Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe
Resource
win10v2004-20240704-en
General
-
Target
42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe
-
Size
573KB
-
MD5
ce4c0db96a436b31bd3dcc7eababddb6
-
SHA1
32dd1578ea9a8eab532c9165a23c06faeb87823c
-
SHA256
42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28
-
SHA512
0cfcd092a00469292be4cbba69d9bde8006c265c2542097f8695d7cae0c74be0f0bf1626956e06928c1186204a567ec3cdbd9999ba22e88374662497bd7b46f7
-
SSDEEP
6144:8uJpE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:o7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2520 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2576 Logo1_.exe 2828 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe File created C:\Windows\Logo1_.exe 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 600 wrote to memory of 2520 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 30 PID 600 wrote to memory of 2520 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 30 PID 600 wrote to memory of 2520 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 30 PID 600 wrote to memory of 2520 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 30 PID 600 wrote to memory of 2576 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 32 PID 600 wrote to memory of 2576 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 32 PID 600 wrote to memory of 2576 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 32 PID 600 wrote to memory of 2576 600 42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe 32 PID 2576 wrote to memory of 2900 2576 Logo1_.exe 33 PID 2576 wrote to memory of 2900 2576 Logo1_.exe 33 PID 2576 wrote to memory of 2900 2576 Logo1_.exe 33 PID 2576 wrote to memory of 2900 2576 Logo1_.exe 33 PID 2900 wrote to memory of 2456 2900 net.exe 35 PID 2900 wrote to memory of 2456 2900 net.exe 35 PID 2900 wrote to memory of 2456 2900 net.exe 35 PID 2900 wrote to memory of 2456 2900 net.exe 35 PID 2520 wrote to memory of 2828 2520 cmd.exe 36 PID 2520 wrote to memory of 2828 2520 cmd.exe 36 PID 2520 wrote to memory of 2828 2520 cmd.exe 36 PID 2520 wrote to memory of 2828 2520 cmd.exe 36 PID 2576 wrote to memory of 1200 2576 Logo1_.exe 21 PID 2576 wrote to memory of 1200 2576 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe"C:\Users\Admin\AppData\Local\Temp\42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aAEB6.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe"C:\Users\Admin\AppData\Local\Temp\42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe"4⤵
- Executes dropped EXE
PID:2828
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2456
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD51fa464beddc0bfc7fb365cff37190229
SHA18a1be16c02b0f07cde047e861144317e9a1158af
SHA25620565ca95286d6ba3b9fb28ea1c49bbe7cfc5ce5efcf6f42bfa0d591ec77db21
SHA512a217430a55e381ee3b89ee0d7df9955695ba3f7038109385dad3cb41bc4e57c33d02db17f1b2bdd0924e442bbd88ea87deed73f46b8c72b3a8c0d8aa48a87c12
-
Filesize
474KB
MD51ca79e3c2539763b0aaac5de49795afe
SHA12d240aef9a2cce22578f42ebecd3058e37a404a8
SHA256e3e49eceb810b34fc826d70c6556d927a363f29c90b347ee4cfd61d7ba3ff2d9
SHA5124e24d3ebcefa6545d85517bbc5bff3285f85a5967da1642a6e4e53bc2c41efc8b9092a3bbb56c1670b215d623ff5c320bcb06f654ac97482a5dff0da208349e6
-
Filesize
722B
MD59f65c18cbcec7f8f7f3803fe524b6dc0
SHA1c21e09ff6c183acf84b57a02bf4f5e6653ca4399
SHA256eae00729d7f1770f047a619302bb1c0e277312d1f76221c448f8c180b3b3c40f
SHA512d587a6c2e8861ffccf0de49afe0c9b8a2deb52383ff562ccd8316c1888caf50fae8bd3097459702ccce308f55573a421cdfce51c41de92f04286c89bac6749ae
-
C:\Users\Admin\AppData\Local\Temp\42f96bd021e1d53fc34f0f6158f4d09442f3810c3ef633708a55665ff0376b28.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
29KB
MD5c8f9045aecd91305717e016e30c8581d
SHA1b19d8ead2a688b7d9c7cbf09682d1c4be029cec2
SHA2561bad5b4ac5628d454f3731b79425aeaf93ef1016d65d63a6ecf8241a94e50639
SHA51271581cb78f59c9dc8b519558c3a1d99dd475171dcddaddb69516a93b0a077590ab36ea53f37e9f0375b2c6685afda3147304f80d7d7a54e33dc6f44fd23487f2
-
Filesize
8B
MD58ca26bb1fe4da60eed2a231635eb2857
SHA1405090f7801e12b524dae9c7d0fef9a3fa8b41d8
SHA256503d5e11de7bb526313442e7b0380b9fb27430b5ada8ad10b5008827c8a4fc54
SHA5126852196fcd3912e037e41764f999dbb155b95d7b706e496159ac06845e46ec03a875d8a6a3a54e1316d9ce2986fdc17fdaa98024aa3a3c69f276d34ebf0c7426