Analysis
-
max time kernel
195s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 05:26
Static task
static1
Behavioral task
behavioral1
Sample
4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe
Resource
win10v2004-20230915-en
General
-
Target
4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe
-
Size
806KB
-
MD5
4db322ec9cefd0b37e9d26b4b21f9b46
-
SHA1
a68df7c5e0dfc0a3d4fecba1aab62e18962942dd
-
SHA256
4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83
-
SHA512
9fbdc1a68afb33fd10c003ee3e08d12209214bdd0af94fbea714eaea033df280cea6a4a481fc029a818fe3ca3a1d90e54df7c96335e0a41e949cabc81288fedc
-
SSDEEP
12288:e7+XtJt5nIj79qVZMv2nKF3kVI2bovMYl7Vtq5c:e7IXnIf9oxKnEYlJtqa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3728 Logo1_.exe 984 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\mk-MK\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fi-FI\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\az-Latn-AZ\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\be-BY\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe File created C:\Windows\Logo1_.exe 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe 3728 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4684 3488 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe 87 PID 3488 wrote to memory of 4684 3488 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe 87 PID 3488 wrote to memory of 4684 3488 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe 87 PID 3488 wrote to memory of 3728 3488 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe 89 PID 3488 wrote to memory of 3728 3488 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe 89 PID 3488 wrote to memory of 3728 3488 4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe 89 PID 3728 wrote to memory of 700 3728 Logo1_.exe 90 PID 3728 wrote to memory of 700 3728 Logo1_.exe 90 PID 3728 wrote to memory of 700 3728 Logo1_.exe 90 PID 700 wrote to memory of 3164 700 net.exe 92 PID 700 wrote to memory of 3164 700 net.exe 92 PID 700 wrote to memory of 3164 700 net.exe 92 PID 4684 wrote to memory of 984 4684 cmd.exe 93 PID 4684 wrote to memory of 984 4684 cmd.exe 93 PID 4684 wrote to memory of 984 4684 cmd.exe 93 PID 3728 wrote to memory of 3192 3728 Logo1_.exe 60 PID 3728 wrote to memory of 3192 3728 Logo1_.exe 60
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe"C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a1E31.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe"C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe"4⤵
- Executes dropped EXE
PID:984
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3164
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD59da0e84d01bbccdc07e6e9a99c86e67f
SHA1191abcc8acd15d0ced4af89079de05cae5fc886c
SHA2560a170ac38745b4e049e30e3a45af2fbf1dab0df153af9d216d213a526591bbe5
SHA5120216028f4feab7bb8f2ee4062544a3eba98781021e0bcce320bad3ab06b7831fbcdedffb1a24154e60643ece33ee1c33894eeca7733e10edfb3245045ff93b03
-
Filesize
722B
MD54227c5002d9b0225572da80ce6f6487a
SHA13775053900ae78f8d61435e114e36a3a0119796b
SHA256edde195ac83ccd6d7915aaceb876f93ed638f47aae24116214c8b23cdf7089b2
SHA512510f0b98c8d42c4a2f576a5fb2eb0ddd01fc4f0f2c802928297b261a8f2f902a3abe2de8fd52819f1451cc1dab3ae759ff7a02cdc9c52f6f86a5bcc573527a45
-
C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe
Filesize780KB
MD56475283568ad278b0e4f0ac03dd85a72
SHA15ef270214d6617389c02dbf0869350e76a40e857
SHA256cc1c3a68c4bc9739a1ea6b832633e409920005c6c7fa933249d5e4f3ad4d9553
SHA512afc528f8e435a2de4cece460d80311c2b40ae07d3178fdb3fa8a08c60355a8058ffe94f5aeadab84e1a108e01b00e1cf8fd0b09af6c377b611754a7196fe35ee
-
C:\Users\Admin\AppData\Local\Temp\4b17e12d9d462e7ec508e20cdeec19b3a41422ce15bec1d00180e7cd7881df83.exe.exe
Filesize780KB
MD56475283568ad278b0e4f0ac03dd85a72
SHA15ef270214d6617389c02dbf0869350e76a40e857
SHA256cc1c3a68c4bc9739a1ea6b832633e409920005c6c7fa933249d5e4f3ad4d9553
SHA512afc528f8e435a2de4cece460d80311c2b40ae07d3178fdb3fa8a08c60355a8058ffe94f5aeadab84e1a108e01b00e1cf8fd0b09af6c377b611754a7196fe35ee
-
Filesize
26KB
MD59ad92124bbe38e2706efcedebb82bd08
SHA1ea1478dc19d256bcaa2926c0908534e9750815f5
SHA256c8bca955a769c0b6a83bb24db3f4bf97514ab3a27cd1b7da7891b5755a822126
SHA512d41fcbab676e089bacfb249294f0fe6b04f93ff9bebfdd97a5f9ab8a2e5ba487fa8f6c36b3477a36ba22110343a7decbef061003c4b03ef48963350c85819ab7
-
Filesize
26KB
MD59ad92124bbe38e2706efcedebb82bd08
SHA1ea1478dc19d256bcaa2926c0908534e9750815f5
SHA256c8bca955a769c0b6a83bb24db3f4bf97514ab3a27cd1b7da7891b5755a822126
SHA512d41fcbab676e089bacfb249294f0fe6b04f93ff9bebfdd97a5f9ab8a2e5ba487fa8f6c36b3477a36ba22110343a7decbef061003c4b03ef48963350c85819ab7
-
Filesize
26KB
MD59ad92124bbe38e2706efcedebb82bd08
SHA1ea1478dc19d256bcaa2926c0908534e9750815f5
SHA256c8bca955a769c0b6a83bb24db3f4bf97514ab3a27cd1b7da7891b5755a822126
SHA512d41fcbab676e089bacfb249294f0fe6b04f93ff9bebfdd97a5f9ab8a2e5ba487fa8f6c36b3477a36ba22110343a7decbef061003c4b03ef48963350c85819ab7
-
Filesize
10B
MD5a592e6708558f3dc0ad1608608da69c5
SHA169a1224ba3b2f2ab2f2ce8b8287809f3282d20d0
SHA25624c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a
SHA51238724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1