Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe
Resource
win10v2004-20240412-en
General
-
Target
71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe
-
Size
362KB
-
MD5
c5cb98fa669a0af45bd76c6ca5858c0a
-
SHA1
73b95be38d968c05675bc239eac386ad5b810b55
-
SHA256
71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c
-
SHA512
b5f63a8cc78e12e83f0c667c85c043b5b7cb475d880ec1833c38e6b7f9e5241fced7a2015ec90e117b3dd0799a7d12fc7d6b5846e8569402ba7164138ed366b2
-
SSDEEP
6144:3Fp9zU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:VpRU66b5zhVymA/XSRh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2264 Logo1_.exe 2872 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe -
Loads dropped DLL 1 IoCs
pid Process 2860 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe File created C:\Windows\Logo1_.exe 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe 2264 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2860 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 28 PID 2864 wrote to memory of 2860 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 28 PID 2864 wrote to memory of 2860 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 28 PID 2864 wrote to memory of 2860 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 28 PID 2864 wrote to memory of 2264 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 30 PID 2864 wrote to memory of 2264 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 30 PID 2864 wrote to memory of 2264 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 30 PID 2864 wrote to memory of 2264 2864 71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe 30 PID 2264 wrote to memory of 2644 2264 Logo1_.exe 31 PID 2264 wrote to memory of 2644 2264 Logo1_.exe 31 PID 2264 wrote to memory of 2644 2264 Logo1_.exe 31 PID 2264 wrote to memory of 2644 2264 Logo1_.exe 31 PID 2860 wrote to memory of 2872 2860 cmd.exe 34 PID 2860 wrote to memory of 2872 2860 cmd.exe 34 PID 2860 wrote to memory of 2872 2860 cmd.exe 34 PID 2860 wrote to memory of 2872 2860 cmd.exe 34 PID 2644 wrote to memory of 2120 2644 net.exe 33 PID 2644 wrote to memory of 2120 2644 net.exe 33 PID 2644 wrote to memory of 2120 2644 net.exe 33 PID 2644 wrote to memory of 2120 2644 net.exe 33 PID 2264 wrote to memory of 1196 2264 Logo1_.exe 21 PID 2264 wrote to memory of 1196 2264 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe"C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1F44.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe"C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe"4⤵
- Executes dropped EXE
PID:2872
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2120
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD545176869ff4ca97755d08ffb45765b23
SHA1365bf2c70a10602370bd8d149802927c52164cb6
SHA256548d006a501826f362a576842cee94d5c94812dbd5e17f709cf3fd071a8ff837
SHA512f88d8c681e934302d0df4735b0e7b730a26dc5e818c7c0a1d0440c84d1a6658a70a5d7b53845b9dfc776ed383a381b7f76c8c040018e1b6a8d21197d3b0d8569
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5876c6041f89d140610ae2f70b0907017
SHA10371b9f05ac3be3cf54db3b6de48966545a773f4
SHA256963e1c69612bccf4bf17e9f7c31a32f0e2698368ad4e171a7d57ffe7a3d25e76
SHA5120a4ec20a43883a4241668ac2dff2879836945bdb05ad5efd29c0b47a98cdbe1add20ebbe70dff8b7690f1aca2af9e2e93e969d65d9a269f1a2c13d2b717e2fc0
-
C:\Users\Admin\AppData\Local\Temp\71e22676f13b82817dac6781c068de981382e0bc61db0efb30ba161ce925665c.exe.exe
Filesize335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f
-
Filesize
27KB
MD5f1bef7887eadcc719a4092978bf5929c
SHA1c87bbfae9f8c990a9ef7abcbee695006fb97d03a
SHA25678361883ed10c93e33dd13e2b56b8dc43d854f387dd809dbd75875ae4db89cf0
SHA5123ffaa66e7c774fef7de06e689bb8a16d48a0702443573aa34dbdfdbba3661003db4d73cf6713a41cab87d6c967f60b02915c6dce46a33fe8294088b435f9e672
-
Filesize
9B
MD527729a3995958245e2d6799df42e26e7
SHA1dfe386f53277c8387b50122f3fda9bc2467815ba
SHA2569313041e89d4585b2606afa4809b101e7e8a2c944d063a28c796b0c0f070b5f1
SHA512ba9157cea7ca5c01b52e2a4a758f4e12e018990e49f1ece5fa6d83423f37a0a4dd5246d9b01e5e212d5e8c36a66a8d0e2645bc73753671295965a855a5028ec6