Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe
Resource
win10v2004-20240611-en
General
-
Target
6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe
-
Size
225KB
-
MD5
1151be4a7702261d356b891b8704d613
-
SHA1
186c574ea38523ba3b0bf9c15728e814fee74c9e
-
SHA256
6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1
-
SHA512
0d88cf8ddf30a1ee0c05b7dd9c3570a8812e928c0492dcef4247bbec7bb2b147eaba80d575a0fdebc20db136e3d7dcceb01d55f4def1bd10559f37df7468f607
-
SSDEEP
3072:9kF3pkdeKzC/lzMPySe8DnpeIPipoHbKvXWXz9LRnsaJUS+6wPXD3fxNW7gq5yGP:qFpkdeKzC/leySe8AIqpoHbnDns1ND9m
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1812 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2240 Logo1_.exe 2744 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe -
Loads dropped DLL 1 IoCs
pid Process 1812 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File created C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe File created C:\Windows\Logo1_.exe 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe 2240 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1812 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 28 PID 2084 wrote to memory of 1812 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 28 PID 2084 wrote to memory of 1812 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 28 PID 2084 wrote to memory of 1812 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 28 PID 2084 wrote to memory of 2240 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 29 PID 2084 wrote to memory of 2240 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 29 PID 2084 wrote to memory of 2240 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 29 PID 2084 wrote to memory of 2240 2084 6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe 29 PID 2240 wrote to memory of 2892 2240 Logo1_.exe 30 PID 2240 wrote to memory of 2892 2240 Logo1_.exe 30 PID 2240 wrote to memory of 2892 2240 Logo1_.exe 30 PID 2240 wrote to memory of 2892 2240 Logo1_.exe 30 PID 1812 wrote to memory of 2744 1812 cmd.exe 33 PID 1812 wrote to memory of 2744 1812 cmd.exe 33 PID 1812 wrote to memory of 2744 1812 cmd.exe 33 PID 1812 wrote to memory of 2744 1812 cmd.exe 33 PID 2892 wrote to memory of 2840 2892 net.exe 34 PID 2892 wrote to memory of 2840 2892 net.exe 34 PID 2892 wrote to memory of 2840 2892 net.exe 34 PID 2892 wrote to memory of 2840 2892 net.exe 34 PID 2240 wrote to memory of 1196 2240 Logo1_.exe 21 PID 2240 wrote to memory of 1196 2240 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe"C:\Users\Admin\AppData\Local\Temp\6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1390.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe"C:\Users\Admin\AppData\Local\Temp\6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe"4⤵
- Executes dropped EXE
PID:2744
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2840
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD593742d345e0943ca38a3240b19de76ab
SHA1bc623ad839126d08637a828dac55bd079f086656
SHA256f6171cff4668eb4524c01eebdc9fc6095a138efc42e424358f7f26871b01371b
SHA5125b42d275d289d6bcb8b49b8d148bc282fca250725b2346232f772c8f0d82d084c02d50aceaa620728ed76494de294f8b619476c7b3da75362bbe1e6eddf8dcc9
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD563e28962b2149bfc3dee08a155c36ba3
SHA1d95d718531a907af927537e918b4680c98892a68
SHA256d6727aeda2f71e542dea64a6be4071502c65ab25d88c1b44ed0549ba5768bdba
SHA512ce98b258ec63bc26e4f8674a4e3d96753312318743901b2e53156bca37b55f683bee08940e1d83aff02b74623e4c831ae901873a422de0fa42dd8b20e123c622
-
C:\Users\Admin\AppData\Local\Temp\6be81e133c28e32dcae66c4116e00c2d87b1ccda335c1c276c8e6e433e8e95f1.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
27KB
MD56c0c2056d5784fc3f7c04858f85819c4
SHA1203759f0622c3ae4724f946c314bfea1dabb5752
SHA25689f77befd5f884f8fa2677f5214e4e09f0e0c15c1f256791beb9d5ef204aec41
SHA512717f436d961c0da9e04be621d99b19dccbae7bfbe3704bd21a354c2a81b10bbd21ec8a48ca9f769eef78369fcbfb8d184d8c6f98c0faf2418892d02e29745e51
-
Filesize
9B
MD51884bfdeea71ff22db39c196f4447c9c
SHA13eafc7e6e17ba6ce7a087a3588fb1efb596da038
SHA256163167bc5a01ad6b3ed4406c2a9a1baaf2c0ef4620ab7d5b39aeddf976ca776d
SHA512b22124aa3a912462e6face7f71ad3dfec4b27dab16b2e20e3a0adc277f89f631ec889c91b185ac4b9b670933d881b8fd26c25d6f405e465aa8148cdbb7f7c3e2