Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe
Resource
win10v2004-20220812-en
General
-
Target
f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe
-
Size
27KB
-
MD5
0ffb93b3a57552c62f2024d2faa82fc0
-
SHA1
58dc6c6698c1a0d921ab252ff4a545b5eb34b546
-
SHA256
f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0
-
SHA512
32fd53a15c59ced54afb14127d98b7d898b453d2e529719ecec401e6f6d983b5425f46727f154203e96d231392acb25d80255f25efcbe1e17ac6b7ff7a2eb82f
-
SSDEEP
768:I1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoZwtI1:afgLdQAQfcfymNMk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4112 Logo1_.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\ModifiableWindowsApps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe 4112 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2288 4804 f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe 82 PID 4804 wrote to memory of 2288 4804 f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe 82 PID 4804 wrote to memory of 2288 4804 f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe 82 PID 4804 wrote to memory of 4112 4804 f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe 83 PID 4804 wrote to memory of 4112 4804 f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe 83 PID 4804 wrote to memory of 4112 4804 f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe 83 PID 4112 wrote to memory of 1892 4112 Logo1_.exe 85 PID 4112 wrote to memory of 1892 4112 Logo1_.exe 85 PID 4112 wrote to memory of 1892 4112 Logo1_.exe 85 PID 1892 wrote to memory of 4324 1892 net.exe 87 PID 1892 wrote to memory of 4324 1892 net.exe 87 PID 1892 wrote to memory of 4324 1892 net.exe 87 PID 4112 wrote to memory of 2520 4112 Logo1_.exe 47 PID 4112 wrote to memory of 2520 4112 Logo1_.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe"C:\Users\Admin\AppData\Local\Temp\f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4546.bat3⤵PID:2288
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4324
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5c2c5abca5156fcbc640c352c01910096
SHA1bf75df433e7754eb42d2214f9f9ce93f8e3b94d9
SHA256d5834635b596f369ecdce0bc4b33ae1ec1e61a519c778b61aa28a232ea5d6c74
SHA512e9ef6cf8286fe4f6994e816ac214141a864a41fefdf3195b9df9a56e0e78496d40658ba3c84973745e2cf0c1189f2294c994d0efca104329ede007484a00ad38
-
C:\Users\Admin\AppData\Local\Temp\f2b7fcf014360374f1fd5cf70384db9eac811069499c6d58723c1f59208e9dd0.exe.exe
Filesize1KB
MD564cc786dbcdd8076956a32bc8732ce9b
SHA1ef4f09a44dd0ff9000cf81764e432b99efb17099
SHA2563782526958313d2c43bb736569345be080984defdbfca14459fbede6a35ba696
SHA5129118c378da0f1b67f0a4eeaf0fefdb7ded59f61d20f1c1295b0ba90b4be69c35b5ee777c1a4daea06cc16e87f96d906e28755c4a7fe53b7209bad4e5fe620add
-
Filesize
26KB
MD53a1b098f07762def9e634c2b18fb671a
SHA1b0472806b14562f436042da551bf5d8e340a09a6
SHA25635d5889b04e508b76219c6195430ce2d2b176f0d60d5c0d43cbf0b6ed4edb16f
SHA51224b76a56437dcda213b8a384dd76e84fc58a273aafd0b3197422dd0efe96e6749426d8a74dab75c9322f91faf065155392a7afd1f5a6ad09c08382fcb8f655fe
-
Filesize
26KB
MD53a1b098f07762def9e634c2b18fb671a
SHA1b0472806b14562f436042da551bf5d8e340a09a6
SHA25635d5889b04e508b76219c6195430ce2d2b176f0d60d5c0d43cbf0b6ed4edb16f
SHA51224b76a56437dcda213b8a384dd76e84fc58a273aafd0b3197422dd0efe96e6749426d8a74dab75c9322f91faf065155392a7afd1f5a6ad09c08382fcb8f655fe
-
Filesize
26KB
MD53a1b098f07762def9e634c2b18fb671a
SHA1b0472806b14562f436042da551bf5d8e340a09a6
SHA25635d5889b04e508b76219c6195430ce2d2b176f0d60d5c0d43cbf0b6ed4edb16f
SHA51224b76a56437dcda213b8a384dd76e84fc58a273aafd0b3197422dd0efe96e6749426d8a74dab75c9322f91faf065155392a7afd1f5a6ad09c08382fcb8f655fe