Analysis
-
max time kernel
100s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe
Resource
win10v2004-20240226-en
General
-
Target
a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe
-
Size
713KB
-
MD5
fff23e5b02e96f3ab2cb974d19568311
-
SHA1
3372ec1be288a03be9cad2b7c9849759c128f30b
-
SHA256
a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863
-
SHA512
edfb29f1f5534d6a6aded8bc9630ca8b9570ed8bbe6ab9844f8b271b33d6878e779b1f37af00325aaa128f8f82ff2fc13aa5a56381dd13b900a43cc62a5548d9
-
SSDEEP
12288:bNfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:bFLOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1124 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2044 Logo1_.exe 2568 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 1372 Explorer.EXE -
Loads dropped DLL 3 IoCs
pid Process 1124 cmd.exe 1124 cmd.exe 1372 Explorer.EXE -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe File created C:\Windows\Logo1_.exe a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1124 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 28 PID 2364 wrote to memory of 1124 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 28 PID 2364 wrote to memory of 1124 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 28 PID 2364 wrote to memory of 1124 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 28 PID 2364 wrote to memory of 2044 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 29 PID 2364 wrote to memory of 2044 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 29 PID 2364 wrote to memory of 2044 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 29 PID 2364 wrote to memory of 2044 2364 a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe 29 PID 1124 wrote to memory of 2568 1124 cmd.exe 32 PID 1124 wrote to memory of 2568 1124 cmd.exe 32 PID 1124 wrote to memory of 2568 1124 cmd.exe 32 PID 1124 wrote to memory of 2568 1124 cmd.exe 32 PID 2044 wrote to memory of 2772 2044 Logo1_.exe 31 PID 2044 wrote to memory of 2772 2044 Logo1_.exe 31 PID 2044 wrote to memory of 2772 2044 Logo1_.exe 31 PID 2044 wrote to memory of 2772 2044 Logo1_.exe 31 PID 2772 wrote to memory of 2820 2772 net.exe 34 PID 2772 wrote to memory of 2820 2772 net.exe 34 PID 2772 wrote to memory of 2820 2772 net.exe 34 PID 2772 wrote to memory of 2820 2772 net.exe 34 PID 2044 wrote to memory of 1372 2044 Logo1_.exe 21 PID 2044 wrote to memory of 1372 2044 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe"C:\Users\Admin\AppData\Local\Temp\a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9FF.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe"C:\Users\Admin\AppData\Local\Temp\a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe"4⤵
- Executes dropped EXE
PID:2568
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD59fff503fad7fa1d9cc7453fdf86ff0e0
SHA1f9b728ba2e8bf2b3a570583f06b0fd7e9fce4ef2
SHA256826148f8b31a5372a71adf8f51961e1b59de63c8865393feffb99ece5e113147
SHA512c00773863ea4b6d88ba1c5a9dcfd2f1033e540c854f2f041bb193f367a9153d54d9fcec0c71e4e9834bbe98a6a5be030b045d34e3b54d69cddfd4d427895af4f
-
Filesize
411KB
MD59c1671821855ca12975573629ddd484a
SHA1ba971ed691b0a86d1edcd8d6f1cbd1ceba8e6acb
SHA2567441f57dcd2c39df50c7b9a40c858958f1ae0cf10eee1b8e348f8469a8cae3f8
SHA512e3e26e0afbcdc285686d26187c2e39ff1716a794a58cd3615bcf4e3494a0cde80cc41f0be3ca4a87e0018f2c707599041dc86627a581b1c06297c7aab52d9c89
-
Filesize
721B
MD53f1d5bb04a46a910ae7c09f08e7b5e0f
SHA1c8cb5c6ebe27ed64edc1cc2f390253f12658688b
SHA25699b7d0914547ac04e76d777e601115d3ac3a3c63b26b84e91cfce7b2e3651123
SHA5121add55776163dea7bffaaa1361d1c35d0764d205e876300fa23dcda1d8eb39823391ee78e8614977ec62ee325306372965c80fc3023de195dff5fbbcb1ce0d1f
-
C:\Users\Admin\AppData\Local\Temp\a53b026e7ca85127af47b5f5fa684c9bbc5e0e481d6fbe8a4f9bce4d6e56c863.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
29KB
MD5ba189b5e31c56a2e16e9c7accf623760
SHA152470f4d5e556832e9e4ff4625751ae62219d0ee
SHA256037c1fc35982012dddedd497646d12ef35654415a14d4bbd467dca672954a3ed
SHA5128da8c08b8af3450f715d2a04b492f2f459a93695bdf7514441705d041d5aba0df6edbb7a5e69e9a8bcbabd9f3c692e2522365ef2e889db3857043118c6df05b0
-
Filesize
9B
MD560b1ffe4d5892b7ae054738eec1fd425
SHA180d4e944617f4132b1c6917345b158f3693f35c8
SHA2565e9944cc48c7ec641cf7b1b0125f47f26102c371a973612f0583f604bc3900d4
SHA5127f5c200924dbb5531df997e6a35cb94f36b54f5651284b0d6404f0576301125ef72b410a170fca889d46c033063663cfc7791f9e4c3c30695af069053eee66cc