Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe
Resource
win10v2004-20240508-en
General
-
Target
8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe
-
Size
86KB
-
MD5
b44581b65079ea9344cbec11d6215eb4
-
SHA1
c73949cfd7ae180851e6824f62c973150a1c77ab
-
SHA256
8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e
-
SHA512
ab54d35d89f3e704e34aab47e62cd3f04731cbb5eb2b9e1e54a623e8ad1af3ac09afb27dcf8a45bdaab4cc9afba78fe0cc3ca70a1e7b74183a244f1e5ec9e1d4
-
SSDEEP
1536:vF3SHmLKarIpYMyapmebn4ddJZeY86iLflLJYEIs67rxo:vFkF3psLK4ddJMY86ipmns6S
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2000 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exepid process 2004 Logo1_.exe 2708 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2000 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
Logo1_.exe8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exedescription ioc process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe File created C:\Windows\Logo1_.exe 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Logo1_.exepid process 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe 2004 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.execmd.exeLogo1_.exenet.exedescription pid process target process PID 1776 wrote to memory of 2000 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe cmd.exe PID 1776 wrote to memory of 2000 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe cmd.exe PID 1776 wrote to memory of 2000 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe cmd.exe PID 1776 wrote to memory of 2000 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe cmd.exe PID 1776 wrote to memory of 2004 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe Logo1_.exe PID 1776 wrote to memory of 2004 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe Logo1_.exe PID 1776 wrote to memory of 2004 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe Logo1_.exe PID 1776 wrote to memory of 2004 1776 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe Logo1_.exe PID 2000 wrote to memory of 2708 2000 cmd.exe 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe PID 2000 wrote to memory of 2708 2000 cmd.exe 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe PID 2000 wrote to memory of 2708 2000 cmd.exe 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe PID 2000 wrote to memory of 2708 2000 cmd.exe 8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe PID 2004 wrote to memory of 2688 2004 Logo1_.exe net.exe PID 2004 wrote to memory of 2688 2004 Logo1_.exe net.exe PID 2004 wrote to memory of 2688 2004 Logo1_.exe net.exe PID 2004 wrote to memory of 2688 2004 Logo1_.exe net.exe PID 2688 wrote to memory of 2772 2688 net.exe net1.exe PID 2688 wrote to memory of 2772 2688 net.exe net1.exe PID 2688 wrote to memory of 2772 2688 net.exe net1.exe PID 2688 wrote to memory of 2772 2688 net.exe net1.exe PID 2004 wrote to memory of 1208 2004 Logo1_.exe Explorer.EXE PID 2004 wrote to memory of 1208 2004 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe"C:\Users\Admin\AppData\Local\Temp\8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a15F1.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe"C:\Users\Admin\AppData\Local\Temp\8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe"4⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD50b2679dc1eb882abf56d11ca591aeb76
SHA17a5c7ff9a42f9c84873d269d1e776a89045a1f45
SHA2563d1b129d45f7fe6c861e380906a0c97576a804240426a0d2408f131cbaedc354
SHA5128661ecb16631ac033db4d7ee8aa291647ca3311888988693633acd1a69fd9d6eb890c94c97656602c47964219a082f875bce41710fe036cf546c29ae49e2e114
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD522cb67b3a10b5f55c4751c3efb24e9a5
SHA16df5222ff5146e2f31d1d209bfb75dd7bd7845ec
SHA256336aefd15f9bc3fb5e7dd42969bb58b40e17ae68dfa7e6af6902032a13199bd2
SHA51299ff4829f5155977765dc1ffbdb2cddc83aea21fb286584b463f75a8fc311c9ce2eefd950240538323586556ed38c09866b50196cff0462f30e24415fd69a33e
-
C:\Users\Admin\AppData\Local\Temp\8d04a9e3f12a63e43a17e0a8e90ef4473ce30aedf829016727a528fa98aee23e.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
27KB
MD5d0d42004d5e14fecf764dc99963c82fa
SHA12b05a3b17e23a16df2a838d31d8c4113993dd833
SHA256fe58d080c6a43f69deaec1b3fa9ffa2963dd9a3384b6f3aa9895c4dd2c485a8f
SHA51272f9b71e46512dfcec9bd294930cc9a01acdb8c5b33a3c9a48c9475889f300e35d13191e5868c9798fd335af5a32793f19180b9d015ec18d2b112d0ac1749bee
-
Filesize
9B
MD53b22ce0fee2d1aaf2c66dcd142740e29
SHA194d542b4bb9854a9419753c38e6ffe747653d91c
SHA2568284772f28954a109c16f1583e6e34e29f06673b34e04f268bda961b57ba9f79
SHA512efd4900a49624170e51ea401f0845634f49484a49335845258dc3d41a12e2022bf413a6751fcbcfd1ec68cde506f3363beae57f20e8eaca8b214d28baa138c5b