Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe
Resource
win10v2004-20240419-en
General
-
Target
7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe
-
Size
957KB
-
MD5
e8a0787a03765b7996b1c10827cad3dd
-
SHA1
5e5cd8cc5e16845066cfb37c198f6445daa58e4b
-
SHA256
7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9
-
SHA512
512fc3b6beee7ac720d0ed819110a82209e814c273aad73ccfec6aa3b6ea04b3fbdeb7bd9bb7ff55742a7a4b48e3c455c85bc362e27d9f9a6b80eddc2447e3dc
-
SSDEEP
12288:+p7RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:+pEBpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2356 Logo1_.exe 2572 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe -
Loads dropped DLL 2 IoCs
pid Process 2344 cmd.exe 2344 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe File created C:\Windows\Logo1_.exe 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2572 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe Token: 35 2572 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2344 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 28 PID 2184 wrote to memory of 2344 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 28 PID 2184 wrote to memory of 2344 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 28 PID 2184 wrote to memory of 2344 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 28 PID 2184 wrote to memory of 2356 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 29 PID 2184 wrote to memory of 2356 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 29 PID 2184 wrote to memory of 2356 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 29 PID 2184 wrote to memory of 2356 2184 7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe 29 PID 2344 wrote to memory of 2572 2344 cmd.exe 31 PID 2344 wrote to memory of 2572 2344 cmd.exe 31 PID 2344 wrote to memory of 2572 2344 cmd.exe 31 PID 2344 wrote to memory of 2572 2344 cmd.exe 31 PID 2356 wrote to memory of 2620 2356 Logo1_.exe 32 PID 2356 wrote to memory of 2620 2356 Logo1_.exe 32 PID 2356 wrote to memory of 2620 2356 Logo1_.exe 32 PID 2356 wrote to memory of 2620 2356 Logo1_.exe 32 PID 2620 wrote to memory of 2588 2620 net.exe 34 PID 2620 wrote to memory of 2588 2620 net.exe 34 PID 2620 wrote to memory of 2588 2620 net.exe 34 PID 2620 wrote to memory of 2588 2620 net.exe 34 PID 2356 wrote to memory of 1196 2356 Logo1_.exe 21 PID 2356 wrote to memory of 1196 2356 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe"C:\Users\Admin\AppData\Local\Temp\7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aBD3.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe"C:\Users\Admin\AppData\Local\Temp\7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2588
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5e51b1ea24d8739a33beec03e98ea799d
SHA1359852502dbf1c0e6a5b42f9bd279e3a164c5059
SHA256bfee2fff789c9b51161e79e8d91a226773e5dfb5deb5f8bd2eb94d6cae2d9a61
SHA51204659e8f2d599e4bc36589034ca1b8639e831f2a440ff2dc3c109b73a4d5372b34a43e1a09985623e4f7fac6fd3a4fd1255b591e88cadf234cc20c18c198c10a
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
721B
MD5969d70f02e384b8d9a14370c685d5f65
SHA17610d3a9ab70a5ccfea8857fed5e7f7781c61a53
SHA256a31a61875c2185b791f9e54aaf4ba74cc4304e04baf07db5dfe23eb8e53bce11
SHA512c40270a4e52ff8649e922b2a283c9ec47b4ed7aa9c7c46880a3692fd57c1a508d604d882aa628ff06779c125829abdc72901c38a6059a8a9573814748a596cae
-
C:\Users\Admin\AppData\Local\Temp\7e8e18f34b0d3413a2723d8b59dac80fd69019dad09ef4a81bb99c0a581560c9.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
27KB
MD514b21c1058ce6446891437ad07c26093
SHA1d503bcb8519e70cc49e533d93abd93fae9e0e937
SHA256f31673e5f2586fc86c5951b3588df924221f49b818fccfba696260b42437bef8
SHA51246893ab3ccdf2ddea3cabdd2fc2b9c97f19991af6a9e6dfbf41f6c92a766edc29fb65034606860d3676d05eed0a76578151eab6e1d854aa7d57550cd2751dc22
-
Filesize
8B
MD55979a5ab5d6ce7068aff133101a79c52
SHA18ec7729d3782fc978cc50f9b3217fc8309ae7733
SHA2566b009cde89047fc55503dc0b3649d341e98320a0438d044bc8fb068d0c919ef1
SHA512213c10a6b5b394b2736619ed0418ba715e643dfa08b5827757dd64b1718ddec6a44822ff4b192bd594997cc13bc2027d03c029537ed2f12591b370ec1f242f2d