Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe
Resource
win10v2004-20240426-en
General
-
Target
f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe
-
Size
225KB
-
MD5
6a7a9f0505627a23ec200dcef08fbce4
-
SHA1
33bd9f20743cbd4ae605fef345e707e2b80690de
-
SHA256
f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c
-
SHA512
52b6eda76610dbd82724f7aef7cd897b5ec3d7d3c8fa75e738b94eb5d17b9b43f0da147343bdc4943bd405d94d1901abce2a10233f00e17db60519839be9aa54
-
SSDEEP
3072:vkF3pkdeKzC/lzMPySe8DnpeIPipoHbKvXWXz9LRnsaJUS+6wPXD3fxNW7gq5yGP:8FpkdeKzC/leySe8AIqpoHbnDns1ND9m
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2144 Logo1_.exe 2660 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe -
Loads dropped DLL 1 IoCs
pid Process 2744 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OneNote.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ie\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File created C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe File created C:\Windows\Logo1_.exe f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2744 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 28 PID 1560 wrote to memory of 2744 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 28 PID 1560 wrote to memory of 2744 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 28 PID 1560 wrote to memory of 2744 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 28 PID 1560 wrote to memory of 2144 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 29 PID 1560 wrote to memory of 2144 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 29 PID 1560 wrote to memory of 2144 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 29 PID 1560 wrote to memory of 2144 1560 f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe 29 PID 2144 wrote to memory of 2700 2144 Logo1_.exe 31 PID 2144 wrote to memory of 2700 2144 Logo1_.exe 31 PID 2144 wrote to memory of 2700 2144 Logo1_.exe 31 PID 2144 wrote to memory of 2700 2144 Logo1_.exe 31 PID 2700 wrote to memory of 2600 2700 net.exe 33 PID 2700 wrote to memory of 2600 2700 net.exe 33 PID 2700 wrote to memory of 2600 2700 net.exe 33 PID 2700 wrote to memory of 2600 2700 net.exe 33 PID 2744 wrote to memory of 2660 2744 cmd.exe 34 PID 2744 wrote to memory of 2660 2744 cmd.exe 34 PID 2744 wrote to memory of 2660 2744 cmd.exe 34 PID 2744 wrote to memory of 2660 2744 cmd.exe 34 PID 2144 wrote to memory of 1180 2144 Logo1_.exe 21 PID 2144 wrote to memory of 1180 2144 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe"C:\Users\Admin\AppData\Local\Temp\f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a273F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe"C:\Users\Admin\AppData\Local\Temp\f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe"4⤵
- Executes dropped EXE
PID:2660
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2600
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD526a626193179f515a263e58cfe558508
SHA13f4bec627b4edc797eb9dc39115639295df35b94
SHA256cca607bbedf250f3c7edef7a37a7d53e8e05a1f6c981123c1f453bea7aa7f4c7
SHA512467d04376d69a2418d672863095ccfc2d1acf5f66aca928dd7926d6dbba3ce590ce8bd467550b044732b75a50bd0aecbf229a00097948dd61afc7e6f835f888b
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5f52c18b8b9f5974a7c0cb1aad6b69595
SHA149a16d2d1ae09777f0e3a54c787dbe9ef02d8185
SHA256aabbcb3d0ea0d22329efe930ed6829df5fa2ceff96a0fba2781060f88e768d69
SHA512085c0b28fb6d15e0ccd73a902d5bf541e28ad2dc7ca157fc305826d1672ed4a23c008530d89a9e89a42bb0c0dce21d649e678bd9996d793c5571d04225e50dad
-
C:\Users\Admin\AppData\Local\Temp\f0a190d7ded58116b3652252f74be7ffb36cd1088e814b02723132941c7a7f8c.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
27KB
MD5901d82d961ed3a34e4657d6d3d74390b
SHA1282da59e8370a00efd2f729bb69b1fe5790aa1dd
SHA2567d3ac72858b0022e7f5b4424dddc2050d49dc346b3c734ab79ae24c303198069
SHA512c80edadc865173a0bb846eed2e63ae571b5539f36c8bdbf424cca902c6d80e12afa68085247f6f6935de458f73af32bd7aa9a778939f9bb346f8f4975c1f2be5
-
Filesize
8B
MD502e4d47cbb9cf2affe1a6d96af753a42
SHA1fe76259bc3376a8aa287867933c6bfd7fdae1944
SHA2568079d35a07b892f00cdffeed754377382353a6e5870c06c02dc8dbaf809d291a
SHA512cc47f23bb8b014458285ee912566350c0d09c49d9e40666790694b4d4d7961abbf7adcf9d54e78571a3b97d27a05c58f3db3fdaaa3f4221130a248ed780a1746