Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe
Resource
win10v2004-20240704-en
General
-
Target
b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe
-
Size
1.2MB
-
MD5
d65394674d3e7355ba0039eeef2416f4
-
SHA1
5767c74a60d85a32b5d2d9beeacf7491e9db73e8
-
SHA256
b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d
-
SHA512
1c28fc6d2b169869cb604e539da08c037ce160f0d4c496b9a8ddaae2d13b95f5dd2c51bc1e797fba92e4eae2f87756dd5556a0abfac18889c64c3dd690fc1e6e
-
SSDEEP
12288:ip7+lZtPAB2GjMGfNTKdal60yMoFKimTBEAGlyV/vtvOhw5WxZevp:G7IZtP4zgSEAd8fBlYKwnvp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3028 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1088 Logo1_.exe 2584 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 cmd.exe 3028 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lo\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Discussion\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe File created C:\Windows\Logo1_.exe b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe 1088 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2008 wrote to memory of 3028 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 28 PID 2008 wrote to memory of 3028 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 28 PID 2008 wrote to memory of 3028 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 28 PID 2008 wrote to memory of 3028 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 28 PID 2008 wrote to memory of 1088 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 30 PID 2008 wrote to memory of 1088 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 30 PID 2008 wrote to memory of 1088 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 30 PID 2008 wrote to memory of 1088 2008 b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe 30 PID 1088 wrote to memory of 2608 1088 Logo1_.exe 31 PID 1088 wrote to memory of 2608 1088 Logo1_.exe 31 PID 1088 wrote to memory of 2608 1088 Logo1_.exe 31 PID 1088 wrote to memory of 2608 1088 Logo1_.exe 31 PID 3028 wrote to memory of 2584 3028 cmd.exe 32 PID 3028 wrote to memory of 2584 3028 cmd.exe 32 PID 3028 wrote to memory of 2584 3028 cmd.exe 32 PID 3028 wrote to memory of 2584 3028 cmd.exe 32 PID 2608 wrote to memory of 2484 2608 net.exe 34 PID 2608 wrote to memory of 2484 2608 net.exe 34 PID 2608 wrote to memory of 2484 2608 net.exe 34 PID 2608 wrote to memory of 2484 2608 net.exe 34 PID 1088 wrote to memory of 1136 1088 Logo1_.exe 20 PID 1088 wrote to memory of 1136 1088 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe"C:\Users\Admin\AppData\Local\Temp\b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aFAA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe"C:\Users\Admin\AppData\Local\Temp\b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe"4⤵
- Executes dropped EXE
PID:2584
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2484
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD588a7dac99617788a3f6e9e10f9ac447d
SHA1c2adfcd7118facbf99366d28337665ce802baa1b
SHA256284e0eb238a30fda222ad9ecd9f3dc0acd6aef33027562e0fa878e17d54a8d0b
SHA5126fb722713b705434816e30bdd3e26a68553bf4ba184ca6d59e47e61dbfc2ae4b72833a573e5a263f33f183e0ad6f2ab3c7e0b6e84cacd49d08d5921f3ef1e156
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD50e878135146f5d716d212e9fb21706f6
SHA19b893e13a25b456787bb9a3aac54943b80d141a9
SHA2568152bdc96651bc573d7c072f4b7e39fe9a55beb8467aaf7e940d3d2df228172d
SHA512d0776c8101be9f63f9e0b4f10aef8d5f46c2a94fe3fa415af2a6cb3c164f86b1644b3be523a48e5e5dc9fc7f04aa6620a457809916be6ddffb660c470458445f
-
C:\Users\Admin\AppData\Local\Temp\b537f28b3380ce78629945048753924f48e12279cc4ac69c63985416a215117d.exe.exe
Filesize1.2MB
MD5bc111a2e7428e1bfc86a7edd0ea9ea43
SHA1120801cf6286ec01bee0660b7813f33584385169
SHA2561dd8554472d5511a9494a46bb80f82cad86c71877db81459335a5a97d1d72b05
SHA5125477cf6df611f82e69dfa18feecb92a40d925d589658b8582b66971b2bb204db4c7a1bb68064e516b3a91ed1efc3f86eceec01e27171398db8f1ee216361342f
-
Filesize
26KB
MD5033f832ce1346b7839ab0114b7d46349
SHA1339553f046186e54c91ea18765bfef551701f37b
SHA256771a6d5ca90b397c56e449ed8c2966364db1f6774dca74b74fe0f6eed8db4226
SHA512e6a2ac92e6cac4774e5d3f8438388dacbc8359f60c40a6c76574d87de6da4ae65e06008c1d060f1c50a2804d432981105e71cb89a8ba65c2b1095da9eb951858
-
Filesize
8B
MD5ee8c783242e20d39ed0878caba7b4548
SHA11556ec263d4ec9c198a44ea2ecc3c4141ef4509b
SHA25683855d38f6399f8cd40257a5d87a328d41c21e0e50ad4c91de11897e03ad4532
SHA512427491089ca5aecb5f365d6adf2e5c9d18a7acf93d471a425364dc504f581f29908df9abfa0fb721e768004737d6c250804dbf27b3c9e4b87532052810318f2a