Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe
Resource
win10v2004-20240412-en
General
-
Target
649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe
-
Size
453KB
-
MD5
2ce6707bc6119085e6be4848bfb0c1de
-
SHA1
3c9b3987c9e1db40a35c4f4032ee68eb5fd3bd4d
-
SHA256
649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee
-
SHA512
c12a6e4c82d84f75919d4ab65d795fa13bec5b23dafcc2840af3ab317563424363dda36112390a2b7869b0821c055037438da52e6ea7120bc56f711691af9c07
-
SSDEEP
6144:4uJJUTxxIXB0iS0GaYApLhTrKUfdOtvHtKrr4Kdyj7XKUTa8m23d7KJqKWMJcjof:PUtNL8YcL5YHaI7XHgZQKhJgeCmdN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2136 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1728 Logo1_.exe 2856 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe File created C:\Windows\Logo1_.exe 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe 1728 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2136 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 28 PID 1444 wrote to memory of 2136 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 28 PID 1444 wrote to memory of 2136 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 28 PID 1444 wrote to memory of 2136 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 28 PID 1444 wrote to memory of 1728 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 29 PID 1444 wrote to memory of 1728 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 29 PID 1444 wrote to memory of 1728 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 29 PID 1444 wrote to memory of 1728 1444 649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe 29 PID 1728 wrote to memory of 2532 1728 Logo1_.exe 30 PID 1728 wrote to memory of 2532 1728 Logo1_.exe 30 PID 1728 wrote to memory of 2532 1728 Logo1_.exe 30 PID 1728 wrote to memory of 2532 1728 Logo1_.exe 30 PID 2532 wrote to memory of 2720 2532 net.exe 33 PID 2532 wrote to memory of 2720 2532 net.exe 33 PID 2532 wrote to memory of 2720 2532 net.exe 33 PID 2532 wrote to memory of 2720 2532 net.exe 33 PID 2136 wrote to memory of 2856 2136 cmd.exe 34 PID 2136 wrote to memory of 2856 2136 cmd.exe 34 PID 2136 wrote to memory of 2856 2136 cmd.exe 34 PID 2136 wrote to memory of 2856 2136 cmd.exe 34 PID 1728 wrote to memory of 1248 1728 Logo1_.exe 21 PID 1728 wrote to memory of 1248 1728 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe"C:\Users\Admin\AppData\Local\Temp\649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D8F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe"C:\Users\Admin\AppData\Local\Temp\649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe"4⤵
- Executes dropped EXE
PID:2856
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2720
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD531b58266e648b3ce129dbb398da4eb8d
SHA13fef7bf9dc3e9a9cbeb336f961122328e98728b0
SHA256f7ff76094663c11af4a4849043227d365924ab84b94b2bbcb533a87f20ccff58
SHA512f9dd0e0cebdeb060f238d071672c2f6aa808eaebce5c8ff016c90ca6d74b35467e86596e7fba8d2b2b37b8f90a650cad74530e024d1b6ff717a308393ab1e334
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD5f2633e32760680c58071da9bb99d64ee
SHA1b0f11fd737a2fe5ed1c60a042a3062e3cf685b2b
SHA256ee1ad7d95900767e497a5a94ce923819a4b5bbc5977722c90dad7bac5fae7f8f
SHA5123e7f12ab2d9506217f9459438cfbd9fcae7c61478a413d3a67e468b1f82828b2e183093b8a7bfe6eb79f2ffcf45cf4592300f487c14c27a92b82bf2bd3316749
-
C:\Users\Admin\AppData\Local\Temp\649e69d6b58510d2ed608994c599c6ad81551023d79abb351554f964186e24ee.exe.exe
Filesize424KB
MD529e177c7bb7343f365f12ad9a8af4c48
SHA1116569c0e97853f01a2bd1c2c8b5a9c0c8e1c6b3
SHA256197fc8bbd50333cde901ca625937407b6c11a393d019dfe56fcee17719f1053c
SHA512635777358e113ca2abcd2a301d50cb8dacfd48d1055dee6060fe2b38b3106e172ce828169385762936a23782ee6d5e6b10b607183576de4dbea1e3c20ec802f3
-
Filesize
29KB
MD5bc2a08f1fe0430eb261fa12807b391db
SHA1cfc8edda8d2a0eb6677468da30013b8c54a7a37c
SHA2567e2c164ef33df9f9c8d4493d7ba3ddffeb8d6a9a6363a76334472f52feb3f5bc
SHA51236419d572cc6e7f08c401dde59233bb4d50939c1471147572f11f1a4896eeb5a89228a945eb43d94fe0a6c44775a16c3b2f1c49691275d814f86105a1a346a49
-
Filesize
9B
MD57ef570b2b21e58fd906ef1a980d64425
SHA118502489f652e74f8972bbfa100d5c163d719ab7
SHA256c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055
SHA512e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f