Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe
Resource
win10v2004-20240226-en
General
-
Target
9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe
-
Size
4.0MB
-
MD5
07dd49c9cad37d09c88284f194528aa1
-
SHA1
026a367da035231d2bd0029d8fcbf0a6b41b2d90
-
SHA256
9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5
-
SHA512
7a0d32410ef8e9904dce456f59930278d60d9d3d0e325caf7e6dd7ba9c273d42941f7a0c306eb8f3027e57196dc88832c02e6346c59c201ef3058f9fa44c401d
-
SSDEEP
49152:/7g7jPNDf0q65cSzdVtxbFu5XrkP3NGAFapj7QHExCTM4nf1vNX:UjFDzsVtru5Xro3fEj7QHeWBFN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2884 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2504 Logo1_.exe 2464 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe -
Loads dropped DLL 1 IoCs
pid Process 2884 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe File created C:\Windows\Logo1_.exe 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2884 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 28 PID 2612 wrote to memory of 2884 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 28 PID 2612 wrote to memory of 2884 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 28 PID 2612 wrote to memory of 2884 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 28 PID 2612 wrote to memory of 2504 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 30 PID 2612 wrote to memory of 2504 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 30 PID 2612 wrote to memory of 2504 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 30 PID 2612 wrote to memory of 2504 2612 9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe 30 PID 2504 wrote to memory of 2752 2504 Logo1_.exe 31 PID 2504 wrote to memory of 2752 2504 Logo1_.exe 31 PID 2504 wrote to memory of 2752 2504 Logo1_.exe 31 PID 2504 wrote to memory of 2752 2504 Logo1_.exe 31 PID 2752 wrote to memory of 2608 2752 net.exe 33 PID 2752 wrote to memory of 2608 2752 net.exe 33 PID 2752 wrote to memory of 2608 2752 net.exe 33 PID 2752 wrote to memory of 2608 2752 net.exe 33 PID 2884 wrote to memory of 2464 2884 cmd.exe 34 PID 2884 wrote to memory of 2464 2884 cmd.exe 34 PID 2884 wrote to memory of 2464 2884 cmd.exe 34 PID 2884 wrote to memory of 2464 2884 cmd.exe 34 PID 2504 wrote to memory of 1204 2504 Logo1_.exe 21 PID 2504 wrote to memory of 1204 2504 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe"C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a93B7.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe"C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe"4⤵
- Executes dropped EXE
PID:2464
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5b965dbd07c20e327ffbb6f34ecfb5d61
SHA18c58cd8d73e543a37ffcc345df98c7a51fdf2bed
SHA2565b22a907554740d6a749a466778f4e6d45d3b3dd201ff8314be097dd9dfff7bb
SHA512fd8fe65d70c1adcb284f267d6aaa0bd52ffe6b3d54aaec207ee7901b3422f5375aeb4629667dab23d7fdb4966fca7c0327f7442816f800c77675de299f219fef
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD54016d47c327b6119f332fd69fb2b827a
SHA129a2a40abd505d5eb97d60a54e2e820c6665d0de
SHA2566da18ac64de0c9c566ce9046b92cd09409185294ba396454a7911a72166aadd7
SHA512d2570ddf09337116601c86f238a13ad023bf1a8b786a099fa69240dc062e6eedb2c880a2fc16ec1e984567dcdcf544b88f3d9f46936fe59b7afa88d345680534
-
C:\Users\Admin\AppData\Local\Temp\9a814c75abe18dbbfcd75b970b5352fbb249331d9223349ac708baaac3c333a5.exe.exe
Filesize3.9MB
MD57fe38aececb3c48490557c6ceee88e4d
SHA108bda6f5ed732cfb43a11b5f5decb7fe4c87e40f
SHA2562ade2855df2d387816c71fa04116eab9a0a992b9cdc3bc7805210c66b0dc9033
SHA51204e7a47c4aa326664e3a97745af3d642adcfceb7e01b91d6e07fda13a33f341537a048faae8d89c85de1821d450dcb014fabef2f6aa5ee49afcb780bc4c9254f
-
Filesize
26KB
MD5d58f0bf696ddc361fd79469edc067abb
SHA118f184b2f9101b4a79066f34f882ca2f62f5a679
SHA256935ac18df29846c9ea3e7be82298de61c749498d784536af4f809e22a1f629df
SHA5128d82a3febc173f1d61a5778d1ae9cf982db069906df7dc0a818fc0524ee203979a4b9939ef638120e2fdb98295229528b3115d8297d4b6549341eaf4313877b2
-
Filesize
9B
MD53b22ce0fee2d1aaf2c66dcd142740e29
SHA194d542b4bb9854a9419753c38e6ffe747653d91c
SHA2568284772f28954a109c16f1583e6e34e29f06673b34e04f268bda961b57ba9f79
SHA512efd4900a49624170e51ea401f0845634f49484a49335845258dc3d41a12e2022bf413a6751fcbcfd1ec68cde506f3363beae57f20e8eaca8b214d28baa138c5b