Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe
Resource
win10v2004-20240508-en
General
-
Target
74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe
-
Size
959KB
-
MD5
146810b199458656819a822968da3de1
-
SHA1
2994cb739dd9ef2e483cb758585ed1b2d8d3d931
-
SHA256
74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092
-
SHA512
562d43770cc00b04bfdd7316b4e29a145688d2a59c0921cf8a252e4599db59caa5b9ac445ef04107ff7458045f0c9c98f4c1c523fc73d0560087ead56b2a60ab
-
SSDEEP
12288:rRKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:0BpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2812 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2080 Logo1_.exe 2340 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe -
Loads dropped DLL 2 IoCs
pid Process 2812 cmd.exe 2812 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe File created C:\Windows\Logo1_.exe 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2340 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2340 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe Token: 35 2340 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2812 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 28 PID 3012 wrote to memory of 2812 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 28 PID 3012 wrote to memory of 2812 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 28 PID 3012 wrote to memory of 2812 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 28 PID 3012 wrote to memory of 2080 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 29 PID 3012 wrote to memory of 2080 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 29 PID 3012 wrote to memory of 2080 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 29 PID 3012 wrote to memory of 2080 3012 74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe 29 PID 2080 wrote to memory of 2672 2080 Logo1_.exe 31 PID 2080 wrote to memory of 2672 2080 Logo1_.exe 31 PID 2080 wrote to memory of 2672 2080 Logo1_.exe 31 PID 2080 wrote to memory of 2672 2080 Logo1_.exe 31 PID 2812 wrote to memory of 2340 2812 cmd.exe 34 PID 2812 wrote to memory of 2340 2812 cmd.exe 34 PID 2812 wrote to memory of 2340 2812 cmd.exe 34 PID 2812 wrote to memory of 2340 2812 cmd.exe 34 PID 2672 wrote to memory of 2468 2672 net.exe 33 PID 2672 wrote to memory of 2468 2672 net.exe 33 PID 2672 wrote to memory of 2468 2672 net.exe 33 PID 2672 wrote to memory of 2468 2672 net.exe 33 PID 2080 wrote to memory of 1152 2080 Logo1_.exe 20 PID 2080 wrote to memory of 1152 2080 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe"C:\Users\Admin\AppData\Local\Temp\74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a13CF.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe"C:\Users\Admin\AppData\Local\Temp\74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2468
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5f47bd89838b4a02cde7d647675c85ce7
SHA1dbb732a83dc463475d840a3644e1307624285137
SHA256c97ecc622176cfe7438bd921d847509cb1863433f81df8a5c2119ca5f43dc1d8
SHA512f95c53762a3788d93a55c2edef1380b7a85d832d0077eb6b2b7432d08a0990050c58d3f9f425030cbfce4b1b97cc86dc3bfef78dbfc876bb1f4fa19419e63300
-
Filesize
474KB
MD58916a72b93d5fd4c6e63c8b36279b230
SHA183e3b1bfd579fbf998b2db5428819a10b25d0ad5
SHA256537975086833d580dd97beff9e712f64cc41d0bf20cac16c1a04be24ed3af27b
SHA5122c61138cc8800649890179c080c228da22ab9fe27f3fc1a83c52f57b349a5d3c61fc9d4a64ab53e362376f63edf99d30f0994b6070f97d09ec4868efaf8293b4
-
Filesize
722B
MD5aa7024501866a4d3de23c4b2239b7f2f
SHA17f11011995a189821f8b252ec4e4be53312e362e
SHA2569bb275071d04379c34af5238cb8c2b09a9db862b5014482163525cc46f7beaaf
SHA5122c544aa9598e758a21da87a19f2eeb0be25a32f14bbfd40bd29ca61ad5a800392b49424f313a17bb81961f5e01e9e764a8c30fe7c570c09135d1f6239b4be49d
-
C:\Users\Admin\AppData\Local\Temp\74b20aecabf9325c103d50df30cec48b25f338a731194edf76e651a687cf5092.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
29KB
MD53f5e7c4706e29143aea9c7ce1c0402e9
SHA16fa71c0ae1ea0701d9d7e0caabc266a0c33df54d
SHA2562026a2e28503076f0c685503fff901cbe7120170ade846ad76be13362afe770c
SHA5120199af2ac24604e012003e72cf5bad24a1949a92d2028f39a2400cb109c367f70e1a9779d48b982c70a5f90a542b598fae694360c9caf1b0eec21dd0ed625deb
-
Filesize
9B
MD57e956ef5a6a8d81e557bd13665d22b60
SHA17f7b593a466647d21bf3d554bf1cd4cdead3dee5
SHA25667b987784bfbcfae36a56382dc0e3e7b6254efdccb5cebe31739a398a39c3590
SHA512bf7a5439f4ccca6aa98e658aceb05ea68fc7ce646461f356b57b9edd318c1b0ddea2e8513dd062d750bd67ed810233782d478baa9217e40ad53ab82d43350d63