Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe
Resource
win10v2004-20230915-en
General
-
Target
6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe
-
Size
239KB
-
MD5
d15e762f5c2a945e4d80ff6402c7ec7a
-
SHA1
71de57c98c2294c8ead277af7f394073495e7834
-
SHA256
6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07
-
SHA512
141bc5d03ed90a7d01decfaa4256f56e4f4ce4ff552ba95d1670e362eb53283ddc621ebc24e25bb0e65c72314d0c066bae23a06d8ddb2f0008ed84d45f1d6465
-
SSDEEP
3072:6ftffjmNbqcVz5fzsTl4dsOc6v2vTzwU+Pho86meq+FaSoB2+vSHrX:6VfjmNecT93PiY+Fa7BdvGX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5068 Logo1_.exe 3180 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-standard\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\en\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\el-GR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\NavigationIcons\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\ModifiableWindowsApps\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Work\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\winsdkfb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\offer_cards\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fr-FR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sl-SI\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe 5068 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 436 wrote to memory of 5032 436 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe 84 PID 436 wrote to memory of 5032 436 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe 84 PID 436 wrote to memory of 5032 436 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe 84 PID 436 wrote to memory of 5068 436 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe 85 PID 436 wrote to memory of 5068 436 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe 85 PID 436 wrote to memory of 5068 436 6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe 85 PID 5068 wrote to memory of 1408 5068 Logo1_.exe 86 PID 5068 wrote to memory of 1408 5068 Logo1_.exe 86 PID 5068 wrote to memory of 1408 5068 Logo1_.exe 86 PID 1408 wrote to memory of 1076 1408 net.exe 89 PID 1408 wrote to memory of 1076 1408 net.exe 89 PID 1408 wrote to memory of 1076 1408 net.exe 89 PID 5032 wrote to memory of 3180 5032 cmd.exe 90 PID 5032 wrote to memory of 3180 5032 cmd.exe 90 PID 5032 wrote to memory of 3180 5032 cmd.exe 90 PID 5068 wrote to memory of 3184 5068 Logo1_.exe 34 PID 5068 wrote to memory of 3184 5068 Logo1_.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe"C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aDBE9.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe"C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe"4⤵
- Executes dropped EXE
PID:3180
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1076
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5a061339d4e7835889bd9c009b1ad6c89
SHA144ff6b0354d956a7409ffeb55e93878aa19b3fb6
SHA256f8aca0e6079e6e5c5e36f02b6a9f388feac3a6a68145bb258cc97872c2de7877
SHA512bc4a5c7b2bf9ab7e505e827d42309fe95d86fc1355d6c8b804435b5ac7ef79d0a4cc6c3d45fe2e64cac11df1efc6bfa77fefc954a83fde3443185edcb8725f99
-
Filesize
722B
MD5c1041311ba25da7a4128a059d53ffee8
SHA1291e3b7d5bcee89625c070894a51e97b76070fe5
SHA256e0f7b97a98086bfbafdad762f191ab8404a448f1d8c40bee42243c8bd772b34c
SHA512352940b168f919e947c1a33df4af6824d90afd49f5d86b348656861a657ab4d1081f6dadf15d223c37c916245583d20402705dcec46d3717c0883a1a388dadab
-
C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe
Filesize213KB
MD520d89d1781cde87db3a8b59da816efcc
SHA14f6670c4dcd8d978b21d1db91e081e609f5abcd0
SHA2564653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983
SHA5127b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e
-
C:\Users\Admin\AppData\Local\Temp\6beca5b2f1bd203825c9414630a735957399c7e97dca46ce6e75351f9f604f07.exe.exe
Filesize213KB
MD520d89d1781cde87db3a8b59da816efcc
SHA14f6670c4dcd8d978b21d1db91e081e609f5abcd0
SHA2564653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983
SHA5127b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
10B
MD5743754b59d55d26c081d8f839a3662c8
SHA18e88e3bda53f58b9122f6f9c9a5f23f80e7be6c7
SHA256bbb0f1aae4572c821fac1d6b7890df67d9f4a7576af30e70925192dded063e8b
SHA5121e8d9e5e1651bd2aaef969713d949cc4ddab58c53d0be31392d660aedeb621a0f968196e4938d2ba75e40ebdb7557cee23bf5587877268cb087fdd09a8abba1b