Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:30
Static task
static1
Behavioral task
behavioral1
Sample
6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe
Resource
win10v2004-20231215-en
General
-
Target
6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe
-
Size
46KB
-
MD5
7a61f04cc09eea2a5c71f330e1793c51
-
SHA1
b17cfe013d24dfd22f2c66eb862dfd602678daba
-
SHA256
6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc
-
SHA512
52bcd86d19cfb0e8950148c39f38a077b439e93f71f281ae71e23e36c90582c1ebe049d3602189fee022817b959fca3c7ccf5070a9621bd1068ec598ff08dc1f
-
SSDEEP
768:Lo1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLzXqv82FVvh:efgLdQAQfcfymNv6v1h
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4956 Logo1_.exe 2420 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\pl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-150_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\zh-Hant\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Controls\EndOfLife\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Controls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-standard\theme-dark\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe File created C:\Windows\Logo1_.exe 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe 4956 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe 2420 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1096 2780 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe 90 PID 2780 wrote to memory of 1096 2780 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe 90 PID 2780 wrote to memory of 1096 2780 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe 90 PID 2780 wrote to memory of 4956 2780 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe 92 PID 2780 wrote to memory of 4956 2780 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe 92 PID 2780 wrote to memory of 4956 2780 6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe 92 PID 4956 wrote to memory of 1440 4956 Logo1_.exe 93 PID 4956 wrote to memory of 1440 4956 Logo1_.exe 93 PID 4956 wrote to memory of 1440 4956 Logo1_.exe 93 PID 1096 wrote to memory of 2420 1096 cmd.exe 95 PID 1096 wrote to memory of 2420 1096 cmd.exe 95 PID 1096 wrote to memory of 2420 1096 cmd.exe 95 PID 1440 wrote to memory of 3280 1440 net.exe 96 PID 1440 wrote to memory of 3280 1440 net.exe 96 PID 1440 wrote to memory of 3280 1440 net.exe 96 PID 4956 wrote to memory of 3480 4956 Logo1_.exe 47 PID 4956 wrote to memory of 3480 4956 Logo1_.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe"C:\Users\Admin\AppData\Local\Temp\6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3A06.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe"C:\Users\Admin\AppData\Local\Temp\6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3280
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5e28318d6b1324fe9925b5892d4204fdd
SHA1554e8699aa60770608066690834febfab56cffb3
SHA256ad3b2c95dc3c3202c8699f84f420e364b4417fbe9630294ca2c3bda6a0805bbb
SHA5123e475cba03138c5b3212722e05c9fed0acb7aef86294ccbfba832c81b09e760dc3100c5cb8e10a5ee9499d6c6f1e6f1e2d1f48f0bea91e6435ab0fa8e8ce4eb9
-
Filesize
722B
MD5d0f4a66e827aaed99a03c062ce1cd8b6
SHA1b94f79373e59be4107d34b76d8b63bf544f1fcab
SHA256519eb1c9fd4eecb9bad76f2c74210d53d024b57673e8dd2e806339bf0d2c7308
SHA512fdfbd8aa2aff7fcb917c386b51ec6ee4ece0b37c8b6d04bfce60078513b071c03d9ede50522ce9d4fa45fbe6ae49e33e1895b7148df71106d7b81b7ade5b3dab
-
C:\Users\Admin\AppData\Local\Temp\6f4ae57cd68ba3152b5ace98d3aa5ef24b2e8b5291a91734bec6d07b8a7343fc.exe.exe
Filesize20KB
MD546eff666c94e3f7cf93ce87feb23af51
SHA1fdb4d2878166c547b4fb61996f673ae345c2415c
SHA2565115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742
SHA5126f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b
-
Filesize
26KB
MD56ad5408b0f8b4954bdd0d35a7ad33ad5
SHA1eb194247ed35c5ada3bc2843b2253517aff53468
SHA256ad6fddec2546fd9ea19542320a4a271512df03edc6e635ba70bc820a7529c3a6
SHA5122464d75e5ac13379c2ca15f70b9b2fcde85d5f616f31955970c07a3c03b3e8be6f0d25364d9eb934e150d417e669b9c26c789df56da304c1528d8f49bf366b23
-
Filesize
10B
MD5fe9b9583606636183df7abeebc086acc
SHA1f7ff4f3c6b67dd97e9af553c62cc8d876739237c
SHA25646502680c9b2f0e257b18463d84c1229974e57a13756d6f4a2fe25f41e2d05bc
SHA51212a615fc2aa2493aa0c2a620683c5edbc3f3c9d95cbc9fde4da1eb6e3261a9557df78f521347a656f7ff338f7bff41a5d02f5ed6de5c3243adc16a00acf324a5