Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe
Resource
win10v2004-20240226-en
General
-
Target
d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe
-
Size
2.8MB
-
MD5
50e7b8546b68608b3799cccca6dcd27f
-
SHA1
61180f195f6007cd883848bf9753857ed01d706e
-
SHA256
d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b
-
SHA512
89c4a1832470822c05dddda167ea130a98df25526cd8c1850b82b0222a9c6f90634a1cc42cb27141fde58435cfe85344f9828c18f1861586e8c37f85f62fdf17
-
SSDEEP
49152:E6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:hd1XdhBiiMa7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2204 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2304 Logo1_.exe 2952 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe File created C:\Windows\Logo1_.exe d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2204 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 28 PID 2292 wrote to memory of 2204 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 28 PID 2292 wrote to memory of 2204 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 28 PID 2292 wrote to memory of 2204 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 28 PID 2292 wrote to memory of 2304 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 29 PID 2292 wrote to memory of 2304 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 29 PID 2292 wrote to memory of 2304 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 29 PID 2292 wrote to memory of 2304 2292 d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe 29 PID 2304 wrote to memory of 2776 2304 Logo1_.exe 31 PID 2304 wrote to memory of 2776 2304 Logo1_.exe 31 PID 2304 wrote to memory of 2776 2304 Logo1_.exe 31 PID 2304 wrote to memory of 2776 2304 Logo1_.exe 31 PID 2776 wrote to memory of 3036 2776 net.exe 34 PID 2776 wrote to memory of 3036 2776 net.exe 34 PID 2776 wrote to memory of 3036 2776 net.exe 34 PID 2776 wrote to memory of 3036 2776 net.exe 34 PID 2304 wrote to memory of 1200 2304 Logo1_.exe 21 PID 2304 wrote to memory of 1200 2304 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe"C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aABF8.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe"C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe"4⤵
- Executes dropped EXE
PID:2952
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3036
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD5916f61e09f99409543151ddec18e89ae
SHA13ce6d1dae5340aab7ccfd915d8088c20116d7ea4
SHA2566d88bf8dacb1dec0dd52550df6601e3631e8874f52404d03877e3843682d6d47
SHA512ca78a48d577d64d84cb1e48462a55b8258bbb2d81e219766566a16f03a9f9aec996edc5c58b4303361f89091cd11c4c6069a6740a3c9212a2c3e441b79cb3564
-
Filesize
722B
MD55d3a0833d79afdda65867f7ca73000d9
SHA193a929fb2c4ca5259eb677111396b55372449664
SHA256df1f69e9f502c912ffdb05836830890467c14c8e47ed99cbf0b2dc1c79c7607f
SHA5127e24a4c20eb9c8f9aa8d497661e2dbbc53ecd31f5f5c9e8180827daa7578c67ec156d51adf2f9b6034dc95dc08acb95d76392ffbeeddf06368ce28162520c7bd
-
C:\Users\Admin\AppData\Local\Temp\d9fe337e5c6cc2068ac5f3831b94669c8b0297c27f8d378d8fd17a3665e2543b.exe.exe
Filesize2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
29KB
MD50c2a885df5fa2ebcae91564ec5088618
SHA1fb00dcefb9f0655bc23c1a1673df3b19fe71935b
SHA256565163946b3944c4717d9ab9900dd3f683ebd0d7f8573b96d2f667c34e514fba
SHA512cc9d7f60b562033e619eb1ed410c8cd176a7524d89bacf0eced9d7b434624538626f75d887d0ee5f0f64617524dc894c0b9adcd9ca52beec0e09473295fa6768
-
Filesize
8B
MD50282826728a8bfe9c3f290391e4f323c
SHA1ab69946ecc2824015e04a669b8434e8eb2a658aa
SHA2560c3ddb95f5308286721e2d55c16a3170674b54fc8d17c1f02bee1b6850ce2ee9
SHA512fde2cb3a9b14fa79fdb7615c094a85aee3baf100511872c0b3986349edefe5a2dc4513929587852c1672e9632c8a6c95284fab82397133dec597bb8fe618fb0e