Analysis
-
max time kernel
189s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Resource
win10v2004-20221111-en
General
-
Target
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
-
Size
243KB
-
MD5
1a511c400e849f7ae09961e103039ccc
-
SHA1
80e2e994800a01b287f5d35fbef791e1e9e8cf86
-
SHA256
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435
-
SHA512
5a383e9f2216b738a1a6e7fa5b5e64e0832649a5481d75b7259e5ed3e1088103888419c7b424f0cf220fbff6166dee434594093a05808b12dc3699c60a739b2e
-
SSDEEP
3072:PGaY46tGNttyJQ7KRjNDWI38xunbx8zPYLGT6gZfYKgZfYNpW+WROnp:u46tGdyJNDWjxQ8jYLG1ZwpZwNHWQ
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 3660 Logo1_.exe 5108 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft.NET\ADOMD.NET\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\16\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Updates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\Client\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vreg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ICE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe File created C:\Windows\Logo1_.exe c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1932 wrote to memory of 3168 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 83 PID 1932 wrote to memory of 3168 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 83 PID 1932 wrote to memory of 3168 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 83 PID 3168 wrote to memory of 1908 3168 net.exe 85 PID 3168 wrote to memory of 1908 3168 net.exe 85 PID 3168 wrote to memory of 1908 3168 net.exe 85 PID 1932 wrote to memory of 2232 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 86 PID 1932 wrote to memory of 2232 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 86 PID 1932 wrote to memory of 2232 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 86 PID 1932 wrote to memory of 3660 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 88 PID 1932 wrote to memory of 3660 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 88 PID 1932 wrote to memory of 3660 1932 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 88 PID 3660 wrote to memory of 4132 3660 Logo1_.exe 89 PID 3660 wrote to memory of 4132 3660 Logo1_.exe 89 PID 3660 wrote to memory of 4132 3660 Logo1_.exe 89 PID 4132 wrote to memory of 1580 4132 net.exe 91 PID 4132 wrote to memory of 1580 4132 net.exe 91 PID 4132 wrote to memory of 1580 4132 net.exe 91 PID 2232 wrote to memory of 5108 2232 cmd.exe 92 PID 2232 wrote to memory of 5108 2232 cmd.exe 92 PID 2232 wrote to memory of 5108 2232 cmd.exe 92 PID 3660 wrote to memory of 4148 3660 Logo1_.exe 93 PID 3660 wrote to memory of 4148 3660 Logo1_.exe 93 PID 3660 wrote to memory of 4148 3660 Logo1_.exe 93 PID 4148 wrote to memory of 3728 4148 net.exe 95 PID 4148 wrote to memory of 3728 4148 net.exe 95 PID 4148 wrote to memory of 3728 4148 net.exe 95 PID 3660 wrote to memory of 3020 3660 Logo1_.exe 51 PID 3660 wrote to memory of 3020 3660 Logo1_.exe 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a36B0.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"4⤵
- Executes dropped EXE
PID:5108
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1580
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3728
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD57f5e94e256e886d3b1443d3898499783
SHA12f7835a2810894fb29ad7a88da8cb2322dd21051
SHA2567c2d2a4f5685f68f821cd66455d703c7b854918b59a8a016cfcbebefd6a30db1
SHA51265188d4f5ba1e1b52e6c34d7c4bf609a559a6ed36d61bb9fe893bdf6d5888ec302d0dac82f3219b8fe32691c8c61f60d5e18ccfa0212864a747b4ca8a53a2632
-
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Filesize209KB
MD5eb89f4ac13f95fa31c850907d53dba87
SHA1b0a34af264273af4446867d776d9bc2717b908b0
SHA256f6415905338d2020326891f32bac7bb77553f68be40de61ba06118cad073fd89
SHA512e2c2a05d69de2859b12a3b8b9e4e98e6935a9c24a92ddae8de3a03aa586c6467a56b072885cd4afde90d2283da6aca0fb9c99654fe2fb4b9d36809f37b3d6606
-
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe.exe
Filesize209KB
MD5eb89f4ac13f95fa31c850907d53dba87
SHA1b0a34af264273af4446867d776d9bc2717b908b0
SHA256f6415905338d2020326891f32bac7bb77553f68be40de61ba06118cad073fd89
SHA512e2c2a05d69de2859b12a3b8b9e4e98e6935a9c24a92ddae8de3a03aa586c6467a56b072885cd4afde90d2283da6aca0fb9c99654fe2fb4b9d36809f37b3d6606
-
Filesize
33KB
MD5d20379a6043b7c9afdd5ac217cb33f43
SHA19755a607a609a5cd1ca57e3a180c5f2d04f5b6fb
SHA256423355b44e6de81ab3edad99d36a1bfb0c45888f1d2e3a970cbd4a29c5d59046
SHA51279a2c49794cd467841c1e97e4d4200f87f0fb2a202c29fa353631ec9630b0b26248c3a7737c8207c740b025a9cf6cc685e11a0c182d50c1b6d065c811580547e
-
Filesize
33KB
MD5d20379a6043b7c9afdd5ac217cb33f43
SHA19755a607a609a5cd1ca57e3a180c5f2d04f5b6fb
SHA256423355b44e6de81ab3edad99d36a1bfb0c45888f1d2e3a970cbd4a29c5d59046
SHA51279a2c49794cd467841c1e97e4d4200f87f0fb2a202c29fa353631ec9630b0b26248c3a7737c8207c740b025a9cf6cc685e11a0c182d50c1b6d065c811580547e
-
Filesize
33KB
MD5d20379a6043b7c9afdd5ac217cb33f43
SHA19755a607a609a5cd1ca57e3a180c5f2d04f5b6fb
SHA256423355b44e6de81ab3edad99d36a1bfb0c45888f1d2e3a970cbd4a29c5d59046
SHA51279a2c49794cd467841c1e97e4d4200f87f0fb2a202c29fa353631ec9630b0b26248c3a7737c8207c740b025a9cf6cc685e11a0c182d50c1b6d065c811580547e