Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe
Resource
win10v2004-20240426-en
General
-
Target
5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe
-
Size
88KB
-
MD5
c50d49d7472a7b066faa35b4b564b531
-
SHA1
5a8e458d39ad139955a62663fac241e23754c3d7
-
SHA256
5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69
-
SHA512
5002651fee6e798bc2fc6ce46505cd73fb5c1996c63064ceba53ea2cb07e8f6298ff3d06e4708cdfa6618b0a23e2384d9de67350acdcc97de4fd094e00491b82
-
SSDEEP
1536:pnj3SHuJV9Ntyapmebn4ddJZeY86iLflLJYEIs67rxo:pnjkuJVL8LK4ddJMY86ipmns6S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 Logo1_.exe 2740 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLSTART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe File created C:\Windows\Logo1_.exe 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3044 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 28 PID 2424 wrote to memory of 3044 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 28 PID 2424 wrote to memory of 3044 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 28 PID 2424 wrote to memory of 3044 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 28 PID 2424 wrote to memory of 3028 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 29 PID 2424 wrote to memory of 3028 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 29 PID 2424 wrote to memory of 3028 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 29 PID 2424 wrote to memory of 3028 2424 5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe 29 PID 3044 wrote to memory of 2740 3044 cmd.exe 31 PID 3044 wrote to memory of 2740 3044 cmd.exe 31 PID 3044 wrote to memory of 2740 3044 cmd.exe 31 PID 3044 wrote to memory of 2740 3044 cmd.exe 31 PID 3028 wrote to memory of 2704 3028 Logo1_.exe 32 PID 3028 wrote to memory of 2704 3028 Logo1_.exe 32 PID 3028 wrote to memory of 2704 3028 Logo1_.exe 32 PID 3028 wrote to memory of 2704 3028 Logo1_.exe 32 PID 2704 wrote to memory of 2776 2704 net.exe 34 PID 2704 wrote to memory of 2776 2704 net.exe 34 PID 2704 wrote to memory of 2776 2704 net.exe 34 PID 2704 wrote to memory of 2776 2704 net.exe 34 PID 3028 wrote to memory of 1192 3028 Logo1_.exe 21 PID 3028 wrote to memory of 1192 3028 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe"C:\Users\Admin\AppData\Local\Temp\5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a53E.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe"C:\Users\Admin\AppData\Local\Temp\5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe"4⤵
- Executes dropped EXE
PID:2740
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2776
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD5e85807cbaf1c00d5c04e60d82117ed94
SHA12e586d30d725be909a6f4de38b582fc0bfe57c01
SHA256eb0caf5692f857aadb09867f6526b1dd6f02c9980ccb8d7d58e09342c87fdda9
SHA512af0d2fce26f6ddbf90d3a3359a9ac6740e4d9c830d65137914c3b85f68f9ae390f4454c90ed8fc5210a3c7ac45690d50690379996b5befa61a5853f93d041495
-
Filesize
721B
MD5eb3b347146bbe08b92e76e5ec03df9fa
SHA163ba7aff618016ee4436113fcc1dd8f7a6bd94a2
SHA2565467b322e1bddf9856b2f76125b7151ba014d3e9efcbcff98dfd63bae941dd32
SHA512ff114a812ffed403d9235c1797c2e86975c873c207780cdb3040837d3f6b1ebfd1f95b327e7d7aaa59efc8167dcb52ffda1373e51940c849de0ae0071a2972aa
-
C:\Users\Admin\AppData\Local\Temp\5ea8afd442058f906a2ddbc6e9ea99a7891f0d12bafa57f6acdbbc3bd5a27d69.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
29KB
MD55116475868108a57bc0b9f4cef3f978c
SHA1ad6fcea28635ecb476fe35d383519945c0e1bbd9
SHA256edd1ac8cbb63c59bdb356c027a1b24c771a90a8a9a802ccd1e4d09ffb249deab
SHA512e6d1ef7b9f39c02cae86324fc5ac24a133a32bb51c51a663a88f40ef472d8523819fe413ab52d624b23090a65107259d0ef9aac7032db16086173c9fbf720e52
-
Filesize
9B
MD59d187c446579e70f430c5bb5556efc0c
SHA10379a56b3d4a9e75d426a088cd523d01929186b2
SHA256544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA5126844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc