Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe
Resource
win10v2004-20240419-en
General
-
Target
45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe
-
Size
44KB
-
MD5
f0a57d00da9b4c12642b7df030dd6fea
-
SHA1
2f3559c850da804a80864559b00bb50aa4e1f481
-
SHA256
45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2
-
SHA512
f9ab48b48bb5fb09492e57e05d3a20da9093da3335c25c49974f9427627f08e3000aee7e38248d66d9654e6bd4885ca3a9003dee27db8d6d5ab4036ba5b25c6d
-
SSDEEP
768:+1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLpLofjHFzzaed9z:YfgLdQAQfcfymNdLofLFzzL/z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1812 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2120 Logo1_.exe 2536 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe -
Loads dropped DLL 6 IoCs
pid Process 1812 cmd.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe File created C:\Windows\Logo1_.exe 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1964 2536 WerFault.exe 34 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe 2120 Logo1_.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1812 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 28 PID 2220 wrote to memory of 1812 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 28 PID 2220 wrote to memory of 1812 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 28 PID 2220 wrote to memory of 1812 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 28 PID 2220 wrote to memory of 2120 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 29 PID 2220 wrote to memory of 2120 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 29 PID 2220 wrote to memory of 2120 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 29 PID 2220 wrote to memory of 2120 2220 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 29 PID 2120 wrote to memory of 2688 2120 Logo1_.exe 31 PID 2120 wrote to memory of 2688 2120 Logo1_.exe 31 PID 2120 wrote to memory of 2688 2120 Logo1_.exe 31 PID 2120 wrote to memory of 2688 2120 Logo1_.exe 31 PID 2688 wrote to memory of 2696 2688 net.exe 33 PID 2688 wrote to memory of 2696 2688 net.exe 33 PID 2688 wrote to memory of 2696 2688 net.exe 33 PID 2688 wrote to memory of 2696 2688 net.exe 33 PID 1812 wrote to memory of 2536 1812 cmd.exe 34 PID 1812 wrote to memory of 2536 1812 cmd.exe 34 PID 1812 wrote to memory of 2536 1812 cmd.exe 34 PID 1812 wrote to memory of 2536 1812 cmd.exe 34 PID 2536 wrote to memory of 1964 2536 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 35 PID 2536 wrote to memory of 1964 2536 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 35 PID 2536 wrote to memory of 1964 2536 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 35 PID 2536 wrote to memory of 1964 2536 45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe 35 PID 2120 wrote to memory of 1200 2120 Logo1_.exe 21 PID 2120 wrote to memory of 1200 2120 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe"C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5AC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe"C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 5205⤵
- Loads dropped DLL
- Program crash
PID:1964
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2696
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ba55d6ba6a68791d94429483c57e588d
SHA130ef1d29307c594cb879b6effc80daab6c6e2b46
SHA25603ea9761b0ddbf5d7389aaabfc63907cfca83f346effb0b92c67372a1f5ae81d
SHA512373b8bbcd9a69c86571896989488fda9f2d24967e3cd988b43c6a0c69e363a4ffcb0fae81d58a938cc3fc594a9c4f4429d629ea4c6c13963788bc5d6b10d5fc1
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD5ced50089b2b4ee555f26796b34818e70
SHA12ebe0f783ca219e737dc44f98d39c7831e93d81e
SHA256d10cc2c80bf3d176876c414fa847a87d4e2545fd92eed48c5b6e5c7669d8b181
SHA512f1cb137478656faae23d12c6e2fc3944fe8c44b2671cd7892ab6998d53c589dc78ad8c9c687b58009aaf5a36c451ebf7802797d1b5d4609caf1d2c1e1226fd78
-
C:\Users\Admin\AppData\Local\Temp\45d9dc31fed5485970aa758fda6defd293bf36708dcd7881b00ef04eb171c6f2.exe.exe
Filesize17KB
MD569bc571d24389e4c5078ae113adbeae4
SHA1c8f90d5e6f22dfb443de9c57da39773c8b91627b
SHA256c5724e38c861de7ba35b6cd2c87e35e5c407b6d3680eda3bbd32bdcba5307901
SHA512ddad40c645829b2c78e3e29bb2a0f2edb4c9aba2996fe98558662b09305ed6aad50d2e7bdda17d1ffa4f75685fdc592c538ccf7867980c28683d40f113e953ba
-
Filesize
26KB
MD553f6a9b44b3d144149d4cf94458629c1
SHA1b5b3a4ee1466cb9dffb334fd7c209981e05d2a92
SHA256fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663
SHA512436ca1fb0d44a0de231bdcb6b9f508f424e1cec454c4bbe2949c6d255cd0cf264fbaa620322839bb3253a9130ddb78769ec54880282bc2479b196cb9625d1b81
-
Filesize
9B
MD53441ca64b7a268fd1abb0c149aa9e827
SHA1977a6be7624a5ff4ea1de4f422b44b4974c17827
SHA256fafa54a384b4b9bfe970b0e803afe0c0284021acca503892961170d49985dd99
SHA51284d8adce555267049d33544c4402eaa9bb3ff2022fd76cd619e4cb1fd544c5825cd7769065dd525b58e3befd579d3dd11ec2e0032907ff7dd36f83975b5b5848