Analysis
-
max time kernel
116s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe
Resource
win10v2004-20231023-en
General
-
Target
a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe
-
Size
3.4MB
-
MD5
ba28fceeae6be85d8802b6fe7a78d2b0
-
SHA1
f4515943b2958cfd3eef1c18cd6cde09b48e7148
-
SHA256
a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd
-
SHA512
b890ab04534d23838092b845c1a93b444e9244fd0c5e6ca15f7543b310c0247fb2f3e851160cfc1f2151b6e8ad19dee0d49fc9658aab159c025800e68ac4e4e0
-
SSDEEP
49152:x7k2o5B4fySm4ldRpm7YJPoTrK92EGK72a4XfLGXS+OwX10otPXwYdGSBb+6mhW3:W2oZgdRpmEJPh92q4jG7yohwYkYb1feU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 400 Logo1_.exe 4912 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-standard\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-MX\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\SplashScreen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.1813.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe Logo1_.exe File created C:\Program Files\Microsoft Office 15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sv-SE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe File created C:\Windows\Logo1_.exe a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 4912 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 4912 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 4912 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 4912 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe 400 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3528 4864 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 86 PID 4864 wrote to memory of 3528 4864 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 86 PID 4864 wrote to memory of 3528 4864 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 86 PID 4864 wrote to memory of 400 4864 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 88 PID 4864 wrote to memory of 400 4864 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 88 PID 4864 wrote to memory of 400 4864 a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe 88 PID 400 wrote to memory of 2316 400 Logo1_.exe 90 PID 400 wrote to memory of 2316 400 Logo1_.exe 90 PID 400 wrote to memory of 2316 400 Logo1_.exe 90 PID 3528 wrote to memory of 4912 3528 cmd.exe 92 PID 3528 wrote to memory of 4912 3528 cmd.exe 92 PID 3528 wrote to memory of 4912 3528 cmd.exe 92 PID 2316 wrote to memory of 1364 2316 net.exe 91 PID 2316 wrote to memory of 1364 2316 net.exe 91 PID 2316 wrote to memory of 1364 2316 net.exe 91 PID 400 wrote to memory of 3304 400 Logo1_.exe 55 PID 400 wrote to memory of 3304 400 Logo1_.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe"C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE14.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe"C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1364
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5fe3c0915b18cdcfd2e6d8e541fbcff49
SHA1d4b2ea24a4cf9484f635ee70d4362542ff897b45
SHA25692f9b9cac114bcd198f3a08fb197d569b0c07d0c3b8058443a61d2813631fcb7
SHA51238059db3bea09b9e6f705269f4f0dbef720d9a36b735830bdd930c554e6182b52eee93fa24b577b5262d1f8f9a9975b943cfdcdefe456a77a52eb89c032d22e3
-
Filesize
484KB
MD54b659fca10ac85acf9fe2ff2c868e6fb
SHA18214964a49fff64a3b3348f3ae48a1ec358b29da
SHA256aeb297804b4454a5adee5cb716ce4d4eb7424be928c27e6bb6cf04868a1b91d3
SHA5124d1803cd74f0faf2ded523cca4d08aa6e068b4e8c7e2f56fb851bc121c57762acf664985636ea7fd6bb32cc69ef7ba77bdf140f03cb49c6beb996d6c2616c07b
-
Filesize
721B
MD502e1e05ee0ef474685e75df685660b21
SHA130ac4ecd414447f3583b49f7b1f9330df6072187
SHA2561a633b48c1c4575e5e7ac2bc3e610a939fd01266451d76c9bbdb15a8c4588939
SHA512c6663237b29d9ae92da6cb639a9f00c477b5e47d42e0a73d3245464d5e29eab081e266f44b6ddc26abf7126d37dac78c5e5eb6f55cb1dab2f000fbdf2592a554
-
C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe
Filesize3.4MB
MD5e3215dcff91c5b77302252eb3fd54dea
SHA1be5f1bf9ed7a5bce8b728a0d284bfddcbbbca815
SHA25609a8a4d829cbceb3b7f13343d481ec1c51420cdbe5c8ffc728d4e8fb3cf6f927
SHA5120f831f8a6435be7ae9f9a50a012389305f182fc5bc90d838a42af7bed79c1cfd51e6cdb399d3536241529d4210289fa76903e863ad965e53ed446c221d4c5f63
-
C:\Users\Admin\AppData\Local\Temp\a174bc81b194db9c1b50bdd0433c942a05b49dc911e7c5a008282ab53f71d5fd.exe.exe
Filesize3.4MB
MD5e3215dcff91c5b77302252eb3fd54dea
SHA1be5f1bf9ed7a5bce8b728a0d284bfddcbbbca815
SHA25609a8a4d829cbceb3b7f13343d481ec1c51420cdbe5c8ffc728d4e8fb3cf6f927
SHA5120f831f8a6435be7ae9f9a50a012389305f182fc5bc90d838a42af7bed79c1cfd51e6cdb399d3536241529d4210289fa76903e863ad965e53ed446c221d4c5f63
-
Filesize
26KB
MD5f6dcc7601bfee4410b3b95af8ef15b79
SHA1a10a8983ff50f3f73022ee804ec391ed5d47ff5f
SHA256521365ec23aafafa12cce3816a31f0f682def1dc5f249c1be9d0b7388f7553d5
SHA512dd7fde23bd6e347711d7cb93a44d08829f3a38f2b772ae4842df09f26b1d19a02495cba7e1e1f08322cce0bc2294e3a8c109f446f98edbfc7e603ac3c46f55a3
-
Filesize
26KB
MD5f6dcc7601bfee4410b3b95af8ef15b79
SHA1a10a8983ff50f3f73022ee804ec391ed5d47ff5f
SHA256521365ec23aafafa12cce3816a31f0f682def1dc5f249c1be9d0b7388f7553d5
SHA512dd7fde23bd6e347711d7cb93a44d08829f3a38f2b772ae4842df09f26b1d19a02495cba7e1e1f08322cce0bc2294e3a8c109f446f98edbfc7e603ac3c46f55a3
-
Filesize
26KB
MD5f6dcc7601bfee4410b3b95af8ef15b79
SHA1a10a8983ff50f3f73022ee804ec391ed5d47ff5f
SHA256521365ec23aafafa12cce3816a31f0f682def1dc5f249c1be9d0b7388f7553d5
SHA512dd7fde23bd6e347711d7cb93a44d08829f3a38f2b772ae4842df09f26b1d19a02495cba7e1e1f08322cce0bc2294e3a8c109f446f98edbfc7e603ac3c46f55a3
-
Filesize
10B
MD51ac6500de33f973231298e1a1e1e7b38
SHA1ab3a765fb39e758f638f6b49a841300ec61ff961
SHA256f1e760f9e9b5eaeaa02cb5ca5dfc3ef6a19147a66053ed02ac52b7e2ce05a050
SHA51225253907de7da7ecca0a76dfd1fb864992bc6bc092f29efb789ec2ad4d70aba377e0e28b4f64f602818ba9aefa83dc3454f07c58efdb90f38e0831354ce53f37