Analysis
-
max time kernel
187s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
Resource
win10v2004-20220812-en
General
-
Target
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
-
Size
112KB
-
MD5
6f5aac6e26ef2b4d76e96067186f6bd0
-
SHA1
35df376831b69ffcd7c7feefdc9c0f2f826b4365
-
SHA256
93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42
-
SHA512
4ddd6581525e0b5d234a1ad6bd224ed8502534d79361579d34dab6a5ce4608bdd4517b572d2e2cb925b47d26b3ee41c53421bd2ace0bb8e35c71135b44a7a01a
-
SSDEEP
3072:yftffV+RusUrMzkm8PL3E7Qw/STyr5Jks7M/2:CVfw8szkmIL3E7QPQLE2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4788 Logo1_.exe 1688 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Multimedia Platform\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe File created C:\Windows\Logo1_.exe 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe 4788 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4924 4816 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 81 PID 4816 wrote to memory of 4924 4816 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 81 PID 4816 wrote to memory of 4924 4816 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 81 PID 4816 wrote to memory of 4788 4816 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 82 PID 4816 wrote to memory of 4788 4816 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 82 PID 4816 wrote to memory of 4788 4816 93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe 82 PID 4788 wrote to memory of 1396 4788 Logo1_.exe 84 PID 4788 wrote to memory of 1396 4788 Logo1_.exe 84 PID 4788 wrote to memory of 1396 4788 Logo1_.exe 84 PID 1396 wrote to memory of 3096 1396 net.exe 86 PID 1396 wrote to memory of 3096 1396 net.exe 86 PID 1396 wrote to memory of 3096 1396 net.exe 86 PID 4924 wrote to memory of 1688 4924 cmd.exe 87 PID 4924 wrote to memory of 1688 4924 cmd.exe 87 PID 4924 wrote to memory of 1688 4924 cmd.exe 87 PID 4788 wrote to memory of 2576 4788 Logo1_.exe 41 PID 4788 wrote to memory of 2576 4788 Logo1_.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aF42.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe"4⤵
- Executes dropped EXE
PID:1688
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3096
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721B
MD58be744d1f171feaa43f1be5cd7d1c713
SHA10b9b5b4cf2fee60f956d7a99eef4ee8f54537b73
SHA256ebde8f2c40f2969e65fab12c54aa3f83e4f68ca6fafb285290d9ba040fbd4151
SHA5124b9ac963461ca234ff0f2d1f453aaac2ee6238feb22f3e5b07c666e1a427142f2278b9c3ea96c6b87661cbac5f0ac15f3c7267024fc0a4a27661517e1e759d02
-
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe
Filesize86KB
MD572dfd72927e77f491f786648e74edfc5
SHA17fb9e4b3ab6a5bfe5e78a36194407f56ce96e61a
SHA2566c0473a4f79ad36f2526f190db19582af27988128b6fac96720bace7f5c271e1
SHA5120842a4866c8b78f502023c9430520f3595b4f3938f3be8ab3fbb7f72660a78c7219da817d4071d6908442b933f8f71840040188db86d5a97bc620345ce4bf695
-
C:\Users\Admin\AppData\Local\Temp\93ef6ec35f8f667551091510ab511a4d4ec349188f808c76782e0e70a3daae42.exe.exe
Filesize86KB
MD572dfd72927e77f491f786648e74edfc5
SHA17fb9e4b3ab6a5bfe5e78a36194407f56ce96e61a
SHA2566c0473a4f79ad36f2526f190db19582af27988128b6fac96720bace7f5c271e1
SHA5120842a4866c8b78f502023c9430520f3595b4f3938f3be8ab3fbb7f72660a78c7219da817d4071d6908442b933f8f71840040188db86d5a97bc620345ce4bf695
-
Filesize
26KB
MD53d02e9a181d3ed5b125e56a1987b5bdb
SHA1a9ef3500a71f0a29260039de0f4d80bc51f43912
SHA256882c4645013972204e5c933033fa05512a17a5205bbef8144b96fb6ebb4d6825
SHA512b0de499cef5cf1dfcb44c7cee3ccde49e23a061818f55a55bb766855c7e7c98d043ab54ea9f21c76f94c42f41fe272100e22f1d35fa88331f01c2a83245444b1
-
Filesize
26KB
MD53d02e9a181d3ed5b125e56a1987b5bdb
SHA1a9ef3500a71f0a29260039de0f4d80bc51f43912
SHA256882c4645013972204e5c933033fa05512a17a5205bbef8144b96fb6ebb4d6825
SHA512b0de499cef5cf1dfcb44c7cee3ccde49e23a061818f55a55bb766855c7e7c98d043ab54ea9f21c76f94c42f41fe272100e22f1d35fa88331f01c2a83245444b1
-
Filesize
26KB
MD53d02e9a181d3ed5b125e56a1987b5bdb
SHA1a9ef3500a71f0a29260039de0f4d80bc51f43912
SHA256882c4645013972204e5c933033fa05512a17a5205bbef8144b96fb6ebb4d6825
SHA512b0de499cef5cf1dfcb44c7cee3ccde49e23a061818f55a55bb766855c7e7c98d043ab54ea9f21c76f94c42f41fe272100e22f1d35fa88331f01c2a83245444b1