Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe
Resource
win10v2004-20240226-en
General
-
Target
f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe
-
Size
310KB
-
MD5
ce025a42eda94a58a6aaa202438e2aa8
-
SHA1
45ea4b3c5cea86aee66534b1f4217fe7b4065256
-
SHA256
f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027
-
SHA512
d646d158b826c419a19b518cba348f4838767d95643a92e8849830f4215f6bfe7fa4b5fa35fd0a51469f5039b3f9e165a6bb27b067166aba66d5f12d18a94bad
-
SSDEEP
6144:MVfjmNuOlq5n5YW6eQXC+pdX55F8+f1u0kdzY1JGjJUxf6XEx4a5TFf3DxfpgVgt:O7+uhn5YWNQSkB55S+9u0kdzoGXsNf+G
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2968 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2368 Logo1_.exe 2852 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe File created C:\Windows\Logo1_.exe f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe 2368 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2968 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 28 PID 1940 wrote to memory of 2968 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 28 PID 1940 wrote to memory of 2968 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 28 PID 1940 wrote to memory of 2968 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 28 PID 1940 wrote to memory of 2368 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 29 PID 1940 wrote to memory of 2368 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 29 PID 1940 wrote to memory of 2368 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 29 PID 1940 wrote to memory of 2368 1940 f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe 29 PID 2368 wrote to memory of 3064 2368 Logo1_.exe 30 PID 2368 wrote to memory of 3064 2368 Logo1_.exe 30 PID 2368 wrote to memory of 3064 2368 Logo1_.exe 30 PID 2368 wrote to memory of 3064 2368 Logo1_.exe 30 PID 3064 wrote to memory of 2596 3064 net.exe 33 PID 3064 wrote to memory of 2596 3064 net.exe 33 PID 3064 wrote to memory of 2596 3064 net.exe 33 PID 3064 wrote to memory of 2596 3064 net.exe 33 PID 2968 wrote to memory of 2852 2968 cmd.exe 34 PID 2968 wrote to memory of 2852 2968 cmd.exe 34 PID 2968 wrote to memory of 2852 2968 cmd.exe 34 PID 2968 wrote to memory of 2852 2968 cmd.exe 34 PID 2368 wrote to memory of 1200 2368 Logo1_.exe 21 PID 2368 wrote to memory of 1200 2368 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe"C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1249.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe"C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe"4⤵
- Executes dropped EXE
PID:2852
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2596
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD54ea1792890b16f7a7bd178c5de188d93
SHA113305c216a72caa23ee3a823056dfa308df5d671
SHA256d82a2e28398235d01736e7f88716348755e59e303aa439f18edd053d7f4cb031
SHA51294756da87e91df5e3442cf6712557b6c560026c779f1b5312b011c141c4870712ed70bfb201c1401386b8611c3040e7df41b2357cd095206a2d74a9d2d20a942
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD52412f1f9787b1eaf2fe629ea0d567e98
SHA1f63111f8017da647ecae444441d114f03be50049
SHA25676f1a73895619cd5db40a8b9bd03510f3d6706ff8c9c92abfa069087175462c6
SHA5122cbf64a80ec84996c59a4f4c5363d61e0e9f867ea05a05b1eb2a6a4bdfeb00b5ea3fccc9bc38bc97f3fb2d1263b2547b4d69520e1da15b83a7e0d1035355b596
-
C:\Users\Admin\AppData\Local\Temp\f06e18275d6a0d1cbdbaa8d970cf76e111d1bd48be7c9d253b7cb42752ec4027.exe.exe
Filesize283KB
MD5e2ddf07f9cf45247f05a1d4e1e97965d
SHA1b49bf09fd6847672edfcd8623485eded12114cf5
SHA256a47809fa663a8adac60290a51bb3cfebd0c7eb9044b5be3849e849ff38e9b83d
SHA512cd2f8e45ffc85c923781d32867a625cfecc937f0b10f0e196dac34331f5be865205d9a9dc610c88748c92d7aa32cb229165a857ad94ba414a7c182a35b24e43d
-
Filesize
26KB
MD5c5dacb5d9ba17498cc50e5e16665560a
SHA12c2e2612a06cfdc18cd7367148471d2dbe2a1521
SHA256f4d821877f7f3f1faf39d6b4045baa2b12d8a6b8aeca6ee73f3c94e1df5180b3
SHA5124882b0b45109388e5a520d62df85fac5f1212f7d79f4e5184322cec9093226b8c1725e6fd9d1e1ff460ae11301924ba4e15f4b0aa00bc13800f084faf1ef3ff1
-
Filesize
9B
MD55e45e0c42537212b4bfef35112ec91ba
SHA110c59c091fd35facc82bbc96938f118ce5a60546
SHA2569f6b7a83161db36757e96dc40936aec1e5a9a41f9fca089f9cf5a4d695dd5ed5
SHA512ee964e08687daa53fdc8e063402791acb104bd59f5d0f8a6d11d3e889db476315641c38032ade4177cd794b060f9fc4e6fd161989e452aae828c875c747e4bfb