Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe
Resource
win10v2004-20240709-en
General
-
Target
024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe
-
Size
225KB
-
MD5
178b90dba22e60c09c0d7895414bddc8
-
SHA1
1b36e576f9f9a3965c796602072efce9217413d7
-
SHA256
024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31
-
SHA512
6cfa2c6eaabeabdf4249f2c3aae6ee0616ad479a418a2e229207e190c82ae200eb29e94c7b96582a5c83a45c6deb9530dd6799c6997daddb39f03c5f197eb0dd
-
SSDEEP
3072:6kF3pkdeKzC/lzMPySe8DnpeIPipoHbKvXWXz9LRnsaJUS+6wPXD3fxNW7gq5yGP:vFpkdeKzC/leySe8AIqpoHbnDns1ND9m
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2036 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1668 Logo1_.exe 2744 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe File created C:\Windows\Logo1_.exe 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe 1668 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2036 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 30 PID 2088 wrote to memory of 2036 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 30 PID 2088 wrote to memory of 2036 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 30 PID 2088 wrote to memory of 2036 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 30 PID 2088 wrote to memory of 1668 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 31 PID 2088 wrote to memory of 1668 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 31 PID 2088 wrote to memory of 1668 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 31 PID 2088 wrote to memory of 1668 2088 024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe 31 PID 1668 wrote to memory of 2384 1668 Logo1_.exe 32 PID 1668 wrote to memory of 2384 1668 Logo1_.exe 32 PID 1668 wrote to memory of 2384 1668 Logo1_.exe 32 PID 1668 wrote to memory of 2384 1668 Logo1_.exe 32 PID 2384 wrote to memory of 1404 2384 net.exe 35 PID 2384 wrote to memory of 1404 2384 net.exe 35 PID 2384 wrote to memory of 1404 2384 net.exe 35 PID 2384 wrote to memory of 1404 2384 net.exe 35 PID 2036 wrote to memory of 2744 2036 cmd.exe 36 PID 2036 wrote to memory of 2744 2036 cmd.exe 36 PID 2036 wrote to memory of 2744 2036 cmd.exe 36 PID 2036 wrote to memory of 2744 2036 cmd.exe 36 PID 1668 wrote to memory of 1124 1668 Logo1_.exe 20 PID 1668 wrote to memory of 1124 1668 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe"C:\Users\Admin\AppData\Local\Temp\024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aADBD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe"C:\Users\Admin\AppData\Local\Temp\024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe"4⤵
- Executes dropped EXE
PID:2744
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1404
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5e79fa72f57cf845ae1e923088cb772b7
SHA1d37dc0ba493914ecc83e2cde636a749e3b8edff0
SHA256ce2279864fb77d362a9fc551159850293bce45fd14baeff5fac02c04a2d66453
SHA512e7a6371c66e295e13d10a4e2a9ba1e7418eb48f77f187f5acec98f8c96c49e7009b94a7e69a1ada6c13ae9ad9f7147d95aa99b1ee68c6496f049e722aa83aad2
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD52941f7eef67adc5366e7425d302dfb09
SHA1607fb2f134ca37c72e2e85c5be2dfcf6b2896bb0
SHA256c69a99d65fc69bb9901a38f82b9e018916622f9ae2a2af6c48b8be9980218b92
SHA512740e2c45a9cfb824f41b0961bb6a7dc0b9a9c3d52e8493157f1155331f376a6a069b395d3ece128389105f17e25324e4201dc491792d24ac86e58a4ec92a3c51
-
C:\Users\Admin\AppData\Local\Temp\024079b841aa555ce8e9a77277dc6b3b1c662d33eef662466627181274064b31.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
27KB
MD5726f6d72b00ca9473a4f8c401dc37b13
SHA1ad68b653a5b92edef5e28b571413e442e6cdfa70
SHA2560da42491468018cfeb62f12554ab2562e1116e086880e5afd9480c65cb4c50ea
SHA512a21ff8e3d1232183ab94bace5f228ee853583832c205c4feb97eaa546dfd115158f3e29d8d7e9dc6670a9917f6d792f847d69b4d58ea8856968de772034d6af7
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b