Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe
Resource
win10v2004-20240709-en
General
-
Target
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe
-
Size
3.0MB
-
MD5
2df06080847c440edb9dca506b20a330
-
SHA1
9ef81f44bd467a33a14fb14cb47c6ff954765147
-
SHA256
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706
-
SHA512
01eee6ed888321ad16a26f7ec910e13d1cb3836f1cd890394a5c970f44378eb3f9fa71c07198d0a8bdc7ce074f9b427c7884beeff2f9a6a31b065b7135b2ad91
-
SSDEEP
49152:K76IGwdA0g6CupcLp0pHwjOLaUIeJSBTbJeKPTSuN0oqhedGW96oNeD:1IGH6CupcLp0pHnFSNbJ3TSW0oaW9nNe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 Logo1_.exe 2272 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe -
Loads dropped DLL 1 IoCs
pid Process 2892 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe File created C:\Windows\Logo1_.exe 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe 2720 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2892 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 31 PID 2136 wrote to memory of 2892 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 31 PID 2136 wrote to memory of 2892 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 31 PID 2136 wrote to memory of 2892 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 31 PID 2136 wrote to memory of 2720 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 32 PID 2136 wrote to memory of 2720 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 32 PID 2136 wrote to memory of 2720 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 32 PID 2136 wrote to memory of 2720 2136 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 32 PID 2720 wrote to memory of 2808 2720 Logo1_.exe 34 PID 2720 wrote to memory of 2808 2720 Logo1_.exe 34 PID 2720 wrote to memory of 2808 2720 Logo1_.exe 34 PID 2720 wrote to memory of 2808 2720 Logo1_.exe 34 PID 2808 wrote to memory of 2824 2808 net.exe 36 PID 2808 wrote to memory of 2824 2808 net.exe 36 PID 2808 wrote to memory of 2824 2808 net.exe 36 PID 2808 wrote to memory of 2824 2808 net.exe 36 PID 2892 wrote to memory of 2272 2892 cmd.exe 37 PID 2892 wrote to memory of 2272 2892 cmd.exe 37 PID 2892 wrote to memory of 2272 2892 cmd.exe 37 PID 2892 wrote to memory of 2272 2892 cmd.exe 37 PID 2720 wrote to memory of 1164 2720 Logo1_.exe 21 PID 2720 wrote to memory of 1164 2720 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE7C0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"4⤵
- Executes dropped EXE
PID:2272
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2824
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD532c46999249ee76939ecc4baf2722d33
SHA1bb4a4aaae82f0eaf66d797ef1b313df9e38974f9
SHA2569d2c513f7443ba6ce40ca030ed0cb370165c67f28f22bc25553a54f57dbb2fea
SHA5128a2e8c2cdeca63261497b82f3c58a92767618860f05ffdd75e932dd2d4731ffef2d622b48d7939910edf00d31aa9909b92a5304e897d5d0150c57ad1f0306b48
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD59da99b0f97bd7ff8a0ea1df898ad321f
SHA1d973b733f196bf24cee6aa78148127543a459357
SHA2566fbf68e72fcd1eec0fdfe34aa1f7ee377934495f52050b896c85c235fc385323
SHA5122ba1b589bbde4623ac2110d2571e6b18e608d07af64e3a1b067ff59a46ceb2874e474c0cec366432bc2b2ed049343e23757fcc16ca5660fab66746515750246d
-
C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe.exe
Filesize3.0MB
MD5d9d63c77ed65a20c102e7a1a0df2b581
SHA18483bfba9e325a2c3e555bae3155e5d0e9ddcc9f
SHA256c96c258af32735e1f37f64b38a5f00e6618a574e48525be1b18c3eb60f79b17d
SHA5125fec2c4775bcb3615f16cd418512c873c8938d2235fd4ea40788f40327a2c8844c8c13e46aca43d85a7ada67aee299f430b49654779b44b7e0c8ead03ff7e4f3
-
Filesize
26KB
MD566b52612270a69c70fcb753c71db38af
SHA156c10089c0cc6d1638ec3a9818411040c0684cf0
SHA256bdcf0b120cbba26c70240bec100cf50964765bdbba76565d3d1ecc788ffded64
SHA5129be0b6f733a1e03626ad978b057405bd894e9f8179f5292e2ae62b1e2ee337e501233f58f75bf5643e12fdb68e6e6d2a3e146ba6641a448c089cd2e153d729e8
-
Filesize
9B
MD55e286801abdc6ca5d3091665a72ecd7c
SHA187e0b4601ab0b05784a1059a45d72d807b0e2cbb
SHA256131ccc46b756e5373dc2f2d37625bfb980a48f2f2287585da364166cf2e709b5
SHA51251506d6adb68cca9e21fcddfe9672b91352cdb4f3c5b8c2da40219c73d2e7724776cd8701ff68449720c0aa398fe4f7665dabae2bd5147d42c5b6882c99f0bf1