Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe
Resource
win10v2004-20240226-en
General
-
Target
5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe
-
Size
711KB
-
MD5
6ec7f34f745cea0d1c5581ad3b082ce3
-
SHA1
b811b8cee7b67789347f8992f1adecc13aceabaa
-
SHA256
5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee
-
SHA512
73baa2cb53600e926b3e2cc5925a8ecd8dc541b4be6548d00c5d653d7e7219f1ca30e4af8a4d38245354ddca4d23d959827644705e98d2ec857e40aa79d5f268
-
SSDEEP
12288:3pKfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:3pGLOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2036 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1676 Logo1_.exe 2768 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 1204 Explorer.EXE -
Loads dropped DLL 3 IoCs
pid Process 2036 cmd.exe 2036 cmd.exe 1204 Explorer.EXE -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe File created C:\Windows\Logo1_.exe 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe 1676 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2036 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 28 PID 1216 wrote to memory of 2036 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 28 PID 1216 wrote to memory of 2036 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 28 PID 1216 wrote to memory of 2036 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 28 PID 1216 wrote to memory of 1676 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 29 PID 1216 wrote to memory of 1676 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 29 PID 1216 wrote to memory of 1676 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 29 PID 1216 wrote to memory of 1676 1216 5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe 29 PID 1676 wrote to memory of 1164 1676 Logo1_.exe 31 PID 1676 wrote to memory of 1164 1676 Logo1_.exe 31 PID 1676 wrote to memory of 1164 1676 Logo1_.exe 31 PID 1676 wrote to memory of 1164 1676 Logo1_.exe 31 PID 1164 wrote to memory of 2760 1164 net.exe 33 PID 1164 wrote to memory of 2760 1164 net.exe 33 PID 1164 wrote to memory of 2760 1164 net.exe 33 PID 1164 wrote to memory of 2760 1164 net.exe 33 PID 2036 wrote to memory of 2768 2036 cmd.exe 34 PID 2036 wrote to memory of 2768 2036 cmd.exe 34 PID 2036 wrote to memory of 2768 2036 cmd.exe 34 PID 2036 wrote to memory of 2768 2036 cmd.exe 34 PID 1676 wrote to memory of 1204 1676 Logo1_.exe 21 PID 1676 wrote to memory of 1204 1676 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe"C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2E22.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe"C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe"4⤵
- Executes dropped EXE
PID:2768
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2760
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD54e048bca0fcd41a271607320727c8c41
SHA180e2ede1d6e30f031ecbec1d36510b58ef0e2895
SHA25628ba4edf8042fe1848f73b4a2df0fb60bb486bd2c5a37edffb45e4313deb9f30
SHA512c4f055a4b099b9666fd153499ce9b622c4b2ab0f7a6cdecff660cb108715e48d4fce4d321254d9ccac01acb56f528e6cea0fab8dbb280484556b6ab0d24d6824
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD521ae0241fad4d7335565aceea961b66a
SHA1c806f20f1e2780fae58d528046bae21429256d53
SHA2566961532a779962c6093a96f1c53d599e345347550589776e793445c0387ccee6
SHA512ec14c07774ab8b985b0c8ba7b215a8b09ba03297ef7fc1e47d91be11d45eebf9caa0eb3a719e1bd2264a1df6ec69b8f42ec74e6e01d2ebef955c9ad1cf7780f2
-
C:\Users\Admin\AppData\Local\Temp\5de34967d89be887ef94b0b1da3ace4898cbe55ac577561ca091dd546333a0ee.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
27KB
MD58c37f7c2553a1bea86b33630faf6bf88
SHA138c0360645191f06c7f5ef65d0f12e0c92f4d977
SHA25684e3f53308957006d9a3b2975af76693883b04fff9dd2970618ac336b82d1dfc
SHA512590e6531921ecc3b70c8895f19c469ccedf5d0f34686063389b136df86521df6db4c430b062c4f67a399aa9d93f9c31dab9e1c7a69ee00fa84e6120d3c01175c
-
Filesize
8B
MD5d970a2bfcaa076939c06270d1a48dec8
SHA17a558f4d64c3e98bcfd2af83f28e6fbd207a39e1
SHA256bdc6872f9a0a011a670907f0fedad9b88e283c5af545cf9f6bd73c3709967d44
SHA512ea4c16930628455852ce343f8ae248b6df869b8da10b10928ebb802129f73d9761971811de317c7d3121b815340027782ec15d385d1d2d7df8fd0a46b62974c2