Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe
Resource
win10v2004-20240709-en
General
-
Target
e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe
-
Size
260KB
-
MD5
b283549b798cc302bfa1338f179b71c2
-
SHA1
2dbb4f91f757ad4dcb3e981dde994b3bc2c51474
-
SHA256
e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f
-
SHA512
dd2ead3d9937f5fbf32a1c3a623b763a71fac989169cca0e1c35900e01ad102f7904e121b8d6893db94887673620665f945a9bf25521ca2f7075b0467b8fa7ee
-
SSDEEP
3072:TFMlkuJVFuLRkgUA1nQZwFGVO4Mqg+WDY:hMiuJXuLRp1nQ4QLd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2952 Logo1_.exe 2744 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe -
Loads dropped DLL 1 IoCs
pid Process 2732 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am_ET\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe File created C:\Windows\Logo1_.exe e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe 2952 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2732 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 30 PID 2720 wrote to memory of 2732 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 30 PID 2720 wrote to memory of 2732 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 30 PID 2720 wrote to memory of 2732 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 30 PID 2720 wrote to memory of 2952 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 32 PID 2720 wrote to memory of 2952 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 32 PID 2720 wrote to memory of 2952 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 32 PID 2720 wrote to memory of 2952 2720 e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe 32 PID 2952 wrote to memory of 2608 2952 Logo1_.exe 33 PID 2952 wrote to memory of 2608 2952 Logo1_.exe 33 PID 2952 wrote to memory of 2608 2952 Logo1_.exe 33 PID 2952 wrote to memory of 2608 2952 Logo1_.exe 33 PID 2732 wrote to memory of 2744 2732 cmd.exe 35 PID 2732 wrote to memory of 2744 2732 cmd.exe 35 PID 2732 wrote to memory of 2744 2732 cmd.exe 35 PID 2732 wrote to memory of 2744 2732 cmd.exe 35 PID 2732 wrote to memory of 2744 2732 cmd.exe 35 PID 2732 wrote to memory of 2744 2732 cmd.exe 35 PID 2732 wrote to memory of 2744 2732 cmd.exe 35 PID 2608 wrote to memory of 1204 2608 net.exe 36 PID 2608 wrote to memory of 1204 2608 net.exe 36 PID 2608 wrote to memory of 1204 2608 net.exe 36 PID 2608 wrote to memory of 1204 2608 net.exe 36 PID 2952 wrote to memory of 1208 2952 Logo1_.exe 21 PID 2952 wrote to memory of 1208 2952 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe"C:\Users\Admin\AppData\Local\Temp\e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a17B5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe"C:\Users\Admin\AppData\Local\Temp\e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe"4⤵
- Executes dropped EXE
PID:2744
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1204
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD575ef99aabc408c8781ac094c88291c98
SHA1a6bf4058f9d481d3d04a5ae59c860f486ee93df2
SHA2563b677985b63d155d14f3d577c455f93fcfe19eb0b9be3032912c65342ccbb10c
SHA51212ed5a63f7a081315aa9a011018e6dadc53efdf4d52bf937eff9536de4d90c7469bbc656ff0437c3a95a4177279cdbab0650bc06411110817f8c5176a532c19a
-
Filesize
474KB
MD52fbf828db79fe4b78ebad2a33057feb7
SHA121a39ee5075e75dd06f7c09ab627ce8b3d5ed7f2
SHA2561b6903313bd593a97612fadd153b771dd2c8ed2a83fd9d89e40b98ee51595210
SHA512d1737db977c9a87073045556a3dfbb21173084fc43ed43b2e884c2619a4c1a568905b1f22dec8f9062768f9cc199094bfb90af3cfab6e0e5f5442157bbe71d69
-
Filesize
722B
MD57da5b937032602bac1866bb0bdebbb91
SHA138ac07469a30eb59b09171b39edcf1953d8bc4f1
SHA256bbe701d6a1a5d02654fd9286df455fe67153bc931b2d249eecaecedc95459fd3
SHA5120e7673c40039075355820c9f96962dccb28055deebe39659c799c04937e537bb8780fbf1841abde4e63d1a7cac3cf00c07612eef0bc5a1551fff637588edf7b2
-
C:\Users\Admin\AppData\Local\Temp\e7ddcaba29ccc15ba902b55b9c3b99bf7a0d3998a8011befde16eecd93ea2c2f.exe.exe
Filesize231KB
MD56f581a41167d2d484fcba20e6fc3c39a
SHA1d48de48d24101b9baaa24f674066577e38e6b75c
SHA2563eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7
SHA512e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6
-
Filesize
29KB
MD5c574da3c8af83a4886cf1d8a0c71c79f
SHA15dacedb189b23d7d6119d132405840b9917f12f1
SHA2569d8e1eafc09fe11ec8acb7e0545f9d4a419982a085bd141236a7090fa03dcfd8
SHA5123284d03dfe3840141da3d92c0a11427b3880f0405c3d4a69d87067067bcc710073e1da9585d2efc438b5f5057be94f4b0832b9891735ac1bbded1c6ac7d0d13c
-
Filesize
9B
MD534161716a6ca53479b632148242b943e
SHA18858557a658c16f5bd03652eff514e066d1600b8
SHA25664655fa660d975efa9315df6cccb6edb310c9990826101015e68b735162a8e93
SHA512a0f19a255929a439a71438d378f185d476428d7eeb6620dc8483ed838cc0ae044c5f2576a22b77856ae741a62081c9d398d154f71360e8f4b20b67af3b6283fd