Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe
Resource
win10v2004-20240508-en
General
-
Target
6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe
-
Size
363KB
-
MD5
c1300f04918a81b611fa8737f271e1b6
-
SHA1
6f334ff324afe9d459554882c37b60332503aa76
-
SHA256
6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8
-
SHA512
37d7958f5abb7d414933396e5438adad81b61c866b977e7d00dc374ebe415d028b50ae66386ea78af9692ceece0f3cce01e9094262fa556a054a276013470af2
-
SSDEEP
6144:MVfjmNRdFd16rfKCz5D1xMHNDPDU7b4SXXmwkb777777777777777777WIPw8w:O7+Rzf6rCCz5D1GHNDw4SHe77777777q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2236 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2304 Logo1_.exe 2740 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe -
Loads dropped DLL 1 IoCs
pid Process 2236 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lo\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe File created C:\Windows\Logo1_.exe 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2236 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 28 PID 1748 wrote to memory of 2236 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 28 PID 1748 wrote to memory of 2236 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 28 PID 1748 wrote to memory of 2236 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 28 PID 1748 wrote to memory of 2304 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 29 PID 1748 wrote to memory of 2304 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 29 PID 1748 wrote to memory of 2304 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 29 PID 1748 wrote to memory of 2304 1748 6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe 29 PID 2304 wrote to memory of 344 2304 Logo1_.exe 31 PID 2304 wrote to memory of 344 2304 Logo1_.exe 31 PID 2304 wrote to memory of 344 2304 Logo1_.exe 31 PID 2304 wrote to memory of 344 2304 Logo1_.exe 31 PID 2236 wrote to memory of 2740 2236 cmd.exe 33 PID 2236 wrote to memory of 2740 2236 cmd.exe 33 PID 2236 wrote to memory of 2740 2236 cmd.exe 33 PID 2236 wrote to memory of 2740 2236 cmd.exe 33 PID 344 wrote to memory of 2780 344 net.exe 34 PID 344 wrote to memory of 2780 344 net.exe 34 PID 344 wrote to memory of 2780 344 net.exe 34 PID 344 wrote to memory of 2780 344 net.exe 34 PID 2304 wrote to memory of 1200 2304 Logo1_.exe 21 PID 2304 wrote to memory of 1200 2304 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe"C:\Users\Admin\AppData\Local\Temp\6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aCDC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe"C:\Users\Admin\AppData\Local\Temp\6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe"4⤵
- Executes dropped EXE
PID:2740
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2780
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5b3798f8e63f0f2c206c60697cfa69302
SHA161ddfe2e610d80a8bc537439856b8184ebc67707
SHA256bb7f1e8c7c2dfb6e6ea64963e0f2bb159e416e541d9fc85f132152a2b479b1b6
SHA512a658cd96d9c8231172f62dd2398f50a3e0fefb3be88957e09d49633237b957556de216c395da278d45cbb24b0200421f9600825c6fb142dc0d62c2a7bb58f328
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD52d4c14d2171fbd58a5f34b65039aaa5c
SHA181c8db9d6f6767a5416f08f6371799bdf4036a5d
SHA2564348b85e9375354ea000a7ef4f5e00f9968a8e8c63f9567b1c76ca7f91db066e
SHA5124f6410a30b4b965a422721e58741d26bd057b73a503ec17ee43da3ad399d124532a3766035011fa024cd028c824f61fade8f7a644e0e38edb18111b2e2f2f22c
-
C:\Users\Admin\AppData\Local\Temp\6954c5a0975944366b4eb8e206b2c7b849a70b9c7efd43ece7a9ef45421dcbf8.exe.exe
Filesize336KB
MD55026427661c3fb19dd56089db48efec7
SHA1783ffacdb3c932f2d61da311ac77b8001934fc3b
SHA25685d5ead2ad17eae6ef7629f34e9f296954ac59139830bd1c261db081cae27bcc
SHA51267cfac87ee688c451c31ed6d8f0cd25443307585c84a54c2d486cd7c1372947ccc49c0b38464cd65e5640e7054fb38e9a48ec7d167e7d9a9c9b053da1a8b37d0
-
Filesize
26KB
MD52db76c761f3ca82f4bd7ec454b8ee0c9
SHA15e595e66cb6b5f6820400d2bbee6ba379e5152a6
SHA256fb7e7e472f54af23ee31b59dda6429e5d4175d72c036ca213ffdc39c3fa8f006
SHA512056673178b4a7c806f84d42b43fd4ef498cbba8e920c45a4146eda501cc8864f491f3e112585529475a3292b1a5423e4033c61c77daad6ae848145933a717ca3
-
Filesize
9B
MD57d17b811a66f09661920bf5af1f95ae9
SHA1f974fb71f0c9242357d308243f16d5509a0fb040
SHA2561ffbf32a83283a76202c268eb3ea579c4b39aa6fb11fc42ad18318286fbf749c
SHA512019689bb28dd360a9b3fe6696944854f806ebe877734f4f8533f7c2508d371049a96f6c7bd5dda908ab91686dbfba4a54335cbc6c4d649775e62912f0af730e3