Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe
Resource
win10v2004-20220812-en
General
-
Target
f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe
-
Size
53KB
-
MD5
6b859eed7917e100cfc5c4b937693d3f
-
SHA1
d8aac6c0787bfb368c14ab1642b1a48fdfb4d944
-
SHA256
f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9
-
SHA512
34695e9af1409543ab707f68aba37df22b75b20685b9ea56e0b0af035128d15c5fdb63b0b13ee6813c4ce1e6ae877a291e8e087fd696bbde576badb2d487424e
-
SSDEEP
768:8Qr16GVRu1yK9fMnJG2V9dHS8aMqL4hNo99vTDsXP9PhyqVB2:8QB3SHuJV9NTATUPa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4712 Logo1_.exe 2248 f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\Icons\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ro-RO\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\pack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\Utilities\Styling\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\people\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\UserControls\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe File created C:\Windows\Logo1_.exe f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4780 2328 f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe 82 PID 2328 wrote to memory of 4780 2328 f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe 82 PID 2328 wrote to memory of 4780 2328 f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe 82 PID 2328 wrote to memory of 4712 2328 f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe 84 PID 2328 wrote to memory of 4712 2328 f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe 84 PID 2328 wrote to memory of 4712 2328 f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe 84 PID 4712 wrote to memory of 4644 4712 Logo1_.exe 86 PID 4712 wrote to memory of 4644 4712 Logo1_.exe 86 PID 4712 wrote to memory of 4644 4712 Logo1_.exe 86 PID 4644 wrote to memory of 3376 4644 net.exe 87 PID 4644 wrote to memory of 3376 4644 net.exe 87 PID 4644 wrote to memory of 3376 4644 net.exe 87 PID 4780 wrote to memory of 2248 4780 cmd.exe 88 PID 4780 wrote to memory of 2248 4780 cmd.exe 88 PID 4780 wrote to memory of 2248 4780 cmd.exe 88 PID 4712 wrote to memory of 3060 4712 Logo1_.exe 41 PID 4712 wrote to memory of 3060 4712 Logo1_.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe"C:\Users\Admin\AppData\Local\Temp\f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aCAD6.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe"C:\Users\Admin\AppData\Local\Temp\f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe"4⤵
- Executes dropped EXE
PID:2248
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3376
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5405571ba0b8620c90c1c335fd9a569b1
SHA16de820026380020ceb23490132940ab299eecd33
SHA2568e683a00d65358617e1e5c784322fcdc4699fa00d6bd76bcc41f8146800f3af6
SHA5121c5c3b9e1284a4a14395655a600444cbc220269b4a02843551bebea51f1d5ec5098bd471db25f77cf55544b4547af49b380427ed43b4c097f39032bebd5eebbb
-
C:\Users\Admin\AppData\Local\Temp\f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe
Filesize24KB
MD5a665a342415522930202a43e6f0f13df
SHA1d8ba1c3136d81a1d51fe21ea66a29aece72bbb7c
SHA2568392ccab81be3633a88d67811f59380f1d06cfc12deb0eb025de351ca6564072
SHA5127222c0e923fa7ed754666e36d84ee4041b12dbff9ff9a212fdae8fddeb982adb2b0d62356583b1a60951062ed02dc59c0e999dd32969b0bd3784508c9645cc42
-
C:\Users\Admin\AppData\Local\Temp\f45af5253a3d5174ac4684d2e5d89786e0f11f0a51a48236b77097fc8065cbc9.exe.exe
Filesize24KB
MD5a665a342415522930202a43e6f0f13df
SHA1d8ba1c3136d81a1d51fe21ea66a29aece72bbb7c
SHA2568392ccab81be3633a88d67811f59380f1d06cfc12deb0eb025de351ca6564072
SHA5127222c0e923fa7ed754666e36d84ee4041b12dbff9ff9a212fdae8fddeb982adb2b0d62356583b1a60951062ed02dc59c0e999dd32969b0bd3784508c9645cc42
-
Filesize
29KB
MD5c0ebe51ba5bbd05094b4b729c932ce50
SHA18559a61b35546c8e10f0bf98fbc6408a9a26db45
SHA256df5f373f06986c508a08bc2c8fe02e3dae8aa25c95cb9d39cf423c3c3dc3dbd7
SHA512750e84173a72e88f5b4ded9e4f245b25904e10be210464d3df9f22735793de1f162e3cfa7460d10476dd4ca553669a62f5e6e2ae972f99f5230bfbfd71f8b76f
-
Filesize
29KB
MD5c0ebe51ba5bbd05094b4b729c932ce50
SHA18559a61b35546c8e10f0bf98fbc6408a9a26db45
SHA256df5f373f06986c508a08bc2c8fe02e3dae8aa25c95cb9d39cf423c3c3dc3dbd7
SHA512750e84173a72e88f5b4ded9e4f245b25904e10be210464d3df9f22735793de1f162e3cfa7460d10476dd4ca553669a62f5e6e2ae972f99f5230bfbfd71f8b76f
-
Filesize
29KB
MD5c0ebe51ba5bbd05094b4b729c932ce50
SHA18559a61b35546c8e10f0bf98fbc6408a9a26db45
SHA256df5f373f06986c508a08bc2c8fe02e3dae8aa25c95cb9d39cf423c3c3dc3dbd7
SHA512750e84173a72e88f5b4ded9e4f245b25904e10be210464d3df9f22735793de1f162e3cfa7460d10476dd4ca553669a62f5e6e2ae972f99f5230bfbfd71f8b76f