Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 00:15
Static task
static1
Behavioral task
behavioral1
Sample
4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe
Resource
win10v2004-20240508-en
General
-
Target
4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe
-
Size
127KB
-
MD5
d68a482f70846832ab29b6aecefab6a8
-
SHA1
7796c513812623a9b4bab582fc0ef1f106a55906
-
SHA256
4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899
-
SHA512
895ca06a79fb2ca2019556b76683c91b2184c6dbc29e41b7e9ed812c26a4fac2b817cf17752542e9c6ef440057b47a82e69fb18fdc89b984f671d0c973b1220c
-
SSDEEP
3072:p9kuJVLxhUBf8Bo/mu+YDfYz8KrRVwWEhPt4zB+yNFp0:4uJVG7/fYfLnzB+AFa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2616 Logo1_.exe 1212 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe File created C:\Windows\Logo1_.exe 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe 2616 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3068 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 28 PID 2400 wrote to memory of 3068 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 28 PID 2400 wrote to memory of 3068 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 28 PID 2400 wrote to memory of 3068 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 28 PID 2400 wrote to memory of 2616 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 29 PID 2400 wrote to memory of 2616 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 29 PID 2400 wrote to memory of 2616 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 29 PID 2400 wrote to memory of 2616 2400 4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe 29 PID 3068 wrote to memory of 1212 3068 cmd.exe 32 PID 3068 wrote to memory of 1212 3068 cmd.exe 32 PID 3068 wrote to memory of 1212 3068 cmd.exe 32 PID 3068 wrote to memory of 1212 3068 cmd.exe 32 PID 3068 wrote to memory of 1212 3068 cmd.exe 32 PID 3068 wrote to memory of 1212 3068 cmd.exe 32 PID 3068 wrote to memory of 1212 3068 cmd.exe 32 PID 2616 wrote to memory of 2608 2616 Logo1_.exe 31 PID 2616 wrote to memory of 2608 2616 Logo1_.exe 31 PID 2616 wrote to memory of 2608 2616 Logo1_.exe 31 PID 2616 wrote to memory of 2608 2616 Logo1_.exe 31 PID 2608 wrote to memory of 2668 2608 net.exe 34 PID 2608 wrote to memory of 2668 2608 net.exe 34 PID 2608 wrote to memory of 2668 2608 net.exe 34 PID 2608 wrote to memory of 2668 2608 net.exe 34 PID 2616 wrote to memory of 1168 2616 Logo1_.exe 21 PID 2616 wrote to memory of 1168 2616 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe"C:\Users\Admin\AppData\Local\Temp\4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a277E.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe"C:\Users\Admin\AppData\Local\Temp\4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe"4⤵
- Executes dropped EXE
PID:1212
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2668
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD58916a72b93d5fd4c6e63c8b36279b230
SHA183e3b1bfd579fbf998b2db5428819a10b25d0ad5
SHA256537975086833d580dd97beff9e712f64cc41d0bf20cac16c1a04be24ed3af27b
SHA5122c61138cc8800649890179c080c228da22ab9fe27f3fc1a83c52f57b349a5d3c61fc9d4a64ab53e362376f63edf99d30f0994b6070f97d09ec4868efaf8293b4
-
Filesize
722B
MD5cdfcced305777ed47ba7e69541d4a054
SHA12ee8f083409c441a29a318ee5a4a7889ef040b5b
SHA2566a359582ebf0270d2401f59993891cd1f4c3c0930ab704371d881d8b44d301da
SHA5121005d81bcea431c748eea4c34b018d9ddcede0a267fbae7cf4589755961f892332af0a7ba3af0824a02e160c0715c9148aabdb5ef27ef2348f9bae070012094e
-
C:\Users\Admin\AppData\Local\Temp\4e935354e1c6c61a1aa16405a415266edc4b6f910f6dae8eeee48321dba88899.exe.exe
Filesize98KB
MD5b8d34226a11443d575f205e3dc9d87e8
SHA1f1952c7a285664816ae09ce1df8a79d1d49f3dbf
SHA25657db243b4fbae3ee90c0f52e0d6871bcd47e8d23236381f051704350c8297f7c
SHA512181229544e43348d08ac0be3f03e4572baa5df255de5db79466904857016e670c130177035492159eb077c5629857741430639bee7c9552d17f7ae960403c82d
-
Filesize
29KB
MD5ca7aead79b7295c052be33014e4ed990
SHA1a768ad348a64c11d69c5e909871beb9361d2c16b
SHA25613ffeb88b5674f2f8588cff12c5e4e0a2dab8843a1e5e0ddcdc1e3fa8e10a7a7
SHA5124fc323fd0aa80bbdaa85d7c37032ed92b54817f55a07976b9a45eb65e77cdd80cab98c34fd38b9c2f3a9cadbf878396bf9ce196b2f9168cbebf4a9107e191f26
-
Filesize
9B
MD5db64fea40b8b0f0d620ef2ecc6eadbca
SHA151736590bfbfbac961899ddcc9be998bfeabd3d5
SHA256946d3f6b9ecc2fa53895526caf79e41850ad594f22a240d93f8bb7eb286d70f8
SHA512b70e24f5930090ac0c9a584f3810d41af8de5562c6b78f6979ea97c929edc18d57bedb9af335d19307aa0db00004aa5a4e553f24ac884365d8bd899d6f3258c0