Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe
Resource
win10v2004-20240426-en
General
-
Target
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe
-
Size
419KB
-
MD5
ae07471ce4038f0ee5493bbee70a791b
-
SHA1
f49b164e4d57174001a8fde8f552eec5b10957f8
-
SHA256
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8
-
SHA512
09a65329350cf9f21fe0e4eff436a7c3f254e391b1c44763ebf95d5073cf75b01e8ca23425d9437a08fe6f2391dcbdc8602214f0358fef84b4e84d0d25aa277e
-
SSDEEP
12288:+7+NnW3gaHC2zUM2WJoROZVXk8hbodzbTw8x0Cx+:+7AWx5k8hb0HTw+x
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2460 Logo1_.exe 2144 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe File created C:\Windows\Logo1_.exe afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe 2460 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2168 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 28 PID 3056 wrote to memory of 2168 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 28 PID 3056 wrote to memory of 2168 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 28 PID 3056 wrote to memory of 2168 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 28 PID 3056 wrote to memory of 2460 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 29 PID 3056 wrote to memory of 2460 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 29 PID 3056 wrote to memory of 2460 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 29 PID 3056 wrote to memory of 2460 3056 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 29 PID 2168 wrote to memory of 2144 2168 cmd.exe 31 PID 2168 wrote to memory of 2144 2168 cmd.exe 31 PID 2168 wrote to memory of 2144 2168 cmd.exe 31 PID 2168 wrote to memory of 2144 2168 cmd.exe 31 PID 2460 wrote to memory of 2640 2460 Logo1_.exe 32 PID 2460 wrote to memory of 2640 2460 Logo1_.exe 32 PID 2460 wrote to memory of 2640 2460 Logo1_.exe 32 PID 2460 wrote to memory of 2640 2460 Logo1_.exe 32 PID 2640 wrote to memory of 2796 2640 net.exe 34 PID 2640 wrote to memory of 2796 2640 net.exe 34 PID 2640 wrote to memory of 2796 2640 net.exe 34 PID 2640 wrote to memory of 2796 2640 net.exe 34 PID 2460 wrote to memory of 1196 2460 Logo1_.exe 21 PID 2460 wrote to memory of 1196 2460 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a252D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"4⤵
- Executes dropped EXE
PID:2144
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2796
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD554c5bafca47fd98082775cde150baca5
SHA1d690d232c9fe3c96c08b0c6f09f33247dbbfa24d
SHA25602a54f80ef13a162345855375dcbf2ad3d5fcbe40fbc39faa41442490b4e95dc
SHA512114df1cb4f212c607d6219ff576357231a7b7b5cb710a269de4dd8d6dca47ccf6962d6412e72c7cad255a41a0bab266d8bfc91cf4051574a29eb8d26993b916b
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD59f65978e7f7cc57c6cde0b47232e250c
SHA10e46a61368909989efa3f8b71ee258f3f5cd69e4
SHA256e49f68fded8e9dd15531393805b5d2ed8202ba4db0055b87e535a7690c3c5083
SHA5128564e56fe3ad430bc4d52f082a31a5bb7e22417d91cd02ed26d277b773dda08f987eda7c25673eb31f354d1130e4c98c764de1b6dc5fa3b83957340c45c521ea
-
C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe.exe
Filesize392KB
MD5ec3fd88c7b552c1e380b4819a6dbacf2
SHA1d1213f26e8fd6975a975b52e2677dc02a4a4d85e
SHA25614b33d10bb9ac0081d66137295ca0653665cc7299d5508bb08e7494e8ce5ab0a
SHA512edcd243df3429652c052c9a0d7dd57ee141d5743d2bf8f7d5bd0c6c9a27d40da6da39d6da2582837268276a2ed4133a37b84d998ecbc6a61bbe15b09148ee798
-
Filesize
26KB
MD5a0a0986d9acf60095b1f86eeb6c1e0bd
SHA1e90f018d99d4af17f0c3df0203db71c45d7a20d1
SHA256adade822b1c385b01ba5d19dfd6d3140a0951df0c572802cfbe34c4c5157203b
SHA5129ae080c368e1d1809a251bbf71efbcfc6678f67c55c8a230afc8fbbde82283e9b44411923cf4f76a79c07d99f6507e85d441e6b99a84fd8c8da134447e3caa85
-
Filesize
8B
MD59bf5ad0e8bbf0ba1630c244358e5c6dd
SHA125918532222a7063195beeb76980b6ec9e59e19a
SHA256551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f
SHA5127fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3