Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe
Resource
win10v2004-20240709-en
General
-
Target
5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe
-
Size
661KB
-
MD5
41a763d0942b18bcbe2f0543d755c4b8
-
SHA1
b7f8ffc6f09eb5e9e4d77817c3751ddfd4926a30
-
SHA256
5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a
-
SHA512
88b1be2c046a632fad824bbeaa084967c8843d480e074add45121bf64b3c5c36eeda3e7fe93d681a4afbd5bb201f933fe578f5126447f45b3023b2754825ac23
-
SSDEEP
12288:Pp7+unMwHskY7gjcjhVIEhqgM7bWvcsi6aVKrIysU40vy3W/ceKSHMsiFyY6XN2:R7BMysZgjS1hqgSC/izGfHjymk4HM5yJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2836 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1932 Logo1_.exe 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 2220 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe -
Loads dropped DLL 3 IoCs
pid Process 2836 cmd.exe 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 2220 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe File created C:\Windows\Logo1_.exe 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2836 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 30 PID 2928 wrote to memory of 2836 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 30 PID 2928 wrote to memory of 2836 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 30 PID 2928 wrote to memory of 2836 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 30 PID 2928 wrote to memory of 1932 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 31 PID 2928 wrote to memory of 1932 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 31 PID 2928 wrote to memory of 1932 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 31 PID 2928 wrote to memory of 1932 2928 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 31 PID 1932 wrote to memory of 2772 1932 Logo1_.exe 33 PID 1932 wrote to memory of 2772 1932 Logo1_.exe 33 PID 1932 wrote to memory of 2772 1932 Logo1_.exe 33 PID 1932 wrote to memory of 2772 1932 Logo1_.exe 33 PID 2836 wrote to memory of 2872 2836 cmd.exe 35 PID 2836 wrote to memory of 2872 2836 cmd.exe 35 PID 2836 wrote to memory of 2872 2836 cmd.exe 35 PID 2836 wrote to memory of 2872 2836 cmd.exe 35 PID 2836 wrote to memory of 2872 2836 cmd.exe 35 PID 2836 wrote to memory of 2872 2836 cmd.exe 35 PID 2836 wrote to memory of 2872 2836 cmd.exe 35 PID 2772 wrote to memory of 2680 2772 net.exe 36 PID 2772 wrote to memory of 2680 2772 net.exe 36 PID 2772 wrote to memory of 2680 2772 net.exe 36 PID 2772 wrote to memory of 2680 2772 net.exe 36 PID 2872 wrote to memory of 2220 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 37 PID 2872 wrote to memory of 2220 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 37 PID 2872 wrote to memory of 2220 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 37 PID 2872 wrote to memory of 2220 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 37 PID 2872 wrote to memory of 2220 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 37 PID 2872 wrote to memory of 2220 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 37 PID 2872 wrote to memory of 2220 2872 5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe 37 PID 1932 wrote to memory of 1236 1932 Logo1_.exe 21 PID 1932 wrote to memory of 1236 1932 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe"C:\Users\Admin\AppData\Local\Temp\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a6EAB.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe"C:\Users\Admin\AppData\Local\Temp\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\Temp\{062D9815-A7AD-4BF3-90DA-436BFB590DBD}\.cr\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe"C:\Windows\Temp\{062D9815-A7AD-4BF3-90DA-436BFB590DBD}\.cr\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1885⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2680
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c8815a0def060805cd68b27911b50324
SHA17679abbdb549b6f2e55019d01f45601d60177c42
SHA25675f96336b6f31fb604f361a304076c9636a01d3dfe806e36736f875d71248eb2
SHA512292c67e8ad8d04f552f8d7a77bb8639db5b71e608138164ed8770c80b620ec442bafd53d1a11b9bbc22abd45ed9505ddbe4618c499bed2fe53c2bf5db67aafac
-
Filesize
722B
MD54e5bb38472ed152f1038089b113cb11a
SHA189a6fee43c27e09f9c135529c0bc51163f59e219
SHA2569ca74d51bca9a6385a21b5fcc56826da3ce47094ad254e90a3f7d59a8db99d0b
SHA512b8cbcabfbe749acc6e46615b97aa7d92ad23bc80866f20673d786623eb4b7447be539b4649314d162d364e899a4185d5922158715b1bfd73c349a49b917081d8
-
C:\Users\Admin\AppData\Local\Temp\5920f60827bb171b4f0d2fa89c071292afc99b600b8deebf2b2726142ff4b01a.exe.exe
Filesize635KB
MD5848da6b57cb8acc151a8d64d15ba383d
SHA18f4d4a1afa9fd985c67642213b3e7ccf415591da
SHA2565a61f9775032457db28edd41f98f08c874e759f344ea8475c9ac8abbba68de12
SHA512ff8b87e7746ecf19a150874dedd6ea4c51c76cfc291c5a80d9e5073a9bbbb2bd6ed7d10425b083578dc8d28d0d905e379fa3f919a60979e5b5c44ebc0ac613e6
-
Filesize
26KB
MD5aaffa63d279b442bf6447d8e27477be7
SHA1ce128e98423d5e0dd1b35c0e8e8eb854d5599a0f
SHA256acca897ac28f597801df59bd1343785f7bea8c1013821c44d2f1878ee5ef1488
SHA512b8521588339c507b10c473aaa8aca314598962588da0014b00f413f9874a425534eb20260ed39484728bd4466fb3d7f516b6cfccc56d51e026f5365030b81c26
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2