Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe
Resource
win10v2004-20240709-en
General
-
Target
e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe
-
Size
474KB
-
MD5
05288582d88af52d4eb5d770f2b64d88
-
SHA1
52af2cd53a8ac45f0c5ae8bef68dd8aadc83a25d
-
SHA256
e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047
-
SHA512
72796ea7f5d6e88870fd7f53746575da52fa9d442af3936952dfd3da30461f57bd44fcc6ab5d78cd5a6b41a004e212e029c33b39599e5beff61bef8cee341cad
-
SSDEEP
12288:vp7+ZZc0IursYCYQeSnyZJiqlEbXSb9Nt7qOFVHk4dU:x7AMYenGJiKEbXWt+Ok4S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2004 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1396 Logo1_.exe 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 2784 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe -
Loads dropped DLL 3 IoCs
pid Process 2004 cmd.exe 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 2784 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe File created C:\Windows\Logo1_.exe e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2004 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 31 PID 2576 wrote to memory of 2004 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 31 PID 2576 wrote to memory of 2004 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 31 PID 2576 wrote to memory of 2004 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 31 PID 2576 wrote to memory of 1396 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 32 PID 2576 wrote to memory of 1396 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 32 PID 2576 wrote to memory of 1396 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 32 PID 2576 wrote to memory of 1396 2576 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 32 PID 1396 wrote to memory of 2320 1396 Logo1_.exe 34 PID 1396 wrote to memory of 2320 1396 Logo1_.exe 34 PID 1396 wrote to memory of 2320 1396 Logo1_.exe 34 PID 1396 wrote to memory of 2320 1396 Logo1_.exe 34 PID 2320 wrote to memory of 2888 2320 net.exe 36 PID 2320 wrote to memory of 2888 2320 net.exe 36 PID 2320 wrote to memory of 2888 2320 net.exe 36 PID 2320 wrote to memory of 2888 2320 net.exe 36 PID 2004 wrote to memory of 2920 2004 cmd.exe 37 PID 2004 wrote to memory of 2920 2004 cmd.exe 37 PID 2004 wrote to memory of 2920 2004 cmd.exe 37 PID 2004 wrote to memory of 2920 2004 cmd.exe 37 PID 2004 wrote to memory of 2920 2004 cmd.exe 37 PID 2004 wrote to memory of 2920 2004 cmd.exe 37 PID 2004 wrote to memory of 2920 2004 cmd.exe 37 PID 2920 wrote to memory of 2784 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 38 PID 2920 wrote to memory of 2784 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 38 PID 2920 wrote to memory of 2784 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 38 PID 2920 wrote to memory of 2784 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 38 PID 2920 wrote to memory of 2784 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 38 PID 2920 wrote to memory of 2784 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 38 PID 2920 wrote to memory of 2784 2920 e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe 38 PID 1396 wrote to memory of 1216 1396 Logo1_.exe 21 PID 1396 wrote to memory of 1216 1396 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe"C:\Users\Admin\AppData\Local\Temp\e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD52A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe"C:\Users\Admin\AppData\Local\Temp\e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe"C:\Users\Admin\AppData\Local\Temp\e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe" -burn.unelevated BurnPipe.{7F899143-CBD2-4C04-BE94-0E3D3935D94B} {9F268300-7FF3-4F0C-BFF9-B8D5E90FF5BE} 29205⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2888
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD52567deb9251e9121f164c60e26b24bbd
SHA176e75925e8060fe1f7d24e20ec093454025e63d9
SHA256050dc407d48b7ec34604d7a08498f05aabe3a6f91c401e496623c9a072df5061
SHA5124714c3d4bad62f6711e3621f3980fba3d1febdc3bfc840ad0b94a4fa3b881554e67e5c0ec2bfa8529401774cd766027106f9932a9f8be43859426622cb5e51f9
-
Filesize
722B
MD561d9695d0fe9b056721694bda2f5e497
SHA1cf2cf50d50628cb950969a311404568151768139
SHA256c102fe6161590c3de5ffdb28ea3bf105a8965cc84cf665cba0223a8ec6ff73a9
SHA512ca924b8692bba53035f557da6e3dde8ce8fbb6553c5a2fc949810ca229eab460ac071fa27dd2bbc3443e91cc866a9fdbab3086ea9e755057b16705b06b92e3a9
-
C:\Users\Admin\AppData\Local\Temp\e2477f2b3799c3ccd1e3e87293065d4bed87b12b625012e847250ff1b06d1047.exe.exe
Filesize448KB
MD5ebd7ec50a49d4e2c2aec4004de7df4c6
SHA19a40e931137abb8461a9efa92d7dc5c6cf1aa49a
SHA2563e669d1b13e8d04552ba332ecf354dec855af59d88e1599701fd24dbf236e0f5
SHA512adb12e2f31dbe31f8c052c987046c3c539ae33475b45068a226cfc415bba39cb69590d759e3fb287897945b8b47fb68c5c29d3cd6b90d462692bb004e970a381
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
26KB
MD5dcde20a592e2616ce941f70b3eda6666
SHA15a9d1a32c1ec4e6e9d1cc2f4b83d0b1b347f04c6
SHA2561d7a173e3ca6de63e081002d5b4343e3088a85d68157752953749078e0434220
SHA512872c8350bcc2257e7785d3894edcd2f74cea4e40e7cb8ea6e905b65f4d593fc389a15920bb7a8e99394eb2fec60aa8f486d016c0eff9c079639055d10f2cd080
-
Filesize
9B
MD534161716a6ca53479b632148242b943e
SHA18858557a658c16f5bd03652eff514e066d1600b8
SHA25664655fa660d975efa9315df6cccb6edb310c9990826101015e68b735162a8e93
SHA512a0f19a255929a439a71438d378f185d476428d7eeb6620dc8483ed838cc0ae044c5f2576a22b77856ae741a62081c9d398d154f71360e8f4b20b67af3b6283fd
-
Filesize
126KB
MD5d7bf29763354eda154aad637017b5483
SHA1dfa7d296bfeecde738ef4708aaabfebec6bc1e48
SHA2567f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93
SHA5121c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c