Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe
Resource
win10v2004-20240508-en
General
-
Target
858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe
-
Size
2.2MB
-
MD5
3bb23713500e3778f7a456fe5d6ebfa7
-
SHA1
3e41436f3ac0e194baaa86aba9c6554c144b3600
-
SHA256
858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d
-
SHA512
650784071869b28b25122eda6a28ea527214f69073ffe7b1eba67a341ace78a56c4ed56eac72119a790d0acc3a9bcd3c4f85fae9db5e775b9e3a1d29904e6cee
-
SSDEEP
49152:l7DEmCd7ei0elaGJo08JfcgelMlionnSTAc:QgJkgBioPc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2384 Logo1_.exe 2620 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe File created C:\Windows\Logo1_.exe 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2276 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 28 PID 2232 wrote to memory of 2276 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 28 PID 2232 wrote to memory of 2276 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 28 PID 2232 wrote to memory of 2276 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 28 PID 2232 wrote to memory of 2384 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 29 PID 2232 wrote to memory of 2384 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 29 PID 2232 wrote to memory of 2384 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 29 PID 2232 wrote to memory of 2384 2232 858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe 29 PID 2384 wrote to memory of 2640 2384 Logo1_.exe 31 PID 2384 wrote to memory of 2640 2384 Logo1_.exe 31 PID 2384 wrote to memory of 2640 2384 Logo1_.exe 31 PID 2384 wrote to memory of 2640 2384 Logo1_.exe 31 PID 2640 wrote to memory of 2648 2640 net.exe 33 PID 2640 wrote to memory of 2648 2640 net.exe 33 PID 2640 wrote to memory of 2648 2640 net.exe 33 PID 2640 wrote to memory of 2648 2640 net.exe 33 PID 2276 wrote to memory of 2620 2276 cmd.exe 34 PID 2276 wrote to memory of 2620 2276 cmd.exe 34 PID 2276 wrote to memory of 2620 2276 cmd.exe 34 PID 2276 wrote to memory of 2620 2276 cmd.exe 34 PID 2384 wrote to memory of 1216 2384 Logo1_.exe 21 PID 2384 wrote to memory of 1216 2384 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe"C:\Users\Admin\AppData\Local\Temp\858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a905D.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe"C:\Users\Admin\AppData\Local\Temp\858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe"4⤵
- Executes dropped EXE
PID:2620
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2648
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d852ef5dff2438ea0a845f1fd260acae
SHA11359ff66e9cbcbe132d67481a7de5c326630380c
SHA256c37e4f105ed9742bb9b25041b423b96815b4ab52b31544cd519f15ac2e2d8959
SHA5125b8544a25c9bf0c3c851be388b32515c31b3f000f5883d993f3b288f71ef07aa2d040b0f30df7559976eaf6f5aeba994a72bb75eaf520efbf5559ccb38e1335d
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5b9e30b02979a4a2546300dc7b1702df9
SHA1130bef311904a9b049c55567fa8a46c04e719f53
SHA256475e0007d2ee0bd9d108e2a195ae471916de82c616244eb9fa4866f007002333
SHA5129860eae0b76a0830a4e8ff3395680a79a73e4a97a361f821978938c4dd59e16215b2c3fc5f1900cb43ef9ca80ddbec0f359294b83f50ffebde2077df127317f5
-
C:\Users\Admin\AppData\Local\Temp\858b05e503dcbc0ece3339ac3fbeec9d6804d7d9581946c3427775175df7566d.exe.exe
Filesize2.1MB
MD567e7203b3ec026ded8d474d677f7755c
SHA1dc3331c968d3d2d3ff5973f82f5aaa2ec976c418
SHA25606223ec33140bbf02f6a67879fa49abcd77792c860579d1d330092fb29b563a6
SHA51298a16f7c958174a43871a6487876a1b37f92761de634c979d2d04b2daac5421f172c3495b4857ab082b95c59fd2d9d6c81f340dc9d4277a7a353d4d6acfb01ec
-
Filesize
26KB
MD5c45bd4df01497a84c77398a57e042c8d
SHA1582329976510839033609ecf5b3298569ed1575d
SHA256abdd548cbdd8c1bf8921f8e4323307e155d9ddc048cf957b6c932f8758a74968
SHA512f8cc4f4847840431dda0da9e94448a8420be2c5dac5fe5b72cbd8fcd91bb9e57d4b0a6af49c04e18b1d33cefa78ff3eaa64f364b248faaa763242599bad7d67b
-
Filesize
8B
MD5ee8c783242e20d39ed0878caba7b4548
SHA11556ec263d4ec9c198a44ea2ecc3c4141ef4509b
SHA25683855d38f6399f8cd40257a5d87a328d41c21e0e50ad4c91de11897e03ad4532
SHA512427491089ca5aecb5f365d6adf2e5c9d18a7acf93d471a425364dc504f581f29908df9abfa0fb721e768004737d6c250804dbf27b3c9e4b87532052810318f2a