Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe
Resource
win10v2004-20240426-en
General
-
Target
e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe
-
Size
227KB
-
MD5
901e090fe2959e7eeab56a8f95556bfb
-
SHA1
ae99e68db72ff4ed4ac0958c0f8f343e6c37b544
-
SHA256
e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f
-
SHA512
37bdd169452732ed56705a9d465d57f1c72130d24627f6e7b0d882a79ea797cfb6a7540d144ddb105e54a53bb1fc97cc74395203dcc45ed49bd48d21b46f6d00
-
SSDEEP
6144:jCuJWdeKzC/leySe8AIqpoHbnDns1ND9m:i/VyV8hEoHbI3A
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2608 Logo1_.exe 2748 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLSTART\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe 2608 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2980 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 28 PID 1640 wrote to memory of 2980 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 28 PID 1640 wrote to memory of 2980 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 28 PID 1640 wrote to memory of 2980 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 28 PID 1640 wrote to memory of 2608 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 29 PID 1640 wrote to memory of 2608 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 29 PID 1640 wrote to memory of 2608 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 29 PID 1640 wrote to memory of 2608 1640 e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe 29 PID 2608 wrote to memory of 2692 2608 Logo1_.exe 31 PID 2608 wrote to memory of 2692 2608 Logo1_.exe 31 PID 2608 wrote to memory of 2692 2608 Logo1_.exe 31 PID 2608 wrote to memory of 2692 2608 Logo1_.exe 31 PID 2980 wrote to memory of 2748 2980 cmd.exe 33 PID 2980 wrote to memory of 2748 2980 cmd.exe 33 PID 2980 wrote to memory of 2748 2980 cmd.exe 33 PID 2980 wrote to memory of 2748 2980 cmd.exe 33 PID 2692 wrote to memory of 2560 2692 net.exe 34 PID 2692 wrote to memory of 2560 2692 net.exe 34 PID 2692 wrote to memory of 2560 2692 net.exe 34 PID 2692 wrote to memory of 2560 2692 net.exe 34 PID 2608 wrote to memory of 1124 2608 Logo1_.exe 20 PID 2608 wrote to memory of 1124 2608 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe"C:\Users\Admin\AppData\Local\Temp\e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB76.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe"C:\Users\Admin\AppData\Local\Temp\e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe"4⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2560
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD559b7aae3cb37d1edacd55159253dd510
SHA1ceabb6ffbb679732784c01f9d3631898546043a6
SHA25644ead1f1ed8b1136baf384c692ebd3547d6d7a9a2398dc32774f625ad3849dd9
SHA512d1679594a2f6417c01602781436b8766af5f7c470f500885e7bf74ec60e9006741aad5c164e3088a0785f3ff3b5d91ac91325c29e9d51b0abbbb24cdda6ea778
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
721B
MD5f30a52268d38ceec0fda914424081706
SHA127e88f722aa86030dda301f47503d365d0c5bf3c
SHA256fe1aa993f523eec3d596571a00ec2f4cebe6789e946f96827bccf0797bcb668b
SHA512d558edadb772d457ab13908a8fd80f1c3afd80bc90a3f0ad21bb60a758d9fbd965771735b87b4792e7013e4871ead139477cdad81fb175ebb1eefe1a458b1678
-
C:\Users\Admin\AppData\Local\Temp\e2400861056296c6113b59f1e628575a1641c386ac68d0de9a1035ac6cf7b22f.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
29KB
MD587e1376a8f4d0187c9cd966e5387fba6
SHA158bdbcb537922706c165607eaf003f2189bc99d3
SHA256f232f879c9a948f3a8697062e75ed55b0e34c10b4c9aa164f90a8a12e0816895
SHA51233219331ace9c8f8ab0a670c9a1f264dfe5e6b50443922d8dac485cd7dc4fd8b63321433c555d6484e038e04985656ce417b4b7a8ffbd8c43b2ad8a7c45dbff4
-
Filesize
9B
MD5917c6bf65db2dfa12e70e5aa6a061a01
SHA1bd0d9f217fd74efd784ad4a1b41f330b36e64edf
SHA2568ad43ce062fe590809844ebdf64f2eb0f7d32357c89baac5640ff132dfcfdd19
SHA51221a71205a9abfafcf7fef2a1697ae78a6fe14591bef85f86137d5355b5d40e1b8ca810e351256e0dc2973677e9b4452014126d3e5e81b0c3f1fcbd1a087481cb