Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe
Resource
win10v2004-20240426-en
General
-
Target
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe
-
Size
448KB
-
MD5
1a5cb516d1067544c27b5437c759de90
-
SHA1
2b01ae5852cdfb04c36ccba771c0d03cbd384a7d
-
SHA256
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c
-
SHA512
e385bb3395fc484d8dc86748b8ac721c2b6fd32cac7d23d8f58cb4186482fc3660e4d934a32d24922de120dd34641141d17c819b3554d0e04f63c328d77da52e
-
SSDEEP
6144:IVfjmNeI7O1dVeLjP1HMCnVGtwqkIDRRuuuRLaopCUXdEpfBm2/T3JQu0I:y7+e8OTVsjdBnYmGiVpD2fR/T3yI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1672 Logo1_.exe 2696 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 cmd.exe 3040 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe File created C:\Windows\Logo1_.exe c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe 1672 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3040 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 28 PID 2192 wrote to memory of 3040 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 28 PID 2192 wrote to memory of 3040 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 28 PID 2192 wrote to memory of 3040 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 28 PID 2192 wrote to memory of 1672 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 29 PID 2192 wrote to memory of 1672 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 29 PID 2192 wrote to memory of 1672 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 29 PID 2192 wrote to memory of 1672 2192 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 29 PID 1672 wrote to memory of 2568 1672 Logo1_.exe 31 PID 1672 wrote to memory of 2568 1672 Logo1_.exe 31 PID 1672 wrote to memory of 2568 1672 Logo1_.exe 31 PID 1672 wrote to memory of 2568 1672 Logo1_.exe 31 PID 3040 wrote to memory of 2696 3040 cmd.exe 33 PID 3040 wrote to memory of 2696 3040 cmd.exe 33 PID 3040 wrote to memory of 2696 3040 cmd.exe 33 PID 3040 wrote to memory of 2696 3040 cmd.exe 33 PID 2568 wrote to memory of 2436 2568 net.exe 34 PID 2568 wrote to memory of 2436 2568 net.exe 34 PID 2568 wrote to memory of 2436 2568 net.exe 34 PID 2568 wrote to memory of 2436 2568 net.exe 34 PID 1672 wrote to memory of 1088 1672 Logo1_.exe 18 PID 1672 wrote to memory of 1088 1672 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a16CB.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"4⤵
- Executes dropped EXE
PID:2696
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2436
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD529671a4fad613b8d982b993243965a37
SHA1a8f2f053b0b90ef9ee901a21f423c995bc21c736
SHA25682bd4e119f80b12ee895179ca25b7a5c0d835c9a66f574e8cfcd31a79776c168
SHA512f4485f95e3981c2ea8513ffe56916ba656c8bda9af452b5de1606c74d6b96dd0564af6b7251255f012654fadbac06bf03387bc7efe4e4b4de0e8d6736d5d5a49
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5201546f15bf2a8c6367a96f2ae5bfd46
SHA13714a296fe9d872d23793c118c952908d4afd74d
SHA256de61a4db6864b2b69532edc6381a3e5a35ec4cb48ad13c17e033fb2744e89a38
SHA512f665bf88f002b543fcc7f17ae3a63c0a0094a0d72f37e5e170dea1c7d576ea18ad519939b51f3b07e1eb5272df1c37bd26b9a24875455fa3927b0e5e6bddcc12
-
C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe.exe
Filesize422KB
MD5787867fe9d0b7eb804c120667c046f79
SHA1be17b9fd53527f6069ed4cfc7431f3ef3eb2a742
SHA25686b4bc327ad0e3bd5ee4fd927cdbee65ffccd75e84d8678f7802d54aa2cf8574
SHA512ee3f9594eb6fa03da41baa9f178177edf2eb4cfb60ffd11d26302dd0c07411680394b23837f08d97b10f39ffbb0ea1f3aa5909b6eabece083b49f943b8deb5bb
-
Filesize
26KB
MD549ed3e230aa53cf4655435949f8f50c9
SHA1d2a2f332fdadd62f660b214bb00eab359a641315
SHA256245a55e61c46ff6f144b44322f1cde9d6ca794cbc9649dfdaa4116862563af83
SHA51253c9d6b09f0d224983beff3d3988b007f6446f8309fe7bf21207b60c49064d0d41734712e59186203ca2bcd8ae3d12eefb613c4cac0e13a1ed0e2c44f3d6983f
-
Filesize
9B
MD5917c6bf65db2dfa12e70e5aa6a061a01
SHA1bd0d9f217fd74efd784ad4a1b41f330b36e64edf
SHA2568ad43ce062fe590809844ebdf64f2eb0f7d32357c89baac5640ff132dfcfdd19
SHA51221a71205a9abfafcf7fef2a1697ae78a6fe14591bef85f86137d5355b5d40e1b8ca810e351256e0dc2973677e9b4452014126d3e5e81b0c3f1fcbd1a087481cb