Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe
Resource
win10v2004-20240709-en
General
-
Target
302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe
-
Size
3.5MB
-
MD5
3d8bc2b291bb7396cfb6ee904880fb87
-
SHA1
93c2b3ee8d984a5326bb0ebbac06e04999890a75
-
SHA256
302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152
-
SHA512
d55f56f336f12d354d54f8902a2b929d7a4e5169737596ad77a351c1a6e914f3f71097a96ed3891cf6ecccbb1e3aca6f43f989a6b74721d24bf31d54bc1b6948
-
SSDEEP
49152:A5tzuM0S2S5mLFEuVebedv9uNBb8AftK9qrO1LS9RhSq15vTNuHv/QXd9CQxM4kA:ACFk/fUqrOiOc5z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2384 Logo1_.exe 264 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe -
Loads dropped DLL 6 IoCs
pid Process 1916 cmd.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe File created C:\Windows\Logo1_.exe 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1916 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 30 PID 2692 wrote to memory of 1916 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 30 PID 2692 wrote to memory of 1916 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 30 PID 2692 wrote to memory of 1916 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 30 PID 2692 wrote to memory of 2384 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 31 PID 2692 wrote to memory of 2384 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 31 PID 2692 wrote to memory of 2384 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 31 PID 2692 wrote to memory of 2384 2692 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 31 PID 2384 wrote to memory of 2356 2384 Logo1_.exe 33 PID 2384 wrote to memory of 2356 2384 Logo1_.exe 33 PID 2384 wrote to memory of 2356 2384 Logo1_.exe 33 PID 2384 wrote to memory of 2356 2384 Logo1_.exe 33 PID 2356 wrote to memory of 2704 2356 net.exe 35 PID 2356 wrote to memory of 2704 2356 net.exe 35 PID 2356 wrote to memory of 2704 2356 net.exe 35 PID 2356 wrote to memory of 2704 2356 net.exe 35 PID 1916 wrote to memory of 264 1916 cmd.exe 36 PID 1916 wrote to memory of 264 1916 cmd.exe 36 PID 1916 wrote to memory of 264 1916 cmd.exe 36 PID 1916 wrote to memory of 264 1916 cmd.exe 36 PID 264 wrote to memory of 2740 264 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 37 PID 264 wrote to memory of 2740 264 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 37 PID 264 wrote to memory of 2740 264 302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe 37 PID 2384 wrote to memory of 1188 2384 Logo1_.exe 21 PID 2384 wrote to memory of 1188 2384 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe"C:\Users\Admin\AppData\Local\Temp\302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aC072.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe"C:\Users\Admin\AppData\Local\Temp\302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 264 -s 1285⤵
- Loads dropped DLL
PID:2740
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5e07b271414d7901d4be3fef46b6234ad
SHA1383c79a26054fb1d00f931222e5f7fd7cdc2987b
SHA25684bb3d64de9f9a1c3b1c2359204a1986fdbe17ef226274213bb17fbf0ca2198c
SHA512d989a243a0c6e0f1fa1e562f49be1263fd2d7962f289d4a0108f046ef6f2cd87b262a4b2fbd4a94be3f9e39ac656b402f8d8aa40600db3ee02b24cf0d78e08e3
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD51e14ca23babab5897333c2fe6a3e125d
SHA1df9af513d1f216251fff313a37c9eea94461d874
SHA256f62fb394910e5eadfa5ba75428d1ea791bc272c5e9c524a6ed55d3fce5d81af3
SHA51265a9a99f421d48f702df2da5b4d6f52894744d3a0409e22f8b9fe8f6eeed84a9a9f765a08dc84809d13f511b561b47b6363b7c9b37dbba158995809782491b63
-
C:\Users\Admin\AppData\Local\Temp\302d1beddcd4a3d6bd6bb51afe7b8ed6c3277072f9d390cc8105d1e4acd90152.exe.exe
Filesize3.4MB
MD5cd53c61345139dd549495633c7195a9d
SHA12f2ea5f17f724e08f2d965e591b61e0daf310487
SHA2562b2538d62a3d95caa1eaaf402dda55e9b0dc66e5a0b8f6c8fd3042550e48d56d
SHA512006ea7fc9f7cb6b7312c4431ba631a528654bc5c111561cb884b165176dc70dccbb7d72e132b38ce599156df6ffa31476b69fe6dd095a3fef2f93b7ef5208124
-
Filesize
29KB
MD511eb7f6334d62b91ca0518344bd7cfe3
SHA1f287e1192de3d3d4b86b99884a6c1e5b5f8933b8
SHA2563c602a45453a2ce84e2a810d5de5d83b1a99872ed761854d214f518cf819e7fa
SHA512e9b7be81ce8cb8b44ec1900c033df1a31117f1aa0281b55825b93ed923d910012f93d5cf0065043e9f8b9a44fde6b5733404c4f951b69df1e0bade8f3e771ec9
-
Filesize
9B
MD52efce5174bcf8d378a924333f75e26ad
SHA14fe6e1d729b55d42eb9d74aca11b36a94402de14
SHA25604ccb9bec2864153c72852867d8e65dca07eca4e5edcfb4beb62cb364dcd91fa
SHA51224684969632fb0562a3a7a5fec91d869d627730d8e9d83a2b17e326d7047e3fbff205eec207914e42ecd50fef68a212c19f3599ded271c00e66acc22f1f04c16