Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Resource
win10v2004-20220812-en
General
-
Target
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
-
Size
274KB
-
MD5
1e6d7bd19bf1ad8f5497369e7dcf6d30
-
SHA1
a72d042bc0682f0757e1f6ebc5d11b862262d563
-
SHA256
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10
-
SHA512
4ed982c9eff9e8aeea3e39ea1254995509ddbe527f1818ff520205fe723dc354fe583ed33faa9c33957f7bf527c02769dbb941888a17543a58556afedc62ee0a
-
SSDEEP
6144:nuJ2NUrOiPlKkwMkti2k67yCB9Lfdz3pT4QtEuKW:Sok5kLLfdz3pTNtE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exed9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exepid process 4208 Logo1_.exe 4136 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\az-Latn-AZ\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\data\en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fa-IR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\mk-MK\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\sr-latn-cs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fa-IR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ro-RO\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_2019.125.2243.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\mk-MK\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe File created C:\Windows\Logo1_.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Logo1_.exepid process 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe 4208 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exeLogo1_.exenet.execmd.exedescription pid process target process PID 1436 wrote to memory of 4204 1436 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe cmd.exe PID 1436 wrote to memory of 4204 1436 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe cmd.exe PID 1436 wrote to memory of 4204 1436 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe cmd.exe PID 1436 wrote to memory of 4208 1436 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe Logo1_.exe PID 1436 wrote to memory of 4208 1436 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe Logo1_.exe PID 1436 wrote to memory of 4208 1436 d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe Logo1_.exe PID 4208 wrote to memory of 5048 4208 Logo1_.exe net.exe PID 4208 wrote to memory of 5048 4208 Logo1_.exe net.exe PID 4208 wrote to memory of 5048 4208 Logo1_.exe net.exe PID 5048 wrote to memory of 4612 5048 net.exe net1.exe PID 5048 wrote to memory of 4612 5048 net.exe net1.exe PID 5048 wrote to memory of 4612 5048 net.exe net1.exe PID 4204 wrote to memory of 4136 4204 cmd.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe PID 4204 wrote to memory of 4136 4204 cmd.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe PID 4204 wrote to memory of 4136 4204 cmd.exe d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe PID 4208 wrote to memory of 2864 4208 Logo1_.exe Explorer.EXE PID 4208 wrote to memory of 2864 4208 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB858.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe"4⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD53281dcc6909d0bdbc20e6c4fbffac904
SHA156e640a0a7ae10c88a27f407d63172c249ffff7a
SHA2568bc48cb7400ee9cf24950035c08bb0eb4b3993c831a093a6171f119d49b5db52
SHA512a55c1ae736b7ba5282c98b2ed9896aeb0a34a44ebf3b77b76cc797b6c1952e161bd0a3c2039aee70696e9d059d3833339593483ebe5835d7c9ecbb0c86206460
-
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe
Filesize245KB
MD50509f528b74e3dab7f6391704c72b225
SHA1aced5e9bb5e9cf3bdbff1e416e553a17b998eab4
SHA2562b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece
SHA51281803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a
-
C:\Users\Admin\AppData\Local\Temp\d9fb1941d21dbc45cf28aaa95378ca055ad157477a60110d8c8a2f016e550c10.exe.exe
Filesize245KB
MD50509f528b74e3dab7f6391704c72b225
SHA1aced5e9bb5e9cf3bdbff1e416e553a17b998eab4
SHA2562b8d62db7e8d56111532683b4fafccad7f5ce1ef1deac13f1116a552d7cf2ece
SHA51281803ca64d7d72db03ec6fcefdede8db46244df60a6d3c5f1d5cb9d5b7836238042fda7116cd4e6a5b003b45f7c77e1febcc2b5c134f2f2b0fd28ba5952e0e6a
-
Filesize
29KB
MD52872f62ba008526accca6e87b9112e83
SHA18a5ae449ead9f5b7ed4621644297054d9e2b6dcc
SHA25642ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195
SHA512c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb
-
Filesize
29KB
MD52872f62ba008526accca6e87b9112e83
SHA18a5ae449ead9f5b7ed4621644297054d9e2b6dcc
SHA25642ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195
SHA512c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb
-
Filesize
29KB
MD52872f62ba008526accca6e87b9112e83
SHA18a5ae449ead9f5b7ed4621644297054d9e2b6dcc
SHA25642ebc4014f8f8ab4505ba8184222160deb146eb8c934965231e1b2d2c6c46195
SHA512c94f2900cf9d5761ac33b6fb3122a7ce655cc33deaeda98cbe1d8a2a5ddce3271ed752ba100de013d6fc7ac2d6c096a67d73d7deb3bd9e072ece6db2c4df5abb