Analysis
-
max time kernel
6s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe
Resource
win10v2004-20230915-en
General
-
Target
5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe
-
Size
91KB
-
MD5
c699455b19fc2de1a483b9b4e376acc7
-
SHA1
afdb7f33050a882135407d962479318453c7c2aa
-
SHA256
5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c
-
SHA512
e93a9fa4554c09674b37682c7ac41f980ccaaa0e27065218998264aecd2337889ae2ed943d0c49d28d2b5046879ceada21ff43bf4fa50cdeb2058d207023476d
-
SSDEEP
1536:zHgfgLdQAQfcfymNEq7pt9h0kwz9jE4pwqyo8Cy/:bgftffjmNE8pPhnwpwELyo8Cy/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3588 Logo1_.exe 4900 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe File created C:\Windows\Logo1_.exe 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3392 wrote to memory of 2616 3392 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe 85 PID 3392 wrote to memory of 2616 3392 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe 85 PID 3392 wrote to memory of 2616 3392 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe 85 PID 3392 wrote to memory of 3588 3392 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe 86 PID 3392 wrote to memory of 3588 3392 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe 86 PID 3392 wrote to memory of 3588 3392 5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe 86 PID 3588 wrote to memory of 4744 3588 Logo1_.exe 88 PID 3588 wrote to memory of 4744 3588 Logo1_.exe 88 PID 3588 wrote to memory of 4744 3588 Logo1_.exe 88 PID 4744 wrote to memory of 4640 4744 net.exe 90 PID 4744 wrote to memory of 4640 4744 net.exe 90 PID 4744 wrote to memory of 4640 4744 net.exe 90 PID 2616 wrote to memory of 4900 2616 cmd.exe 91 PID 2616 wrote to memory of 4900 2616 cmd.exe 91 PID 2616 wrote to memory of 4900 2616 cmd.exe 91 PID 3588 wrote to memory of 2504 3588 Logo1_.exe 58 PID 3588 wrote to memory of 2504 3588 Logo1_.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe"C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9952.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe"C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe"4⤵
- Executes dropped EXE
PID:4900
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4640
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD51d8d85496dcdba529c63337e30ca73b1
SHA116df9ee16bb94ddd6f5a1793df13985028894763
SHA256f79d301339ff32a16449e488f27ab6be167a11f5fc635040256d6cbce72004d1
SHA5127b89e911849ce3d3e71469b3d2c91edefd2f55d54780bf43478e570f124fdcc08f105e3257c6926f12ca75bb71ec7b9373a8566d25cb2e766f1f00c14edf8700
-
C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe
Filesize65KB
MD5a2c35c9d3309970ebc36177455538f0c
SHA17ff8f15b5fde2eae6802bba1fe1c74e344ff1b21
SHA2564c5766790d6abf25a17ee9776b0f996f7f1e41adda5abd617e8f31d9edc106ee
SHA5129432b7f5e7abe7cb1bd5bb9bc268f6f318d6b9d2658856174a898cb96895048ef1bf5e09db663cbfb5eb3ec340b11c995acc3c8e26e2f8288dbdfe1d3f052628
-
C:\Users\Admin\AppData\Local\Temp\5585c980da66908742bdc2bc1aa7432c804345f48a8f49fee9aa260e1811997c.exe.exe
Filesize65KB
MD5a2c35c9d3309970ebc36177455538f0c
SHA17ff8f15b5fde2eae6802bba1fe1c74e344ff1b21
SHA2564c5766790d6abf25a17ee9776b0f996f7f1e41adda5abd617e8f31d9edc106ee
SHA5129432b7f5e7abe7cb1bd5bb9bc268f6f318d6b9d2658856174a898cb96895048ef1bf5e09db663cbfb5eb3ec340b11c995acc3c8e26e2f8288dbdfe1d3f052628
-
Filesize
26KB
MD5adbda036baea601655cfb79bf4de55c8
SHA13ce1f014f615ff65f8e9b2499104d26078a9264c
SHA256eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0
SHA5121784f2999256fa043ae247b6b677b9065bbb0259229e04ab8afd92433817c18c141f6a58a3052f6f5b6772b620f64ddb55b17eeb9069785dbf0017af1b3368ea
-
Filesize
26KB
MD5adbda036baea601655cfb79bf4de55c8
SHA13ce1f014f615ff65f8e9b2499104d26078a9264c
SHA256eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0
SHA5121784f2999256fa043ae247b6b677b9065bbb0259229e04ab8afd92433817c18c141f6a58a3052f6f5b6772b620f64ddb55b17eeb9069785dbf0017af1b3368ea
-
Filesize
26KB
MD5adbda036baea601655cfb79bf4de55c8
SHA13ce1f014f615ff65f8e9b2499104d26078a9264c
SHA256eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0
SHA5121784f2999256fa043ae247b6b677b9065bbb0259229e04ab8afd92433817c18c141f6a58a3052f6f5b6772b620f64ddb55b17eeb9069785dbf0017af1b3368ea