Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/06/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe
Resource
win10v2004-20240611-en
General
-
Target
9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe
-
Size
362KB
-
MD5
1132b2d4f66397ca61d61164bacd152d
-
SHA1
1aee2b8c21508242465c60a0321ba59483553655
-
SHA256
9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde
-
SHA512
098dc55e4f299d4ec3c19dc7ec1ba48a974c74f6456ad8dd3bcf34b072dda6c7a10b77346babefb74c4dc026866bd2dcf24c43904ffe36df1edaf88d60bf2003
-
SSDEEP
6144:zFp9zU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:JpRU66b5zhVymA/XSRh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2928 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2560 Logo1_.exe 2852 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe -
Loads dropped DLL 1 IoCs
pid Process 2928 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{7ADE9966-696F-4996-9E1A-1D7786573DA1}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe File created C:\Windows\Logo1_.exe 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe 2560 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2928 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 28 PID 2920 wrote to memory of 2928 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 28 PID 2920 wrote to memory of 2928 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 28 PID 2920 wrote to memory of 2928 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 28 PID 2920 wrote to memory of 2560 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 29 PID 2920 wrote to memory of 2560 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 29 PID 2920 wrote to memory of 2560 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 29 PID 2920 wrote to memory of 2560 2920 9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe 29 PID 2560 wrote to memory of 2672 2560 Logo1_.exe 31 PID 2560 wrote to memory of 2672 2560 Logo1_.exe 31 PID 2560 wrote to memory of 2672 2560 Logo1_.exe 31 PID 2560 wrote to memory of 2672 2560 Logo1_.exe 31 PID 2672 wrote to memory of 2592 2672 net.exe 33 PID 2672 wrote to memory of 2592 2672 net.exe 33 PID 2672 wrote to memory of 2592 2672 net.exe 33 PID 2672 wrote to memory of 2592 2672 net.exe 33 PID 2928 wrote to memory of 2852 2928 cmd.exe 34 PID 2928 wrote to memory of 2852 2928 cmd.exe 34 PID 2928 wrote to memory of 2852 2928 cmd.exe 34 PID 2928 wrote to memory of 2852 2928 cmd.exe 34 PID 2560 wrote to memory of 1204 2560 Logo1_.exe 21 PID 2560 wrote to memory of 1204 2560 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe"C:\Users\Admin\AppData\Local\Temp\9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3534.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe"C:\Users\Admin\AppData\Local\Temp\9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe"4⤵
- Executes dropped EXE
PID:2852
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5acc2d7dd51ab514e43e27a541a436296
SHA17cfd57778198ad2e5a6e6e84938e642031ed2faf
SHA256c668d5247ab9bed3348c6e4cc9b31e19fe905a6578f31511feafca853b7ce734
SHA5127b4fd6a8d4291c6b33a2fe454587e562d6a665bfd1f1eaf88f431ed279883a7970366e83bd498a500193766d4fdaadf7b8544cdaa6896ec315ee44b4836b3499
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5c847cf32991a3d06e2c49d7b49934139
SHA1a96b2a0e4253da217430d56b505b30c253750dfc
SHA256f59fff9129a257a521dc4879497e5cbf104c037da0e1184966a4e99f25e6ea0f
SHA5123146cf1a6a4ddd237a3af3742c9eb98402f4751a4ab82a2ef7fcabb43f10d00287d5e464c96d0c2d5ff1e1910c57997e01bb36b32d6be26f172cd9fef02574cb
-
C:\Users\Admin\AppData\Local\Temp\9c7b722a281de6e99ade154d8974162a48b26d2d352bbdd9142edf4c66cdddde.exe.exe
Filesize335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f
-
Filesize
27KB
MD5b00d9a2252bbc499e7eccd5a9ff85cea
SHA189b8f1981d516ec5e65356440628fa080c806d4c
SHA256870465d81aafc8bcc7e40492302b8302465d6e42505176d6d2da53e9a9df9a80
SHA512a85e80bfe9e651447496c725a409986ee7d3ba9de0c39b904fd37144874992d5d9d4f3cb3d544903e353d96632513b40c65af4c6709dede0bc792e50e8c84445
-
Filesize
9B
MD5874f697d7c26bf1b6cc8a502b53db25d
SHA1fee5430622f05615e68fd229e48f2846796c0795
SHA256d9d05459bc11d078b148543de9eb14643747fbf996790dcf04d2725361251798
SHA51251a722a09c79ef1d6c4a08b3a696b1ca7e34f0e1b0798edb7ebc6c9f596740d9d95c6f4228b9d5012b2472bab03b7998b751a4cbfb6c259229dd853c7fcebb2e