Analysis
-
max time kernel
158s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe
Resource
win10v2004-20231023-en
General
-
Target
ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe
-
Size
409KB
-
MD5
34fc0ae3f1e749d1f4df77c9c0558449
-
SHA1
c3834a34187e509b4072e0c7cf2091577ff22542
-
SHA256
ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960
-
SHA512
fd7982dfa8bb289cc5d256f053a461cd7dedc302d4409e9fbc2c10e2c76abbc24a5950b851d7e7423c0da4b6561a250cc9ae026c5593d028b62d293a1f008c89
-
SSDEEP
12288:27+Qq66c7dFWoGkXjEi356po1g0IyQhxBS:27xq66boRXj53Ko+0VQhxBS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4696 Logo1_.exe 1264 ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Multimedia Platform\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe File created C:\Windows\Logo1_.exe ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4008 2864 ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe 90 PID 2864 wrote to memory of 4008 2864 ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe 90 PID 2864 wrote to memory of 4008 2864 ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe 90 PID 2864 wrote to memory of 4696 2864 ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe 92 PID 2864 wrote to memory of 4696 2864 ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe 92 PID 2864 wrote to memory of 4696 2864 ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe 92 PID 4008 wrote to memory of 1264 4008 cmd.exe 93 PID 4008 wrote to memory of 1264 4008 cmd.exe 93 PID 4008 wrote to memory of 1264 4008 cmd.exe 93 PID 4696 wrote to memory of 4428 4696 Logo1_.exe 94 PID 4696 wrote to memory of 4428 4696 Logo1_.exe 94 PID 4696 wrote to memory of 4428 4696 Logo1_.exe 94 PID 4428 wrote to memory of 4800 4428 net.exe 96 PID 4428 wrote to memory of 4800 4428 net.exe 96 PID 4428 wrote to memory of 4800 4428 net.exe 96 PID 4696 wrote to memory of 3232 4696 Logo1_.exe 59 PID 4696 wrote to memory of 3232 4696 Logo1_.exe 59
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe"C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5D6D.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe"C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe"4⤵
- Executes dropped EXE
PID:1264
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4800
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5c262c061be539fcc09d92671af719194
SHA10b8bcde0a8baf94871b5bedb6bde235f3083d9b1
SHA2565ff5c17948967c953360f3bae836e6234b3696c4334a5426928cb0b7d177474a
SHA512d46e14b7bb15453e0c8e1ae98004ce570903ea15a8ccc3c1a7bfa9c94b98e2b807b64b00e7d65faa32b2f7c98ce8480715157312e329a046bd591261dc4ba22b
-
Filesize
722B
MD5045f28fa1d6f15b5156dbf27d1e909d5
SHA1dc710dc825770415beba6e79c8dd9f44e2e672ac
SHA256d6fb0496d48a23f9784559eb3a5307047862d4dab57cc378ed1af90153701517
SHA512c1b83edd370dc49540e1d7c97f8b746e53ec6e03f0149feda68e9a8c66a3042bc0c5ecd39ad8ffd813742e1016a0021729d3019260c96f5e7af3e9c946a5b81b
-
C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe
Filesize383KB
MD58f6b97b4cbea59c5636520f2e85e745b
SHA1c6fe033113de1d973b74d2a8460cae0be3fe128c
SHA2568f28975a831164b273311144e5e3430be5418089b88c488b1791937fd7975f49
SHA5123d226460c11523d4f73da7b9fc05e8e7f660dceadebddf97d11a1ce7426fd5f5db5119c35becd4c7bf95966f84a0e7de125930d62a486c3ae2aa8efad0e0355e
-
C:\Users\Admin\AppData\Local\Temp\ed265ec5c9af3bf6eeae213ec837641ab552773be45279e22d468fabf2008960.exe.exe
Filesize383KB
MD58f6b97b4cbea59c5636520f2e85e745b
SHA1c6fe033113de1d973b74d2a8460cae0be3fe128c
SHA2568f28975a831164b273311144e5e3430be5418089b88c488b1791937fd7975f49
SHA5123d226460c11523d4f73da7b9fc05e8e7f660dceadebddf97d11a1ce7426fd5f5db5119c35becd4c7bf95966f84a0e7de125930d62a486c3ae2aa8efad0e0355e
-
Filesize
26KB
MD571dd1e3988fda59f7add057ee3332f56
SHA1562b2d92947ec6e8555862f9f72439f3456dda57
SHA256bd01533974f5c0e33db4535fa5cedbb2e6be6e6ec7045be915765ed1706d760d
SHA512d2d4233ef6cdd8cdef77c475fe35f60b74bebce71dda7707876ba29a9c282f7d8a88c4baf85726fbf352af500f83e4acb521cb0fec5042ef4066bb688a0f8cca
-
Filesize
26KB
MD571dd1e3988fda59f7add057ee3332f56
SHA1562b2d92947ec6e8555862f9f72439f3456dda57
SHA256bd01533974f5c0e33db4535fa5cedbb2e6be6e6ec7045be915765ed1706d760d
SHA512d2d4233ef6cdd8cdef77c475fe35f60b74bebce71dda7707876ba29a9c282f7d8a88c4baf85726fbf352af500f83e4acb521cb0fec5042ef4066bb688a0f8cca
-
Filesize
26KB
MD571dd1e3988fda59f7add057ee3332f56
SHA1562b2d92947ec6e8555862f9f72439f3456dda57
SHA256bd01533974f5c0e33db4535fa5cedbb2e6be6e6ec7045be915765ed1706d760d
SHA512d2d4233ef6cdd8cdef77c475fe35f60b74bebce71dda7707876ba29a9c282f7d8a88c4baf85726fbf352af500f83e4acb521cb0fec5042ef4066bb688a0f8cca
-
Filesize
10B
MD503d3ebeca3d19630e02fda3c0e9d35b3
SHA156283b1f54235b653d0224cca2e3bbf10a0f7ae1
SHA256865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163
SHA512e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b