd
SHA13cf5ebf377e7800f6d067c4e4252b5cb82ab93ac
SHA2566477fbcbd79105f68d23dc4fe2b5df7005315c0156a2e3070085b1a24754e0dd
SHA5129ab7e4356f588364da9f766ff30be721f63cc3ba49e173213930da17e3197f69d5377cda69179d2940f0c3396c86ec26bcfa47986726f23564949f38e4661b80
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD546d23dc0755defcc30a5b0f27f7e47c5
SHA1bcd4a159c936497e98fdb89dd073bbf86eae9c5f
SHA256092208f18fce03c04231a62125d4337d4f40a343e65d6413ef218ae9e0bd50f8
SHA512a0e295c65d5c63e80a247d676f3a1b5719abf272093df5cc12d382b67797c3debcb4a923961a612ca8ad775a3ae8d8c800677a2909d094a75acd714e03106b6d
-
C:\Users\Admin\AppData\Local\Temp\b7e578e7d2c4ff3d5eb14d2257386303e6b09b27fd5e15d4e7fdf0b09fb06620.exe.exe
Filesize177KB
MD5ae4b536a121cbceb0c3b9e1d059d2e9a
SHA13d6111940d17f5112e90683ce4b07d105063dedc
SHA2564e996ebb9bf0d5db1747e6c4a2dc8b7ce8e01054f308d195fe17390199846f49
SHA512b16a2c734447be37f5255fcef1aa63503b82baddcbadf74e10202bb68a51c9d67e516eed62cc73724c0d9a1ecfea0fe166dee3769ccfd51f274e3b99beadbde5
-
Filesize
26KB
MD5119755ef4a3af58f4b8d218b4721cb3f
SHA134b7f1492b66a8fa9b129dc2f7d25f3325b3ff0d
SHA2563f53e4310df7acaa22e0faa1e96de491263c2edaf8169f1bee19855107bce965
SHA512f0c9e53feee60c5df384aaf58c0892c7108ac0d8961bda32ea3e88e1107ce630377ecdbbeb7e81daacd13abb4b800f6f45e4395e07d1723edba2e9e88588743f
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a