Analysis
-
max time kernel
149s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe
Resource
win10v2004-20240709-en
General
-
Target
3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe
-
Size
1.2MB
-
MD5
1af5fda876a66147d6e1d6e1836682e9
-
SHA1
94144e16ec7d2eeb66b8f126a204886996004619
-
SHA256
3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f
-
SHA512
9bbdfe5f006a7ce7f77bb2c3f7c940c301adb96498e410eaa7784828f7f10a8471e61135aa0fae90a7ef781050e408c8cf347b0a244a4bb7981993aab3be31af
-
SSDEEP
24576:M73CxCOhCN6w0fMuIO0ikei95gbJngYP+B/:M7yx4QApihi9TE+B/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2204 Logo1_.exe 1132 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe -
Loads dropped DLL 1 IoCs
pid Process 3064 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe File created C:\Windows\Logo1_.exe 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe 2204 Logo1_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1908 wrote to memory of 3064 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 29 PID 1908 wrote to memory of 3064 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 29 PID 1908 wrote to memory of 3064 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 29 PID 1908 wrote to memory of 3064 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 29 PID 1908 wrote to memory of 2204 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 30 PID 1908 wrote to memory of 2204 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 30 PID 1908 wrote to memory of 2204 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 30 PID 1908 wrote to memory of 2204 1908 3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe 30 PID 2204 wrote to memory of 1652 2204 Logo1_.exe 32 PID 2204 wrote to memory of 1652 2204 Logo1_.exe 32 PID 2204 wrote to memory of 1652 2204 Logo1_.exe 32 PID 2204 wrote to memory of 1652 2204 Logo1_.exe 32 PID 1652 wrote to memory of 1704 1652 net.exe 34 PID 1652 wrote to memory of 1704 1652 net.exe 34 PID 1652 wrote to memory of 1704 1652 net.exe 34 PID 1652 wrote to memory of 1704 1652 net.exe 34 PID 3064 wrote to memory of 1132 3064 cmd.exe 35 PID 3064 wrote to memory of 1132 3064 cmd.exe 35 PID 3064 wrote to memory of 1132 3064 cmd.exe 35 PID 3064 wrote to memory of 1132 3064 cmd.exe 35 PID 2204 wrote to memory of 1376 2204 Logo1_.exe 20 PID 2204 wrote to memory of 1376 2204 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe"C:\Users\Admin\AppData\Local\Temp\3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a77EE.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe"C:\Users\Admin\AppData\Local\Temp\3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1132
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5014b77ea0fe33acc1d76c92ee17bf938
SHA1a598048f60da36cef7bae742129eaa2a31ff0298
SHA2568c0255f9219358e990ce6a6f9e029aa80f1ad47c1cb9dac6bc692200258c03c1
SHA512cb0e087280b7912594a55f4319bdcd794216ea4fba0367848ff61da77f90d03f9711bf4cebefb9ae9c4ff24964cb96d230bdaf166792fc895c352b7374c35b19
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5986b93253088dce22f59b5b3dc976442
SHA149f1de7544fb9b4e5dda4d4a5bf2c2bdd6ba93d1
SHA256b050abf833c16e4a976b4cc189cad1798877aad3cf5627358f22d9c44378196f
SHA5126140d6e7b9ecaf3909b89f9d765b159eeb75ee4697303b992ac013edc976257cc65b3767ee08f8364480ac5717a1cb31ba2dd9d65df544cb2912e52f95f320d0
-
C:\Users\Admin\AppData\Local\Temp\3fd8bc110f62e90a73eb5ccf3acad44d8a974cae8b69dff117952b6f7174af6f.exe.exe
Filesize1.2MB
MD545252d9887c2fd2911d10ddfad8e89cf
SHA1d3fdda55e532e14b8dd52fb9a9e133fe8ee45859
SHA2568c80453f9e038b38a4c35ff5031c7ac6e6c1443455673ed89dde82375d19d11d
SHA5125f42552cfe7192ce6a5ecf95a9acd6f3d9893e044e0b4d751a4b18a1ccab7aa9c4ad81076290ac560daca029a5b51887b20561088c40e9452d36673bb9e36e4b
-
Filesize
26KB
MD5ae7c31b5bfd948b2f9db0c9d7990233b
SHA1036eaf83eab8e4f573046040892b9c7210875a6a
SHA256b5d1ef23f9aecbc0d84df2c7554ef2599cb9eddd24a4c8a24c01e2fa1950ba8f
SHA512ee4dd1935f876fa3d9af5cb92e6bee374a3b025cfa82d37d87d9450c33a7deba7ed3ae350ca85fac8c7a35f65b47ba5edf84fab49e1d419f072ba4dcc27d8951
-
Filesize
9B
MD547dd2aeea8b548cd2ed3e9a71bf04f02
SHA1fb4ab8a2ceb995fb0ad31326ce2f2aeb9eba5987
SHA256ceadd1f3f299b6a19ca4844eee791af719de61dbec0839b68ed0f1d6cb5c5411
SHA51245843cc926c9c267f3cc967859b7537e937367ab5280f1429cc2f80d7b536131c40238cdcd5a3fc9823521bc596994e79bd3f37d3cc8db8a329f739e0793c50e