Analysis
-
max time kernel
3s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 22:48
Static task
static1
Behavioral task
behavioral1
Sample
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
Resource
win10v2004-20230915-en
General
-
Target
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
-
Size
59KB
-
MD5
70e60a07fc5ec3cfecad11f9d7e8b644
-
SHA1
f62e04a8b05c22c0bf7522359428f720714e9206
-
SHA256
8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7
-
SHA512
e2cdbf9d3218342fdd3f895b2d7e54f16e3c34f58fd3c2cd7fb42fbb034b208dfac43710fb8bb58f68c27855f7dbf53e3846bb4e1fa0a92f508d7ca4b2cc3605
-
SSDEEP
1536:dfgLdQAQfcfymNf+nHDUSLxXtDxZHMJhpuNUsRln:dftffjmNuUSLx9DeptQln
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3416 Logo1_.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe File created C:\Windows\Logo1_.exe 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe 3416 Logo1_.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 872 wrote to memory of 1784 872 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 86 PID 872 wrote to memory of 1784 872 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 86 PID 872 wrote to memory of 1784 872 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 86 PID 872 wrote to memory of 3416 872 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 87 PID 872 wrote to memory of 3416 872 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 87 PID 872 wrote to memory of 3416 872 8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe 87 PID 3416 wrote to memory of 4608 3416 Logo1_.exe 89 PID 3416 wrote to memory of 4608 3416 Logo1_.exe 89 PID 3416 wrote to memory of 4608 3416 Logo1_.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8702.bat2⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe"3⤵PID:3064
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵PID:4608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:4816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5ab787c372cc33602d3b196568e2a6d13
SHA1b4d523d2ea0e40a056eed229ed85e617c1fc1533
SHA25612d7958b0bacd10fb2d4b6440b27d540f5eec8b557937419f814ac86a52a9b23
SHA5120555276242aa21acc516444bcab6b5f7e40dbec8a1cd3805bf888f3b47801a5bdb5139740fd61e37d6d068ae4b652093fce2d9aa1f1795a8f251fcf68c82d7ff
-
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe
Filesize33KB
MD58d05ecf2ab1c6977a588ea5d668050ab
SHA1ba402e1035ec8f5d1c686752584993395aa9e1b9
SHA256caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3
SHA5124827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88
-
C:\Users\Admin\AppData\Local\Temp\8e5e7b9a59e5d086f81305b64444654650c6f422dac29a4aedd223e3c260e4a7.exe.exe
Filesize33KB
MD58d05ecf2ab1c6977a588ea5d668050ab
SHA1ba402e1035ec8f5d1c686752584993395aa9e1b9
SHA256caa73b1e0d729f03de5e8deee8316dd0e1976f1ba3fedb0c6a85dd4096c109d3
SHA5124827c4aab9ffc7a9857e399b8b8480fe842a61e92193ab50ca6ed557884d64458c4bce9f4d2ca2105bcd2276098bc61e0c6968e9cf6b1d881ab6dea2c3945c88
-
Filesize
26KB
MD53b3bb3d8ab4a2a4e6d740495a52d6e25
SHA1a97eacc11f455bcb7de6b924df8a64d99062ce34
SHA25612c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2
SHA512d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee
-
Filesize
26KB
MD53b3bb3d8ab4a2a4e6d740495a52d6e25
SHA1a97eacc11f455bcb7de6b924df8a64d99062ce34
SHA25612c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2
SHA512d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee
-
Filesize
26KB
MD53b3bb3d8ab4a2a4e6d740495a52d6e25
SHA1a97eacc11f455bcb7de6b924df8a64d99062ce34
SHA25612c99fb5c6b78e193dd16bc5eb659b4a7510e51fef318914ad76414bec69a4a2
SHA512d70b5417117116c85e790150f311f489e25104861ffb0888bcdf7b6ab8411e2777318801eb97552ae5e373aaf21c142e16f9871326d630c6335ad80031c738ee