Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
Resource
win10v2004-20240426-en
General
-
Target
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
-
Size
9.8MB
-
MD5
ac14f6389b30d5f8f6e3acd47092eacb
-
SHA1
e7b7ec612e57d02147a42f53ff2700c231612d3a
-
SHA256
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1
-
SHA512
af46bc2ce1a82f2279aff3fc719f5918579bc0b315650d42f20492d5e978650179b716aa3b09e5e155dc5db13f5dfeb6734f8237894adf620efab22f2dfcaf9f
-
SSDEEP
98304:edQ1FMcEk1UmK4ynHw8QF5gKQFUUK3Zm4boQyfqgDBk3p96zbrYLHj0yn0KN/zy4:KuN1UmlYHw8s5YWUYboQ+B0/0KN/zy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2528 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2568 Logo1_.exe 2276 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe -
Loads dropped DLL 2 IoCs
pid Process 2528 cmd.exe 2528 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe File created C:\Windows\Logo1_.exe a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe 2568 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2528 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 28 PID 1548 wrote to memory of 2528 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 28 PID 1548 wrote to memory of 2528 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 28 PID 1548 wrote to memory of 2528 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 28 PID 1548 wrote to memory of 2568 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 30 PID 1548 wrote to memory of 2568 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 30 PID 1548 wrote to memory of 2568 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 30 PID 1548 wrote to memory of 2568 1548 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 30 PID 2568 wrote to memory of 2544 2568 Logo1_.exe 31 PID 2568 wrote to memory of 2544 2568 Logo1_.exe 31 PID 2568 wrote to memory of 2544 2568 Logo1_.exe 31 PID 2568 wrote to memory of 2544 2568 Logo1_.exe 31 PID 2528 wrote to memory of 2276 2528 cmd.exe 33 PID 2528 wrote to memory of 2276 2528 cmd.exe 33 PID 2528 wrote to memory of 2276 2528 cmd.exe 33 PID 2528 wrote to memory of 2276 2528 cmd.exe 33 PID 2544 wrote to memory of 2104 2544 net.exe 34 PID 2544 wrote to memory of 2104 2544 net.exe 34 PID 2544 wrote to memory of 2104 2544 net.exe 34 PID 2544 wrote to memory of 2104 2544 net.exe 34 PID 2568 wrote to memory of 1200 2568 Logo1_.exe 21 PID 2568 wrote to memory of 1200 2568 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7F1F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"4⤵
- Executes dropped EXE
PID:2276
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5f47bd89838b4a02cde7d647675c85ce7
SHA1dbb732a83dc463475d840a3644e1307624285137
SHA256c97ecc622176cfe7438bd921d847509cb1863433f81df8a5c2119ca5f43dc1d8
SHA512f95c53762a3788d93a55c2edef1380b7a85d832d0077eb6b2b7432d08a0990050c58d3f9f425030cbfce4b1b97cc86dc3bfef78dbfc876bb1f4fa19419e63300
-
Filesize
474KB
MD58916a72b93d5fd4c6e63c8b36279b230
SHA183e3b1bfd579fbf998b2db5428819a10b25d0ad5
SHA256537975086833d580dd97beff9e712f64cc41d0bf20cac16c1a04be24ed3af27b
SHA5122c61138cc8800649890179c080c228da22ab9fe27f3fc1a83c52f57b349a5d3c61fc9d4a64ab53e362376f63edf99d30f0994b6070f97d09ec4868efaf8293b4
-
Filesize
722B
MD5349f4f6b8c7ec76de60f9ee3c9844b88
SHA15cefcbe194173824ca8ee8eea800065dbac60903
SHA2568f55958b67c97bdcc564631d4a7001ecaa91904d31b2ca4a46bc9b658bc6f759
SHA5123053d1fcf6987a456666f10acc2c90b06a80c1a7c40c8a0b58c5af40bd2a85701b22473d3a634fec492246766c0fdcc9a6e70415922827e9672d3c46114ff9ee
-
C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
Filesize9.8MB
MD5cae528636bf78cd4c35a455a120a540d
SHA1cf3238393814b1764a866d14e76b0d63152aae67
SHA2568c5c9105cf270597a16f8b0b78bd6158d68910598617f01118f80768a36bd79e
SHA5128e3faeccf3b4942ac877f77c14ef1686e9fc90cf01972a86e2607c044bda5c0bd660fe4848bebe42b52edc259a03400dc611f4ea59a0fd01ada618d2857da745
-
Filesize
29KB
MD53f5e7c4706e29143aea9c7ce1c0402e9
SHA16fa71c0ae1ea0701d9d7e0caabc266a0c33df54d
SHA2562026a2e28503076f0c685503fff901cbe7120170ade846ad76be13362afe770c
SHA5120199af2ac24604e012003e72cf5bad24a1949a92d2028f39a2400cb109c367f70e1a9779d48b982c70a5f90a542b598fae694360c9caf1b0eec21dd0ed625deb
-
Filesize
9B
MD57e956ef5a6a8d81e557bd13665d22b60
SHA17f7b593a466647d21bf3d554bf1cd4cdead3dee5
SHA25667b987784bfbcfae36a56382dc0e3e7b6254efdccb5cebe31739a398a39c3590
SHA512bf7a5439f4ccca6aa98e658aceb05ea68fc7ce646461f356b57b9edd318c1b0ddea2e8513dd062d750bd67ed810233782d478baa9217e40ad53ab82d43350d63