Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe
Resource
win10v2004-20240508-en
General
-
Target
f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe
-
Size
4.2MB
-
MD5
731590cbb312b2c4668ef30c5457f715
-
SHA1
33a850eb0bcc769800b21abc9337dc8fd751eaa0
-
SHA256
f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508
-
SHA512
975942a6774cd0d17b9a6d87a410602af6e36b754341ff7fb027ddf0d78d93f9a3e94e4a7140244177d20d275db5567af2fd32dbd514d35c2c164d7f99f1091c
-
SSDEEP
98304:mXccdTtesHtbZZA2vU6dr8R20o8t7sz3rridb7:gLTQsHtbZZAYMk0o8t0nip
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1624 Logo1_.exe 2580 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe -
Loads dropped DLL 2 IoCs
pid Process 2616 cmd.exe 2616 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe File created C:\Windows\Logo1_.exe f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe 1624 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2616 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 28 PID 2304 wrote to memory of 2616 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 28 PID 2304 wrote to memory of 2616 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 28 PID 2304 wrote to memory of 2616 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 28 PID 2304 wrote to memory of 1624 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 30 PID 2304 wrote to memory of 1624 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 30 PID 2304 wrote to memory of 1624 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 30 PID 2304 wrote to memory of 1624 2304 f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe 30 PID 1624 wrote to memory of 1424 1624 Logo1_.exe 31 PID 1624 wrote to memory of 1424 1624 Logo1_.exe 31 PID 1624 wrote to memory of 1424 1624 Logo1_.exe 31 PID 1624 wrote to memory of 1424 1624 Logo1_.exe 31 PID 2616 wrote to memory of 2580 2616 cmd.exe 33 PID 2616 wrote to memory of 2580 2616 cmd.exe 33 PID 2616 wrote to memory of 2580 2616 cmd.exe 33 PID 2616 wrote to memory of 2580 2616 cmd.exe 33 PID 1424 wrote to memory of 2636 1424 net.exe 34 PID 1424 wrote to memory of 2636 1424 net.exe 34 PID 1424 wrote to memory of 2636 1424 net.exe 34 PID 1424 wrote to memory of 2636 1424 net.exe 34 PID 1624 wrote to memory of 1260 1624 Logo1_.exe 21 PID 1624 wrote to memory of 1260 1624 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe"C:\Users\Admin\AppData\Local\Temp\f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aEB0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe"C:\Users\Admin\AppData\Local\Temp\f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe"4⤵
- Executes dropped EXE
PID:2580
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2636
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a9a5a1eadf0a9e9776b55f748a8f4fa3
SHA1607aac41d7f1e8929fd00ed950006e0ad96bc94f
SHA25677fc16e36538deba2c56edeabe62ae11e0c5d380564006e35b03d8cf6871918f
SHA5125ddc878180efa2b6b56f156a2a67df701365ba69af4d244185e31ede4c2edde7b88da6916571dcba47a4cb95814bf7d8f2570610adeac034852a9eeb9a0fcf0d
-
Filesize
471KB
MD599ea9b604a7a734d3087fa6159684c42
SHA1709fa1068ad4d560fe03e05b68056f1b0bedbfc8
SHA2563f733f9e6fec7c4165ca8ba41eb23f604a248babe794c4ad2c6c3ce8032aab1c
SHA5127af8008c7e187f925c62efc97e1891a7a38d089302dba39fbde137fb895e0592847ed0982c824c2075be8e6b95b6ce165ecb848ab85adf53779ebef613410fbb
-
Filesize
721B
MD593a115d169a3fec5f5c6608a8ba7c1ba
SHA1495259c62d2944aee8de98bc81bf95495bd60ee5
SHA2562d36e98b20b693cac2a95f156fd428b36b22625438f14307556279fd1a0c1122
SHA512a8c65d499d9df73c48f790f2ffb29f69b06bd600da04f64ab264f1bd3dd78839febd55704ce51a2fcf76714dbb8df705bfed2cb9c61e753aebc206cadb0afaf0
-
C:\Users\Admin\AppData\Local\Temp\f9fc4af8b4534a889d9fbc0b0778608989ad1b893e4e4f681192abecf989c508.exe.exe
Filesize4.2MB
MD503aef2d88d5aca195398e360b93a0b70
SHA133228c965bc06b2514c1cb46b2188f9eb782ec3a
SHA2560bf257ca2f4408b72761f5831832044c979b91c944cd6b53be416a877f67203d
SHA5122b5de472e8bb1c84df524eec15871c640fb76272f6b576bad97f425f131c25fee5db5ad8de9bef712bf94ac9705df159ed977fcfefd4d93af3d2dc3a7345ba20
-
Filesize
26KB
MD5a089ef349fc8aa3836ddf36f1160ebae
SHA1067d9aaf763a725f8fe9152371f4123f0cccee47
SHA256e5aaa9d610db8e9b3d888582be218889b084117bbb61fb667987357c2cc9f32b
SHA5126355417cfd84bb137d4a9c7352598e35600ec76569d4ffd0054c9b4f43d25703149ae2111c2a70b3b714d9def26ceb96808be30b621b61469acf8c3f2f5ae99f
-
Filesize
9B
MD51f206a052c160fd77308863abd810887
SHA13b27ec1dc4b51fb7f1793a9ca9bb0d2e53e60eb1
SHA25645129bd309ca763a88c6bf438896e82b939d6491036658c4512c57f8353938c1
SHA512bd7857c146b01a49d34d4eb84053353eeb586bee6916426179305d5e2360559adea4040fe2184a3a803943ff4e6526cc38c665f9a808355619628868d53fbed5