Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe
Resource
win10v2004-20240426-en
General
-
Target
4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe
-
Size
3.3MB
-
MD5
72e94033935d7b6ce7b1d2190107ed2e
-
SHA1
c17424fb40471c9aff36885de13a755c982428a8
-
SHA256
4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809
-
SHA512
2f08db004e1a371f765ae381a447dd84df7ce63b7b74fbc0404a966ae9dded42c0466ed3630a94d7ac0ddaf0e1978b851062c0db8f58a90080d90ec360d0bae2
-
SSDEEP
49152:K7DB4v9WjlLe4U/YJ6J0dO0r2AJB0yYy20QYTu5dPkLoJjqsb:LAjlc/+J+Hy2/+LoJjqsb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2500 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1332 Logo1_.exe 2012 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe -
Loads dropped DLL 1 IoCs
pid Process 2500 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe File created C:\Windows\Logo1_.exe 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe 1332 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2500 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 28 PID 1028 wrote to memory of 2500 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 28 PID 1028 wrote to memory of 2500 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 28 PID 1028 wrote to memory of 2500 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 28 PID 1028 wrote to memory of 1332 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 29 PID 1028 wrote to memory of 1332 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 29 PID 1028 wrote to memory of 1332 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 29 PID 1028 wrote to memory of 1332 1028 4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe 29 PID 1332 wrote to memory of 2984 1332 Logo1_.exe 31 PID 1332 wrote to memory of 2984 1332 Logo1_.exe 31 PID 1332 wrote to memory of 2984 1332 Logo1_.exe 31 PID 1332 wrote to memory of 2984 1332 Logo1_.exe 31 PID 2500 wrote to memory of 2012 2500 cmd.exe 33 PID 2500 wrote to memory of 2012 2500 cmd.exe 33 PID 2500 wrote to memory of 2012 2500 cmd.exe 33 PID 2500 wrote to memory of 2012 2500 cmd.exe 33 PID 2984 wrote to memory of 892 2984 net.exe 34 PID 2984 wrote to memory of 892 2984 net.exe 34 PID 2984 wrote to memory of 892 2984 net.exe 34 PID 2984 wrote to memory of 892 2984 net.exe 34 PID 1332 wrote to memory of 1152 1332 Logo1_.exe 20 PID 1332 wrote to memory of 1152 1332 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe"C:\Users\Admin\AppData\Local\Temp\4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1017.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe"C:\Users\Admin\AppData\Local\Temp\4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe"4⤵
- Executes dropped EXE
PID:2012
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:892
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5cc1433855d3007b8e23db2928fab3e8b
SHA1b5bfab4aa8291161fb06da630817341d93cccd6a
SHA256322e7846f65b2bf5b6a1df6d589c7a90d04407fa996fd1aa6af7f231f332356e
SHA5126fc0f2b100380d8d8c3ace949c9804bdebef60353c803ed8b38b381c8533d598fc91f14cdfd24c30cc0a349e5549b9d34bc585758d6fcfa055242bb2c4d2b3b1
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5e531da64e67ecace9de3631487887034
SHA106739f824282a0045218ab8c3314de852b6f8828
SHA256fd78ffefef8ed5cdd868c88fb59cf3add358d98156b5073be5294dc75158724a
SHA51264be97c6e4c1fa404cfca061e5e359550155c43d8a361364e0abc76f98fe0354b5f36ab5f38eb6a6c39ce59070cbe3ae70d8dbb72d9cf34e0362346518200ff1
-
C:\Users\Admin\AppData\Local\Temp\4bcdc4e3a856f0aeb4f534bd3b4479093f0f5d48b9b7bb6586bb7fe812110809.exe.exe
Filesize3.2MB
MD5f1d5dce7d8808faf2786f67b0e4e27a7
SHA1c4490c7c7f466b4fec8c189aced3ab05e802cb86
SHA256ae884bb5579cc1fc931d487e2b8440b99ca435b835595586052fd8de8c84411c
SHA51216f3db169a764d8d5db497840d6cfb69e9186b4e354e223259eef0f13a61bc5472d934526e7a00f2fb1c5b8ca5185f9284ce573856c637cfbcb3f443ffda5843
-
Filesize
26KB
MD58c1c53a89dbd4ed410752c8373d31d4d
SHA1fffbcec8de5833946ef316bd404bac3f431a8200
SHA25680f1db329507dc01cc19447634fd21e12779dcdf37e32c9b6d0e35fc2ff80f82
SHA5124b42cd180f301a85d667bd02114ef4e3440df85241061e405fe4c7a481a8e90d675392e4597e505e176acecd1046aef8c8bf831092f4ab8f0d38836488cf0af9
-
Filesize
9B
MD5e850d9ceb7ebcc619d731dc2f1377b2b
SHA1a45553c9057075c02e28f90d5e8ea57a0dddbacc
SHA256b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c
SHA512be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c