Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe
Resource
win10v2004-20240412-en
General
-
Target
58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe
-
Size
66KB
-
MD5
9531fa8fc6ec3f0a1c5166b9a5e4719e
-
SHA1
018c6319223e65772bfb440896be963feaf9d444
-
SHA256
58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95
-
SHA512
2137222f23a799db9fb4c68d98443c70860df214daf29bf32a8325d455956a7f64fc290e420c50549cc2dd56d6e4fd9cc367058d674963ad0184d242aad4e7b7
-
SSDEEP
768:pZZZZZZZZZZZZZZa16GVRu1yK9fMnJG2V9dHS8HNic1iTEpgSG9TJVQBWZrvW5TL:pA3SHuJV9NBriw+d9bHrkT5gUHz7FxtJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2984 Logo1_.exe 2632 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe -
Loads dropped DLL 1 IoCs
pid Process 2896 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe File created C:\Windows\Logo1_.exe 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe 2984 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2896 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 28 PID 2228 wrote to memory of 2896 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 28 PID 2228 wrote to memory of 2896 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 28 PID 2228 wrote to memory of 2896 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 28 PID 2228 wrote to memory of 2984 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 29 PID 2228 wrote to memory of 2984 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 29 PID 2228 wrote to memory of 2984 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 29 PID 2228 wrote to memory of 2984 2228 58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe 29 PID 2984 wrote to memory of 2604 2984 Logo1_.exe 30 PID 2984 wrote to memory of 2604 2984 Logo1_.exe 30 PID 2984 wrote to memory of 2604 2984 Logo1_.exe 30 PID 2984 wrote to memory of 2604 2984 Logo1_.exe 30 PID 2604 wrote to memory of 2540 2604 net.exe 33 PID 2604 wrote to memory of 2540 2604 net.exe 33 PID 2604 wrote to memory of 2540 2604 net.exe 33 PID 2604 wrote to memory of 2540 2604 net.exe 33 PID 2896 wrote to memory of 2632 2896 cmd.exe 34 PID 2896 wrote to memory of 2632 2896 cmd.exe 34 PID 2896 wrote to memory of 2632 2896 cmd.exe 34 PID 2896 wrote to memory of 2632 2896 cmd.exe 34 PID 2984 wrote to memory of 1116 2984 Logo1_.exe 20 PID 2984 wrote to memory of 1116 2984 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe"C:\Users\Admin\AppData\Local\Temp\58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aC6F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe"C:\Users\Admin\AppData\Local\Temp\58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe"4⤵
- Executes dropped EXE
PID:2632
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2540
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD55df7d71f76653d1424f76d2459c0df88
SHA16bed2cda3aeea77eb61655d5941ce68ac39ecdc3
SHA256a7da72da0d848255881a4d0d4ad14eb95ab8291c75b8869eeb013c543add50d7
SHA5128f0f7c553a96365b55a68e5097c9bbb2c4f1803769c762341ca2f2102d595126b4084047a7db062faa6bf6ebc001e6ee66dfcaa4da67ff18fd6acd06d98ab879
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
721B
MD54d141b42ba3d4df2fb024276f96c12aa
SHA16149b99ccf7ca3f2a99c467ca89cc18adff16218
SHA2562305adad1ff5ddc1280baa7f469098e108a693e1b75d1a3e1582376833c77718
SHA51240fdcec68a753ad7acc3da87c2e0e7ee7974cc03a798b7ba40c5ab66ff1ddd552e62ed12159c55a14e2a8c8b4f3c46b3b02d76e3e950c336bf9f4a37036362b3
-
C:\Users\Admin\AppData\Local\Temp\58b39b00cd889a34cbdb908a0ced32148f236821bdfc702bcd812e64d97d1d95.exe.exe
Filesize36KB
MD59f498971cbe636662f3d210747d619e1
SHA144b8e2732fa1e2f204fc70eaa1cb406616250085
SHA2568adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93
-
Filesize
29KB
MD5dda4e3f1662f8124f797c06dd6a1e115
SHA1ac8eb50097a78c25d97a7c217ba8528fdaa9e631
SHA2567c7ac21a3134e5c7a096fce44496008c984795d8cac6d19314fbc2fa1c66a7f7
SHA512456bda7c7095eb82016a5ecf55ba43f5024287a0a27aa5b373f15f69e2a0238cdfeafb02e2d48a394cd9a2be927eda6b10ee0aacc87861a93a363a45ecb258dc
-
Filesize
9B
MD58c34dc99037d2222f90612d7a5e52499
SHA1fda1121fbbb4ed65e2bbf0b7d7c9847d6f47fe7c
SHA2565b74167b62086b62f2f1540c9601d4c70c005e86ff72d5d514f87c82df3cb468
SHA512999a3f71583131a044764079e1d6c447190f81bdb3b32d3f423f97ea6f5a4cf431ddf0b5ad61a2f72e9aa280a859555c131c9b89a4713cdaf955a7f90b6258cf