Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe
Resource
win10v2004-20240611-en
General
-
Target
fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe
-
Size
387KB
-
MD5
e926a6e1e457f802edbbd789ca42c363
-
SHA1
17b01fe06ed24e3d4851bb8a488e2d92050ce3ac
-
SHA256
fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149
-
SHA512
bf7c6b444f3d227c43149a47c61fce1785db1e54f1ba118ac88e73530c359b2f7899376e96302873428b6939a959f0e76c110966d2511825746c782149825d2f
-
SSDEEP
6144:yFpIP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moHXG:UpFahVy41
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2744 Logo1_.exe 2656 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe File created C:\Windows\Logo1_.exe fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe 2744 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2748 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 28 PID 1900 wrote to memory of 2748 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 28 PID 1900 wrote to memory of 2748 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 28 PID 1900 wrote to memory of 2748 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 28 PID 1900 wrote to memory of 2744 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 29 PID 1900 wrote to memory of 2744 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 29 PID 1900 wrote to memory of 2744 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 29 PID 1900 wrote to memory of 2744 1900 fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe 29 PID 2744 wrote to memory of 2700 2744 Logo1_.exe 31 PID 2744 wrote to memory of 2700 2744 Logo1_.exe 31 PID 2744 wrote to memory of 2700 2744 Logo1_.exe 31 PID 2744 wrote to memory of 2700 2744 Logo1_.exe 31 PID 2700 wrote to memory of 2576 2700 net.exe 33 PID 2700 wrote to memory of 2576 2700 net.exe 33 PID 2700 wrote to memory of 2576 2700 net.exe 33 PID 2700 wrote to memory of 2576 2700 net.exe 33 PID 2748 wrote to memory of 2656 2748 cmd.exe 34 PID 2748 wrote to memory of 2656 2748 cmd.exe 34 PID 2748 wrote to memory of 2656 2748 cmd.exe 34 PID 2748 wrote to memory of 2656 2748 cmd.exe 34 PID 2744 wrote to memory of 1180 2744 Logo1_.exe 21 PID 2744 wrote to memory of 1180 2744 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe"C:\Users\Admin\AppData\Local\Temp\fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2C4E.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe"C:\Users\Admin\AppData\Local\Temp\fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe"4⤵
- Executes dropped EXE
PID:2656
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5e51b1ea24d8739a33beec03e98ea799d
SHA1359852502dbf1c0e6a5b42f9bd279e3a164c5059
SHA256bfee2fff789c9b51161e79e8d91a226773e5dfb5deb5f8bd2eb94d6cae2d9a61
SHA51204659e8f2d599e4bc36589034ca1b8639e831f2a440ff2dc3c109b73a4d5372b34a43e1a09985623e4f7fac6fd3a4fd1255b591e88cadf234cc20c18c198c10a
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD554079a53db14b70c93482de37540e556
SHA1f52924bbd2d7b36a716b0b7e61f29b27eed1e514
SHA2568693faaa293252ce5e5cb2d8f7975b87c4e9ad8b1466f954b9cfc1a9bf9ef983
SHA512bf5bce27a6bde53963a220e17ae1c093f5739f8716080fdcf6d48f93bdab02d6c4d287c8273d41656a3894e8934cdf71adec52168ad335ccbf6a32028ba162d4
-
C:\Users\Admin\AppData\Local\Temp\fb7e1e6fd8ad832b691ba3e00f49da75d3fe9c09b080a66d7f6d538f446d4149.exe.exe
Filesize360KB
MD55fbd45261a2de3bb42f489e825a9a935
SHA1ff388f6e9efe651ec62c4152c1739783e7899293
SHA2569e63701598199d5c47217e23b44d0e3ec5d53f5419166b1b6c68a7e9e8fc47a4
SHA5127f22b1995a07016adb342c551454d602bfbe511525139aee8581b62116608e9e278fd81c26382f1333c7eccded4474196e73c093bb5cbf8e8f203e865024c058
-
Filesize
27KB
MD5e64ef364d16ee5080d92a0ce29745a57
SHA17cad20f8448225d876c51f447fce237435653013
SHA2565bf21661082873e033505e0da51c119acaba12a6d18df121d44e6665a5a065bc
SHA512f483b17532fb65a90952fc4a14492ee29109c1a69b34cfdbde19059438d14d3e42ce7e893f0c4fd794979a5055cc48613cf64486f8e27103b469100f8d1b1ff3
-
Filesize
8B
MD5ee8c783242e20d39ed0878caba7b4548
SHA11556ec263d4ec9c198a44ea2ecc3c4141ef4509b
SHA25683855d38f6399f8cd40257a5d87a328d41c21e0e50ad4c91de11897e03ad4532
SHA512427491089ca5aecb5f365d6adf2e5c9d18a7acf93d471a425364dc504f581f29908df9abfa0fb721e768004737d6c250804dbf27b3c9e4b87532052810318f2a