Analysis
-
max time kernel
178s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe
Resource
win10v2004-20231020-en
General
-
Target
31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe
-
Size
1.4MB
-
MD5
b91a13d827ba32fb55c0b2576d5ad01f
-
SHA1
c1516c3bb171d0a64b26ac3c5329466f583d1a50
-
SHA256
31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953
-
SHA512
55dfa395271284880eb7881279db4d10553bfb758cdd93a52c7dca2a94bdd63e05880bb601a321786a02a940bff38dd3450df148f30102bf0fa477d724420acd
-
SSDEEP
24576:97dRxc0BCwZB2Ava3buKrnRRuo9yxyn5E1+YC4mPcWP461BFAshJO/705nzrq:97Nc8Cw72hHrnRRnk+mfC4m041Ase/7l
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2300 Logo1_.exe 3144 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe -
Loads dropped DLL 1 IoCs
pid Process 3144 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ms-MY\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\SmartSelect\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-CN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\sr-latn-cs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\Location\Shifter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square310x310\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jsaddins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sv-SE\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\accessibilitychecker\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3840 wrote to memory of 1500 3840 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe 88 PID 3840 wrote to memory of 1500 3840 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe 88 PID 3840 wrote to memory of 1500 3840 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe 88 PID 3840 wrote to memory of 2300 3840 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe 90 PID 3840 wrote to memory of 2300 3840 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe 90 PID 3840 wrote to memory of 2300 3840 31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe 90 PID 2300 wrote to memory of 4344 2300 Logo1_.exe 91 PID 2300 wrote to memory of 4344 2300 Logo1_.exe 91 PID 2300 wrote to memory of 4344 2300 Logo1_.exe 91 PID 1500 wrote to memory of 3144 1500 cmd.exe 93 PID 1500 wrote to memory of 3144 1500 cmd.exe 93 PID 1500 wrote to memory of 3144 1500 cmd.exe 93 PID 4344 wrote to memory of 5036 4344 net.exe 94 PID 4344 wrote to memory of 5036 4344 net.exe 94 PID 4344 wrote to memory of 5036 4344 net.exe 94 PID 2300 wrote to memory of 3320 2300 Logo1_.exe 73 PID 2300 wrote to memory of 3320 2300 Logo1_.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe"C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a867.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe"C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3144
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:5036
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5bddcc31874016a118e5f4f2ae5e179f6
SHA1f82c257d5a45cd443c6d58e72ba8675011653223
SHA256de899c50f6fd2ce7069e112023e197b45831a0afee61d050626f84fca44c679c
SHA512546b2ad6b795c5a0480fa2f0e0af522a02137b48dd82b682f20178ef60d976c171016ccd76493a874b43c5e2e92abcf6dac3f51971f1a1ffbab421347ad9efb9
-
Filesize
721B
MD5ec7787c6edeecc1c4e21ef93f5f5e874
SHA17d6c9d98e564a15db5b4c7fa5c2d969badec2f40
SHA256945685a5a09a4559dc1859c70c69ada699c25e59f9696bc09bedfc53041a267a
SHA512299327d2e4276ac5d32d5715e4626f6a1a7288c2f4a6e1ad87273a5d0f0cdd4b87db174d42d8e41c629115d7febaba85a182ef7fba140bed50287d77508721bc
-
C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe
Filesize1.3MB
MD50e7f3447201121978fa8c30c64d77591
SHA1639425445d9e396b888b1cb29a4ab6a6770c9ac5
SHA256c65862a2655ed1aef35d3c8bbf279ffe970a1faef1d7d1c45c4ad480e755acbf
SHA512ff7f637b622b35ac297f7b3bc6643c27545fa41355dfd11e56a133ecac9bbe34a22e7f8caca93ae00769fbd7dac8ff999a16e6aa4f1ec1e8276367418f3e2c0b
-
C:\Users\Admin\AppData\Local\Temp\31ea3a50951d923e3af7c56683b4647c485afebb062fa936331c1322b55fd953.exe.exe
Filesize1.3MB
MD50e7f3447201121978fa8c30c64d77591
SHA1639425445d9e396b888b1cb29a4ab6a6770c9ac5
SHA256c65862a2655ed1aef35d3c8bbf279ffe970a1faef1d7d1c45c4ad480e755acbf
SHA512ff7f637b622b35ac297f7b3bc6643c27545fa41355dfd11e56a133ecac9bbe34a22e7f8caca93ae00769fbd7dac8ff999a16e6aa4f1ec1e8276367418f3e2c0b
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
10B
MD5efd2ef11e05f1e4e71c36b61f42f4b74
SHA166f050470e42f08b4f86a669c0c3e7739d334585
SHA256c4d0fb64b84374af29c373ad1807dd661605dc6714e45c6617f7f5c537b9c5f4
SHA51230402f761b30147ad56861e2c5da6b70c5a9056cf6b582a5c333b9f867259fd42bb2e18c8d8a43762a9365e7147d624e13f0356d307535863ba0b2c9567e486b