Analysis
-
max time kernel
157s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe
-
Size
1.5MB
-
MD5
753c7fd0ba0f76c3b6e274b758793220
-
SHA1
7f517a3c6a039f8773aa29cf3aa8527c9e0e3eb6
-
SHA256
3493264693811ad58a06b7fc211114b3fdd5799dba9cc8979a0975bccfd1ccb3
-
SHA512
b283485873a43c542acc419891c02f68c312eac70b163d5351592933ea45398a7ad529dfc953ea80c53b3d169cfeab22943dc129ff74f36daa81091962786655
-
SSDEEP
24576:q7iiVkn5RQy0D8LioTSTqGOc4BJrqK/lGNrIQ7ZcYYrWBvO0yjm04HW:q7CIgBJJ/6EQ7ZcYYrwvof
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4108 Logo1_.exe 2672 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lt-LT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lv-LV\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\archives\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-CN\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-TW\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\CoreEngine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\typing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\stickers\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Dial\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kk-KZ\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\Assets\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe File created C:\Windows\Logo1_.exe NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe 4108 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4944 4160 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe 91 PID 4160 wrote to memory of 4944 4160 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe 91 PID 4160 wrote to memory of 4944 4160 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe 91 PID 4160 wrote to memory of 4108 4160 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe 93 PID 4160 wrote to memory of 4108 4160 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe 93 PID 4160 wrote to memory of 4108 4160 NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe 93 PID 4108 wrote to memory of 4572 4108 Logo1_.exe 94 PID 4108 wrote to memory of 4572 4108 Logo1_.exe 94 PID 4108 wrote to memory of 4572 4108 Logo1_.exe 94 PID 4944 wrote to memory of 2672 4944 cmd.exe 96 PID 4944 wrote to memory of 2672 4944 cmd.exe 96 PID 4944 wrote to memory of 2672 4944 cmd.exe 96 PID 4572 wrote to memory of 3912 4572 net.exe 97 PID 4572 wrote to memory of 3912 4572 net.exe 97 PID 4572 wrote to memory of 3912 4572 net.exe 97 PID 4108 wrote to memory of 3204 4108 Logo1_.exe 58 PID 4108 wrote to memory of 3204 4108 Logo1_.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a43AB.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.753c7fd0ba0f76c3b6e274b758793220_JC.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2672
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3912
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5c7fe0e66a9253408aeb5a6bc9c37fd5a
SHA133d6adfa0ff9ed9dc75d38294b2840ef555a98a2
SHA25664a934607ae7f56617217ec9f21a592d1472593bba48f3264cfd6e36d76e431f
SHA5126515110f638520ff38168a1765a370dffed9076e0c128777b2050d896994801e136588efacb5221db422e5fed9ea8c2429cbda2a3dab5f477e1e80725fcc638f
-
Filesize
578B
MD5a97c0149a6316405b0b5dc731d85eefa
SHA1874da766b5bf2c0adb117a20b249e9b2ed2d0b86
SHA25689bd4f40bc5ad4b5f02a6c303404570f5b1bc3cd26c954dbf0bc59db5f5501e2
SHA51214c68d04e0d88c800226f886ede57548dec7845d962979836c1c357e9679ba9fb9aa2b7dd694e954048867ad2f859178f313537179b4c68e5933b6920b7a5a3f
-
Filesize
1.5MB
MD551534ec306e39f9687ca39902578f5d1
SHA176b09076f689a68e979f766239f3d84b24e7e4c8
SHA256bfe375706279b86092147e0b19000962c56ca9c8e34f308a26a39f825c643ec3
SHA5127c52f8e2b1b6eeb6e842759ee0187b2dce25544bbf5e7c3c33c404280d9f07f75150119cbf720dcd668d2978d18ddeddc475c166bcb647741b7f73269c90cfa1
-
Filesize
1.5MB
MD551534ec306e39f9687ca39902578f5d1
SHA176b09076f689a68e979f766239f3d84b24e7e4c8
SHA256bfe375706279b86092147e0b19000962c56ca9c8e34f308a26a39f825c643ec3
SHA5127c52f8e2b1b6eeb6e842759ee0187b2dce25544bbf5e7c3c33c404280d9f07f75150119cbf720dcd668d2978d18ddeddc475c166bcb647741b7f73269c90cfa1
-
Filesize
26KB
MD55de1896254bed3e2fa998b40d865d2fe
SHA16d888895d007e0f6f63c93a1e2e3b1a2b8c8b2a3
SHA2564cd6bfa999fcbdfb3c9fe3986e6890649ea613058872fa6bf7f3433d4e0bcb6d
SHA5123e2db69af11f558a669e363ace8ffb1a32663daa9a89e647c21e2908ab0de9d9afbed8fc966192c18e03d7f4180f70a6c3d9d2bb17df5955c1519ac6429d179a
-
Filesize
26KB
MD55de1896254bed3e2fa998b40d865d2fe
SHA16d888895d007e0f6f63c93a1e2e3b1a2b8c8b2a3
SHA2564cd6bfa999fcbdfb3c9fe3986e6890649ea613058872fa6bf7f3433d4e0bcb6d
SHA5123e2db69af11f558a669e363ace8ffb1a32663daa9a89e647c21e2908ab0de9d9afbed8fc966192c18e03d7f4180f70a6c3d9d2bb17df5955c1519ac6429d179a
-
Filesize
26KB
MD55de1896254bed3e2fa998b40d865d2fe
SHA16d888895d007e0f6f63c93a1e2e3b1a2b8c8b2a3
SHA2564cd6bfa999fcbdfb3c9fe3986e6890649ea613058872fa6bf7f3433d4e0bcb6d
SHA5123e2db69af11f558a669e363ace8ffb1a32663daa9a89e647c21e2908ab0de9d9afbed8fc966192c18e03d7f4180f70a6c3d9d2bb17df5955c1519ac6429d179a
-
Filesize
9B
MD56029ce528adbc1284163cdd2b27a082e
SHA1a2f23e1d5101c3b6929686a2d5711c2af2dec1b7
SHA2565036deecfbb090aa7f7c21c159b1921df0cf23eedafb7e0c208668ad82872dae
SHA512a661e939e69a59f88fd86fa654371ba4b3e3e8faf5c1b39bdaa0def8b277b26b63e96d4f5eb047ca3d8888597165dc709f395eeaf333c25c9cf56441c31dd676