Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe
Resource
win10v2004-20240412-en
General
-
Target
4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe
-
Size
983KB
-
MD5
ed7c574db8edce1836463ca91c5d9296
-
SHA1
f97a15dd3175a6ed0e6be0ef0e848fa65c811991
-
SHA256
4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b
-
SHA512
283715ffeab279f33c7450f5d7033c832edaffa1cb0fb78d119f01b247b22c75a3e8f2a03184a0f842325a637dedbc9525ea6d735a50bcf5bbc21deeb1bd893d
-
SSDEEP
24576:/7mYwSAXEHQ5NNYbD1yobQNwgDk3IQknvkW2D9ZZm8ykXouUT/:/7dwSbIDkHknvXKZZmHm7UT/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2660 Logo1_.exe 2560 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{F6AFA7E0-7C65-4C06-9D81-8A9FA89DB845}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2660 Logo1_.exe 2660 Logo1_.exe 2660 Logo1_.exe 2660 Logo1_.exe 2660 Logo1_.exe 2660 Logo1_.exe 2560 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 2660 Logo1_.exe 2660 Logo1_.exe 2660 Logo1_.exe 2660 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2648 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 28 PID 1772 wrote to memory of 2648 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 28 PID 1772 wrote to memory of 2648 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 28 PID 1772 wrote to memory of 2648 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 28 PID 1772 wrote to memory of 2660 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 29 PID 1772 wrote to memory of 2660 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 29 PID 1772 wrote to memory of 2660 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 29 PID 1772 wrote to memory of 2660 1772 4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe 29 PID 2660 wrote to memory of 2932 2660 Logo1_.exe 30 PID 2660 wrote to memory of 2932 2660 Logo1_.exe 30 PID 2660 wrote to memory of 2932 2660 Logo1_.exe 30 PID 2660 wrote to memory of 2932 2660 Logo1_.exe 30 PID 2932 wrote to memory of 3028 2932 net.exe 33 PID 2932 wrote to memory of 3028 2932 net.exe 33 PID 2932 wrote to memory of 3028 2932 net.exe 33 PID 2932 wrote to memory of 3028 2932 net.exe 33 PID 2648 wrote to memory of 2560 2648 cmd.exe 34 PID 2648 wrote to memory of 2560 2648 cmd.exe 34 PID 2648 wrote to memory of 2560 2648 cmd.exe 34 PID 2648 wrote to memory of 2560 2648 cmd.exe 34 PID 2660 wrote to memory of 1204 2660 Logo1_.exe 21 PID 2660 wrote to memory of 1204 2660 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe"C:\Users\Admin\AppData\Local\Temp\4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB56.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe"C:\Users\Admin\AppData\Local\Temp\4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3028
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD593682ae617e5b6cca0eed1522c68a8be
SHA1c2e2a5a852ddffd60d93922c25d6c36152c01a11
SHA25658440fceb04e732a78fe83ce9ed85f7bc0b1db862430d3afaa3c03d0500b94b8
SHA51258c6421e32999513946aff532cb697374362f03e84231b0c3bda9539e9141308f4f92b44141ab1b0a6108efe4e26712ed1ce223218aa6dac2e114ef67b0c6117
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD564b891f5f81680332b2032d3ce5e9d49
SHA12fbc634539b05b6d470e837ab3c50c1c2487603c
SHA256f32c700020e6ee0c110e96355a216ad334372c7fa62b1c55eca6aefa7a24ba9a
SHA51254e9d22ad54afee758ef0b1f2dcf8097dc12d2e8d9e28778672c815b59522b98be8e8792856a11a45d88b8308e2d3c0e0c6beae49ab6fcdf4e4a8c6bebae3a22
-
C:\Users\Admin\AppData\Local\Temp\4d17af68cf0dafefd11e545b39cdf24d6cbcc65a22e35249ad98bfcff1a1521b.exe.exe
Filesize956KB
MD58cd1cf8c0042a74bfd1ebf48e211f289
SHA1683eb1fe273c9c12daf65ea8d6137b069d59bd3f
SHA25663b263337cd30245136313a0a4fed1b1350c2584d4a9952b511bfe977b5eb5f8
SHA512405886b850fda077ec5d474edc81e2209ec5a26d02484c014e6ac5bfdd075c2710334d6d50a5d56a3156bea5825ee05f268487b217bd891acd94fd90c0ae17e3
-
Filesize
26KB
MD52f809e1bc24e065a06eb9cc885f52666
SHA15a3f1009a867e84081c8e510a95a6aa67d0ea4f7
SHA256449b2bf4a84e027375af2a6bbe59a0b18c07edfc9aa96c6ff52adfc195fcd739
SHA51225338b9c6561fce3574871b08ec6f5705ca78b74e22828efaed88fb51c2c3a92d6afcd96eabf273ab19678cde13af96ad6db22532e5750e4da6202adb314435c
-
Filesize
9B
MD58c34dc99037d2222f90612d7a5e52499
SHA1fda1121fbbb4ed65e2bbf0b7d7c9847d6f47fe7c
SHA2565b74167b62086b62f2f1540c9601d4c70c005e86ff72d5d514f87c82df3cb468
SHA512999a3f71583131a044764079e1d6c447190f81bdb3b32d3f423f97ea6f5a4cf431ddf0b5ad61a2f72e9aa280a859555c131c9b89a4713cdaf955a7f90b6258cf