Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe
Resource
win10v2004-20240508-en
General
-
Target
6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe
-
Size
351KB
-
MD5
dac4763c898fd5282fecc9998ecddd37
-
SHA1
1cdb2709f555f1817803accc44a301bf270b0488
-
SHA256
6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff
-
SHA512
ab33bae8da117c8692a26f4b4d4bc06b219cbd88aa8a5953f5123fbed460965312da201e99da6ce30510f7152ef94e7a2f15574479aaaeaf96f0df53626e07d9
-
SSDEEP
6144:RVfjmNHLaYr322l59AQg43SmgopSdN19lnwnl1eDbF4r3UVzhpSM+Ab:H7+rp7Dlxg43pZpSdN1DnhMmP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2116 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1784 Logo1_.exe 2556 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 1224 Explorer.EXE -
Loads dropped DLL 2 IoCs
pid Process 2116 cmd.exe 2116 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe File created C:\Windows\Logo1_.exe 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2116 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 28 PID 1928 wrote to memory of 2116 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 28 PID 1928 wrote to memory of 2116 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 28 PID 1928 wrote to memory of 2116 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 28 PID 1928 wrote to memory of 1784 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 29 PID 1928 wrote to memory of 1784 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 29 PID 1928 wrote to memory of 1784 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 29 PID 1928 wrote to memory of 1784 1928 6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe 29 PID 1784 wrote to memory of 2456 1784 Logo1_.exe 31 PID 1784 wrote to memory of 2456 1784 Logo1_.exe 31 PID 1784 wrote to memory of 2456 1784 Logo1_.exe 31 PID 1784 wrote to memory of 2456 1784 Logo1_.exe 31 PID 2116 wrote to memory of 2556 2116 cmd.exe 33 PID 2116 wrote to memory of 2556 2116 cmd.exe 33 PID 2116 wrote to memory of 2556 2116 cmd.exe 33 PID 2116 wrote to memory of 2556 2116 cmd.exe 33 PID 2456 wrote to memory of 2640 2456 net.exe 34 PID 2456 wrote to memory of 2640 2456 net.exe 34 PID 2456 wrote to memory of 2640 2456 net.exe 34 PID 2456 wrote to memory of 2640 2456 net.exe 34 PID 1784 wrote to memory of 1224 1784 Logo1_.exe 21 PID 1784 wrote to memory of 1224 1784 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe"C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8E6A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe"C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2556
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2640
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f758412d4d512e83f6eab9298c7d3ac2
SHA1e5ea679437c050335e20a340c40708a4e0f626c3
SHA2564b72a3e0507c863a389953f9302224366dd02b613f6a55ba9227e788cd62657b
SHA512b402189dc8b890319ed964b80e803a8aa36ae7a71ff1f4ef71361a1aeef7ca104dcaf1a1d2c6eb514326258efdb1016815c29c213e683e5b3006ee709b9bc957
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD57cd4aebfe9e1335ae920652f4922113f
SHA14a6ff1b8f0f8f787e64ae55ae32d58d5ff548fae
SHA2568cb63ace8b57337e65a38b3b309fa42a1b2dc8c42ac83422629ec5d382630eff
SHA512c8eee2bf196578190c79e9df3ca90d366de1dd8a3bc9e6b9fe38c968e23a7d1b0a1b9a087bbad22eeef7a6fcd3dec7bddca4f284e6226fc41b27d4d84e0bc8f8
-
C:\Users\Admin\AppData\Local\Temp\6b585e01dd37f2db95b79fd325146b277f7ed9076bd091fd670c6a84843c67ff.exe.exe
Filesize325KB
MD521bd4a81bc196a75988f6b8b50da9272
SHA1084c8609498c812013c58473d6a96193710f17c0
SHA25606734649b094dcc478cdf0c338f5c24dc848ab691213e0b6c97c4eb9d3a63d68
SHA51203f2a6de07bac12271df5d4e3a399d778b217ba0a329b96b8b006dcdf49a709eb2af38308c6d6e372cdf96e4335a3a9a0a1e84882475ec69ab6ae1aa5c0d007c
-
Filesize
26KB
MD5f9f56fe5c4eb559d6fd0af4394cc6ae7
SHA1591caed457d59d3c6a331bc895261ee2beabfe61
SHA256a11c5a8073eeef47bdda8ea9ba729e0145ee9be573a4a7c3cbb7e98b58b345ab
SHA51223ec7e4bcb874442aed60e734c8ea749564ddd2e7cb61799f3a658194545be874d082ca21e71d4370c17de9fd7ce9f74b4d0477982c158230e418d7a6ee3298a
-
Filesize
9B
MD5917c6bf65db2dfa12e70e5aa6a061a01
SHA1bd0d9f217fd74efd784ad4a1b41f330b36e64edf
SHA2568ad43ce062fe590809844ebdf64f2eb0f7d32357c89baac5640ff132dfcfdd19
SHA51221a71205a9abfafcf7fef2a1697ae78a6fe14591bef85f86137d5355b5d40e1b8ca810e351256e0dc2973677e9b4452014126d3e5e81b0c3f1fcbd1a087481cb