Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe
Resource
win10v2004-20240508-en
General
-
Target
f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe
-
Size
1.4MB
-
MD5
5f1b08b90203ae6096cefb292497dbd8
-
SHA1
2af27bfac0881d689819a1eeae9fc59faa5b5e86
-
SHA256
f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b
-
SHA512
43d8269d3d82eb49316bcc5aaa4254ebe7e7a82852a9103f68cb34de953e9dea7b438ec226272682e45699906f4f53ba46f28c2f56008cf429c911cd3c57f022
-
SSDEEP
12288:1/JHKuRszP8SDIPT8FgswcC38AER32BF7gxX1i5FtdA8wfrk4s/CFoee7BwoVn5d:1/e78r8FfC3K32nUnCdAaKu++nO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2448 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2028 Logo1_.exe 2708 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 2516 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\WMPDMC.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5629EE71-1934-428C-A492-DBD2787497EC}\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Logo1_.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\Logo1_.exe f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2028 Logo1_.exe 2028 Logo1_.exe 2028 Logo1_.exe 2028 Logo1_.exe 2028 Logo1_.exe 2028 Logo1_.exe 2028 Logo1_.exe 2028 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2448 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 28 PID 1700 wrote to memory of 2448 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 28 PID 1700 wrote to memory of 2448 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 28 PID 1700 wrote to memory of 2448 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 28 PID 1700 wrote to memory of 2028 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 29 PID 1700 wrote to memory of 2028 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 29 PID 1700 wrote to memory of 2028 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 29 PID 1700 wrote to memory of 2028 1700 f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe 29 PID 2028 wrote to memory of 2136 2028 Logo1_.exe 31 PID 2028 wrote to memory of 2136 2028 Logo1_.exe 31 PID 2028 wrote to memory of 2136 2028 Logo1_.exe 31 PID 2028 wrote to memory of 2136 2028 Logo1_.exe 31 PID 2136 wrote to memory of 2636 2136 net.exe 33 PID 2136 wrote to memory of 2636 2136 net.exe 33 PID 2136 wrote to memory of 2636 2136 net.exe 33 PID 2136 wrote to memory of 2636 2136 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe"C:\Users\Admin\AppData\Local\Temp\f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1AD1.bat2⤵
- Deletes itself
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe"C:\Users\Admin\AppData\Local\Temp\f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe"3⤵
- Executes dropped EXE
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe"C:\Users\Admin\AppData\Local\Temp\f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe"3⤵
- Executes dropped EXE
PID:2516
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD52e962b06a537f9d816eb3d8aa4214d18
SHA1165b39dab3019fb9db6e6fd77349856c7a97af5b
SHA256aa17cb76ea3cd20e1c81ff47aa3e03d6487f946dd60898347f580a547479954a
SHA512b72049ed28a3c5035f09b4f77f8d4c1ebf48d36c430b4d9de6d750db99a2dfc2405ba59ef4b4088c2dc668005d7835b5c899ce649ad19e33c44946e137c515fa
-
C:\Users\Admin\AppData\Local\Temp\f3c908fcfa2458ee26330d428452d8de4bf8a155a8104bc2ead6d31cf670113b.exe.exe
Filesize1.3MB
MD58c8f836d800e90714a97bc03f6115bc6
SHA1fc67a3917c813d5ac8d7c2b051071111ed35c398
SHA2567157422d57f76d8fb5824c21c8a336748ff99bd8e84f683396d014d290a7c6c4
SHA512cc25ce20b0cc11401a5da1d6f22b4f3295ecdeaded8a564eb14117134f07e2e31e545bc036576360985eee39c44beb2a5e37376bf34b167718644208c86cff5b
-
Filesize
66KB
MD5bac152d659a8e5c8b297ee885a362ab7
SHA1e35922075011a55e96a69695645985ed2e4d7336
SHA256db778391e2816d919f43276cff95d64e544e28e8f4262a8722e9e904038af413
SHA512ec5a747cd6602130886b0c04638eac550a8dc287368ff3fba6b526bd83f4f678b8ebc3d6482a0282aba720af556df91ae986cccef36c5b77465c4f0003c9a150