Analysis
-
max time kernel
164s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
Resource
win10v2004-20230915-en
General
-
Target
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
-
Size
219KB
-
MD5
362bff72d4a1d8d1b52e6dec620272f2
-
SHA1
f41957154db4efc1949717b9d1a0d784df47b038
-
SHA256
6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f
-
SHA512
6a85807d8b772ce2f70813ebdb285976dec8a9be5684345db9b95b3b7a72184c920872c316a07ceedfa6c8ed0c6c97d4eaad1933acf671949a4acb00194bd87a
-
SSDEEP
3072:pykuJVLjZ5/v+1oOAFJ1LQjoT9T+WE+CHxTEnAdL/frrcJ+Q5S75nzU6DER:5uJN9OIJ1MoTpLCHxTEnAdrcJun/ER
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 776 Logo1_.exe 3848 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe File created C:\Windows\Logo1_.exe 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe 776 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4628 1856 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 88 PID 1856 wrote to memory of 4628 1856 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 88 PID 1856 wrote to memory of 4628 1856 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 88 PID 1856 wrote to memory of 776 1856 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 89 PID 1856 wrote to memory of 776 1856 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 89 PID 1856 wrote to memory of 776 1856 6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe 89 PID 776 wrote to memory of 2292 776 Logo1_.exe 91 PID 776 wrote to memory of 2292 776 Logo1_.exe 91 PID 776 wrote to memory of 2292 776 Logo1_.exe 91 PID 4628 wrote to memory of 3848 4628 cmd.exe 93 PID 4628 wrote to memory of 3848 4628 cmd.exe 93 PID 2292 wrote to memory of 1744 2292 net.exe 94 PID 2292 wrote to memory of 1744 2292 net.exe 94 PID 2292 wrote to memory of 1744 2292 net.exe 94 PID 776 wrote to memory of 3136 776 Logo1_.exe 60 PID 776 wrote to memory of 3136 776 Logo1_.exe 60
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4929.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe"4⤵
- Executes dropped EXE
PID:3848
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
487KB
MD57933abe48809ab31e0918d9e179da33b
SHA1f85cc9e1049e57ec6da464a404a926d43119fd0f
SHA256ab2d9f6b589b63d388bcf8ea14bfc2dd0ad18fb0bb82db5f13bebe75ce990856
SHA512dfb982067c6daa2ec19b9b6e0e92be11a9784a06ef9c5b239fc12c84cada1dfa4252512253afdd052aba5940928b58eff8ffb479e1a68a1b685491948030f21a
-
Filesize
9B
MD5872506f1dadcc0cedd1e9dee11f54da4
SHA1d1e87145ed1d918f10ae4e93ccdbb994bc906ed5
SHA256a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104
SHA5126cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c
-
Filesize
722B
MD59890ee88fd062d45026e061b332b7f7a
SHA1f3b571ef8f576384ef5e18bf4c70428d4f9bb2ce
SHA256d1634d483c939270f2e84bee9f25a5c06b5f7114911c13903de7fa63348b8631
SHA512051eb1e561fb43f250624e5fa5dbc218f615cb18de98d2b626873ac0f81d7381d2a9bf79ecf5f4b6095d2553ba23c6413902720c42cff1c20056503c1cc467f4
-
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe
Filesize190KB
MD522f7ac91c7ffe88a17eaf9224182ebe0
SHA1f459180230fe61638339876450328581c93f41f0
SHA2561c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e
SHA51207d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02
-
C:\Users\Admin\AppData\Local\Temp\6473b1b4afe8da859f6b0cbac1f33be9e826a703baf6218199bbf5629ace017f.exe.exe
Filesize190KB
MD522f7ac91c7ffe88a17eaf9224182ebe0
SHA1f459180230fe61638339876450328581c93f41f0
SHA2561c3ca06fa431bdf123f8bab5e71a691078fe694886002382e52ecf9da7165b7e
SHA51207d988d6df58fbf7a260a8a7c1155a999f50cf162950232b68e63fb38e28c25b35781f5a6f4ffbec9f3c60e266c41fb98bcb182ab7a6b71203f8476d94251d02
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
10B
MD5a592e6708558f3dc0ad1608608da69c5
SHA169a1224ba3b2f2ab2f2ce8b8287809f3282d20d0
SHA25624c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a
SHA51238724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1