Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe
Resource
win10v2004-20240226-en
General
-
Target
99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe
-
Size
30KB
-
MD5
ba188039aa9bfcae77e14a78d6eeeebd
-
SHA1
7042ef3cf1869bab190d5daaa4de54fe9527d49f
-
SHA256
99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77
-
SHA512
3644cc7ae409612afe2aeb2aeb838fc09881c874a50617eaea99287fdaa77af9df43e61ee7bbd3f633d691686d46d631ffc41ffab4205d4ad65691cf9d8050f8
-
SSDEEP
768:A1ODKAaDMG8H92RwZNQSwz1/WRFcwujg09n3:SfgLdQAQfR/WRRuRN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1824 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe File created C:\Windows\Logo1_.exe 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe 1824 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2820 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 28 PID 2416 wrote to memory of 2820 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 28 PID 2416 wrote to memory of 2820 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 28 PID 2416 wrote to memory of 2820 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 28 PID 2416 wrote to memory of 1824 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 29 PID 2416 wrote to memory of 1824 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 29 PID 2416 wrote to memory of 1824 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 29 PID 2416 wrote to memory of 1824 2416 99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe 29 PID 1824 wrote to memory of 2744 1824 Logo1_.exe 31 PID 1824 wrote to memory of 2744 1824 Logo1_.exe 31 PID 1824 wrote to memory of 2744 1824 Logo1_.exe 31 PID 1824 wrote to memory of 2744 1824 Logo1_.exe 31 PID 2744 wrote to memory of 2300 2744 net.exe 33 PID 2744 wrote to memory of 2300 2744 net.exe 33 PID 2744 wrote to memory of 2300 2744 net.exe 33 PID 2744 wrote to memory of 2300 2744 net.exe 33 PID 1824 wrote to memory of 1188 1824 Logo1_.exe 21 PID 1824 wrote to memory of 1188 1824 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe"C:\Users\Admin\AppData\Local\Temp\99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1F15.bat3⤵
- Deletes itself
PID:2820
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2300
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
471KB
MD523badfb2cfea8ed0b62e1cf4e6901195
SHA191c2d39b8401c1a6768d81e1321f6d35317440ab
SHA256d8df5a52093d81bdd5ec1d1daddce338eaa8d714d73c9e9d5595ce546effa42f
SHA5121ac44eb7c5ae734146967af1f1e6635eabd393cd5d5c0c37724faaefea847331ee5174087865895e8afa9d2087a97d369e877ead908aa3f0a14339975f8dfde7
-
Filesize
722B
MD597a4df07a6666d55bb7f2f4646a0ce09
SHA1143187bf474f0c432e0b02f461eebd1247fed3ad
SHA256ba3a0d9dbce3818937a81d11dcb9f9634b47998ff3cb1ddb925ce730cef587c8
SHA51242cddf0960e2f09de403d721bcc2fa6ce4dd5e7a0b2a7caf766428a2f9ea40910c3c68779eb768eb85e8583d66dac390c7bc5a6ebc2f156c013b7d30d96de742
-
C:\Users\Admin\AppData\Local\Temp\99fd9702e5403bb06e8c9a95a60fa2484783355990ee4341bb42ac12131e7e77.exe.exe
Filesize4KB
MD599b96f7f497e9e216da4b7c9979810e5
SHA12c424f82747581db2b35673eb22ba321d573944b
SHA2567c3300179b3d9ab57042a5f026a69fac3b0e2e783e94853ff109a29d2d3f541b
SHA51290a0b888f474fa5505f39ca7575635a7ea839e4e23cf9d573c99d7b3b226036fb0b82e17900012aed9fe1c8b4985488e22df0421ad66dbff9d4fcf4be0455212
-
Filesize
26KB
MD582d57ca28fb9960aa11c257d642830b4
SHA11642ededc7cc1d6d3e851c126e2c853065c1a9f8
SHA25635655e6994dad8fa107d3892a0ee4bc4b6017cb907f69d30a1e11bf45c7f707f
SHA5125fee2d7ed18ea3d04f054c8ed63fd0dd5c0618445e87402adc86cf0d39158cd41d2e10d1d0bb8a48ffd97b4c5b7d02c05704c095eb1e9b29f62046e4ca3a22a1
-
Filesize
9B
MD54b2b75605a65a6762ec4715de0a70902
SHA13b85993ef06d2d814abc405188fdd19a1bffea0c
SHA25677072cc5a7b394508cf5d819ff8cf4385a9b3cb15d8715a59845ccfa235ea34e
SHA512888361e75afd4308bdad817af543704a42ffdf2d798acef619459e9978ac68f1cf4d468c6e0b146ab738b0109fdf331c4380471aa83f637b0f6ab06164840c65