Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe
Resource
win10v2004-20240426-en
General
-
Target
b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe
-
Size
66KB
-
MD5
b6035ab767a750f410570e15e1aca36f
-
SHA1
0020882553aac04af5e45393c06f32a69f914cd9
-
SHA256
b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986
-
SHA512
034113c8e2355a047c58a1794caebd57c179926a14e64e54dbbc00124a5697be6335afed685fc3a02a6749d3ba1e5f99842769e542d37195e7cc060a0a4b23ca
-
SSDEEP
1536:p9H3SHuJV9NBriw+d9bHrkT5gUHz7FxtJ:plkuJVLBrBkfkT5xHzD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2328 Logo1_.exe 1976 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe File created C:\Windows\Logo1_.exe b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe 2328 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2212 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 28 PID 2300 wrote to memory of 2212 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 28 PID 2300 wrote to memory of 2212 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 28 PID 2300 wrote to memory of 2212 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 28 PID 2300 wrote to memory of 2328 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 30 PID 2300 wrote to memory of 2328 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 30 PID 2300 wrote to memory of 2328 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 30 PID 2300 wrote to memory of 2328 2300 b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe 30 PID 2328 wrote to memory of 2984 2328 Logo1_.exe 31 PID 2328 wrote to memory of 2984 2328 Logo1_.exe 31 PID 2328 wrote to memory of 2984 2328 Logo1_.exe 31 PID 2328 wrote to memory of 2984 2328 Logo1_.exe 31 PID 2212 wrote to memory of 1976 2212 cmd.exe 33 PID 2212 wrote to memory of 1976 2212 cmd.exe 33 PID 2212 wrote to memory of 1976 2212 cmd.exe 33 PID 2212 wrote to memory of 1976 2212 cmd.exe 33 PID 2984 wrote to memory of 2640 2984 net.exe 34 PID 2984 wrote to memory of 2640 2984 net.exe 34 PID 2984 wrote to memory of 2640 2984 net.exe 34 PID 2984 wrote to memory of 2640 2984 net.exe 34 PID 2328 wrote to memory of 1196 2328 Logo1_.exe 21 PID 2328 wrote to memory of 1196 2328 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe"C:\Users\Admin\AppData\Local\Temp\b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1A64.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe"C:\Users\Admin\AppData\Local\Temp\b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe"4⤵
- Executes dropped EXE
PID:1976
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2640
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5d69c1bd8b853d4bca99cf06543f37975
SHA118ac2586187cd811d3f507d65aa3c82e162078fb
SHA256fd6c923086cc16dede115c0cd3bac9dfd2ef10c599d264d0c3f2f60814371c97
SHA5127efe98bcea84259bb1725634032130f98f9608c09adf40d4172b4470ddf88de75fb4f5d5a7afb7335ad79add028e72444f2ebe7edf2ced4e62b888a3a8c71ed6
-
Filesize
474KB
MD51ca79e3c2539763b0aaac5de49795afe
SHA12d240aef9a2cce22578f42ebecd3058e37a404a8
SHA256e3e49eceb810b34fc826d70c6556d927a363f29c90b347ee4cfd61d7ba3ff2d9
SHA5124e24d3ebcefa6545d85517bbc5bff3285f85a5967da1642a6e4e53bc2c41efc8b9092a3bbb56c1670b215d623ff5c320bcb06f654ac97482a5dff0da208349e6
-
Filesize
722B
MD5ac694005013d53c7a15518d4944c61aa
SHA15de13072bac3df8b701a194d428c54050b6c4a3a
SHA2564e551d28c4b9f513c823b20dc81fb333c10e9f00b2c23da6b6165f426e132b47
SHA512409080bba92f4c7198d53baafc7580cf85adb77ed6e1a507110f4cf67ea25acdc985f4069c1822b48e5a85058780f6e78e03b846f6f4345bb442b6ac4ec0755f
-
C:\Users\Admin\AppData\Local\Temp\b1235a6f6ae28d9a4d0b0b121ae32e66066e0ee3f429f0f3dadb2f082fe9c986.exe.exe
Filesize36KB
MD59f498971cbe636662f3d210747d619e1
SHA144b8e2732fa1e2f204fc70eaa1cb406616250085
SHA2568adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93
-
Filesize
29KB
MD5936348d6d0687d8084404acdbf12ff7b
SHA14cd7c374860506b5f4b957eaa326258a8b921ab8
SHA256c20c8daf0f87f2789e602c119b0b6f6db784f5ee36c65d349ac3b8cec6dcede9
SHA512d0230ed5429e28ed6c49db6baa13a5dee2afa3c76b092e10de38aaba65acb5203aa79656ff7751060f4d8c1efd7e5900bb1d98ee62dd1b1bfd472673bebd9eac
-
Filesize
8B
MD59bf5ad0e8bbf0ba1630c244358e5c6dd
SHA125918532222a7063195beeb76980b6ec9e59e19a
SHA256551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f
SHA5127fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3