Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe
Resource
win10v2004-20240426-en
General
-
Target
2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe
-
Size
7.3MB
-
MD5
f8ab859bdc0b2f95aed1b44c27205eee
-
SHA1
362254c913b8f9ed506cc9135dfdd54b3858cb47
-
SHA256
2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482
-
SHA512
b2df37937a5b981c819587aa582e0bf2e585f424d4be40ee6321d5b12687705acbcb335516c5352b9a443f5773b4a5ffc409d771a1e7333be4f6d7c528284c2b
-
SSDEEP
98304:SmB9OWBVClfcaA1oZeSajfztbVCGQX4bME4bP8nQgMVQNKe5AJbI8D:Sg9OHi1oZepfxUGGNQNKe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe File created C:\Windows\Logo1_.exe 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe 2000 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1672 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 28 PID 1632 wrote to memory of 1672 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 28 PID 1632 wrote to memory of 1672 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 28 PID 1632 wrote to memory of 1672 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 28 PID 1632 wrote to memory of 2000 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 29 PID 1632 wrote to memory of 2000 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 29 PID 1632 wrote to memory of 2000 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 29 PID 1632 wrote to memory of 2000 1632 2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe 29 PID 2000 wrote to memory of 2536 2000 Logo1_.exe 31 PID 2000 wrote to memory of 2536 2000 Logo1_.exe 31 PID 2000 wrote to memory of 2536 2000 Logo1_.exe 31 PID 2000 wrote to memory of 2536 2000 Logo1_.exe 31 PID 2536 wrote to memory of 1964 2536 net.exe 33 PID 2536 wrote to memory of 1964 2536 net.exe 33 PID 2536 wrote to memory of 1964 2536 net.exe 33 PID 2536 wrote to memory of 1964 2536 net.exe 33 PID 2000 wrote to memory of 1088 2000 Logo1_.exe 18 PID 2000 wrote to memory of 1088 2000 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe"C:\Users\Admin\AppData\Local\Temp\2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a18BE.bat3⤵
- Deletes itself
PID:1672
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1964
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5b3166b305391ff0707753b23e6ea4225
SHA190f45b353714c2fa75bf6fc7d34c7b760a12fe0f
SHA256528b16af9e651ffcc368ff7d0787d4096c8aaf60bef6cb8e9e921028aefea686
SHA51251d20e8b39c654f0a16b5d3c7aed498c3faced12f2908e884febb6f780ffde5b4b5c9cb164019de87111c01c51839ac2d87605c4b35b887de90961b398a2173c
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD5f4cd000b9d17599d9b9811614c89d5c4
SHA114b3f4818f149453373f0582cc4d655b7ba384f5
SHA25609618f9eccfd122c1d05056e8fb90106879265ef54b42a480338b0413475414a
SHA51240d3085a373b586947938e53f4bd5e37a11ea522bf4391b5287652093774fea546e98897a93edafd8eea26c072a230f184c95317584565f66846fd2868bec502
-
C:\Users\Admin\AppData\Local\Temp\2339ae1c976feb510370e75fd39c580c375774ed35fdf07d88efedc29081e482.exe.exe
Filesize7.3MB
MD5172b6d29b3cdcdf2b0b14332eb216161
SHA17534c39aecd8a968c8cdf34db4cb388d999a3065
SHA2563bb1c042bf917e6577be28edce3243628e9ce4245e9abbc2cc0196ccca26630c
SHA51271e4e14c689974821c0bb80637a53cd5234df0111b809612ac810846fe2ba9d288da20141455b984dd842c8343166f807f8da51e74b66fbe3aec181db72806ce
-
Filesize
29KB
MD5c1154eebf193b34d928ac7a0d4d1425b
SHA1e412ae088af8d3d6e268ae517e62dc7a7150bf2f
SHA256fd38739477bdd63484e50d2b995923ab7da929db7fa69532e3293d8406f64b54
SHA512017537aa4204c2c327024b4dc9bfa61a36a3f2b64a8898e890e83a33a83e237d2b9749e86b7517da5b265c331171e4054ea6d7cb594743b457821fac3d4f50ac
-
Filesize
8B
MD54192191c0ab0c3b88220ba22a15110f6
SHA19c0fb16b7f5184b30d6fbc59562c618dcc4bdbd2
SHA2562230f7e62213f6b9a4fd3f6b5dc957077d8fb4a16e56150c6323264457a057bf
SHA512fd583ce439c1e8c5401e67dee407c0b7d566a5339bf779a2b4d6ce81f433c93c977c3a78345f3f750c42d8abd2aeed4a3edba183115b3fade994daa273206bfd