Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe
Resource
win10v2004-20240226-en
General
-
Target
7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe
-
Size
66KB
-
MD5
23c18908485909f19d6483c69525fc08
-
SHA1
b095668e5948a02b92aa7631174446aa88cd09f7
-
SHA256
7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e
-
SHA512
7b18c04e07d5f4bae21f60a0d8c7b2f07ab59686b3e31d59df59a79e307a5c607a0a01a41dd6911ed43b05b3970ddbdacdef5e6b15fe517fb1a7ea5635866eb0
-
SSDEEP
1536:pPF3SHuJV9NBriw+d9bHrkT5gUHz7FxtJ:pPFkuJVLBrBkfkT5xHzD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2940 Logo1_.exe 2600 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe -
Loads dropped DLL 1 IoCs
pid Process 2128 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe File created C:\Windows\Logo1_.exe 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe 2940 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2128 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 28 PID 1148 wrote to memory of 2128 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 28 PID 1148 wrote to memory of 2128 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 28 PID 1148 wrote to memory of 2128 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 28 PID 1148 wrote to memory of 2940 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 30 PID 1148 wrote to memory of 2940 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 30 PID 1148 wrote to memory of 2940 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 30 PID 1148 wrote to memory of 2940 1148 7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe 30 PID 2940 wrote to memory of 2564 2940 Logo1_.exe 31 PID 2940 wrote to memory of 2564 2940 Logo1_.exe 31 PID 2940 wrote to memory of 2564 2940 Logo1_.exe 31 PID 2940 wrote to memory of 2564 2940 Logo1_.exe 31 PID 2128 wrote to memory of 2600 2128 cmd.exe 33 PID 2128 wrote to memory of 2600 2128 cmd.exe 33 PID 2128 wrote to memory of 2600 2128 cmd.exe 33 PID 2128 wrote to memory of 2600 2128 cmd.exe 33 PID 2564 wrote to memory of 2836 2564 net.exe 34 PID 2564 wrote to memory of 2836 2564 net.exe 34 PID 2564 wrote to memory of 2836 2564 net.exe 34 PID 2564 wrote to memory of 2836 2564 net.exe 34 PID 2940 wrote to memory of 1248 2940 Logo1_.exe 21 PID 2940 wrote to memory of 1248 2940 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe"C:\Users\Admin\AppData\Local\Temp\7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF2D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe"C:\Users\Admin\AppData\Local\Temp\7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe"4⤵
- Executes dropped EXE
PID:2600
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2836
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5b972986ddc5ad7e3b78622aaec4ae4c0
SHA107ec90600067df6a2264a189ad2179175fc48798
SHA256cef76ca308c743c0da4d0adc190484f0a08dcb4a4b87946beef0cd9d2c8915a5
SHA512aeba6991cd7bbc8731468d94455f3abf564e76cab681d023089b17cda58229fdab97c39e001081887a2c5efb0969d15fac9fab2657075dfc768448aeb4825023
-
Filesize
474KB
MD517e5de36cf448d652adab881a4557ec2
SHA1c45337444120f4cc4a9a65b2bee63cd61618ca2a
SHA25632568fb07078e0d4e77efac9ad862454dba63de5c5f920d9a14de709372f2430
SHA51222678c9ca2d70d9a3377d1f2c6c91d7649adcaccee564acdf1bd6373e60f13f6e21fc09feed5b590475889996287961a1450542741ef0888a4a0b5e9c9812b92
-
Filesize
721B
MD53c78b60ebe88e2eea0c6625f0e8b6a3e
SHA1fcb6db54222bd86e91cfc491fc3d466f55cd1ae0
SHA256f9f8a6f90b9a38d0805fd58f7566ad01fda04ca1f53cd60dc4beca9f93b473fd
SHA5127cc12419647be10cc576c5b9c3b83c6628f077ccf1d35b19eeac74eb5f90810aabd547b186d2fa69d1ba40505f4fe30c0c05873220943ea5d1add8ada3b4ec63
-
C:\Users\Admin\AppData\Local\Temp\7b8ac7c3ea18558b442bc9e3093eff49fd64173dc306af3b4df72cb84d41117e.exe
Filesize36KB
MD59f498971cbe636662f3d210747d619e1
SHA144b8e2732fa1e2f204fc70eaa1cb406616250085
SHA2568adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93
-
Filesize
29KB
MD5dac673b75fd1f13a8f885a8ca5252a58
SHA1809080cb9ecc0d4978b724a48ca3e9fb6d65d11a
SHA256ca09ca81af02465f58f3c9037f9d3ec216a9cb41f876bc64ca9a13d7b0558a2c
SHA512cc5336c6a7cf8189de065ea93420015c62ccfa3c7fa5cf1f9e02d8d25ae551c64353eac54c502d02568d0f2fd0706be7098e41f163c1d1b684955d601323610c
-
Filesize
9B
MD57ef570b2b21e58fd906ef1a980d64425
SHA118502489f652e74f8972bbfa100d5c163d719ab7
SHA256c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055
SHA512e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f