Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe
Resource
win10v2004-20240412-en
General
-
Target
bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe
-
Size
262KB
-
MD5
bfa95e9513b0a4f93af568c83e27b54a
-
SHA1
47a95d0b08e6ef79d99ffc6d5fa7e16c8cd4317c
-
SHA256
bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f
-
SHA512
475b2b4621647b7434c027c2c845aef6bf1be21aacec4e7baa0e04b47ad333520e0680a648a6203721208d78c147d2336ba4d376b89a05810ab76ed570b56c82
-
SSDEEP
3072:q6VOv+Kq7XVLRkgUA1nQZwFGVO4Mqg+WDY:bKq7FLRp1nQ4QLd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3660 Logo1_.exe 2852 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\swidtag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\rundl132.exe bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe File created C:\Windows\Logo1_.exe bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1972 3660 WerFault.exe 86 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe 3660 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3316 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 85 PID 2000 wrote to memory of 3316 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 85 PID 2000 wrote to memory of 3316 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 85 PID 2000 wrote to memory of 3660 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 86 PID 2000 wrote to memory of 3660 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 86 PID 2000 wrote to memory of 3660 2000 bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe 86 PID 3660 wrote to memory of 2728 3660 Logo1_.exe 87 PID 3660 wrote to memory of 2728 3660 Logo1_.exe 87 PID 3660 wrote to memory of 2728 3660 Logo1_.exe 87 PID 2728 wrote to memory of 692 2728 net.exe 89 PID 2728 wrote to memory of 692 2728 net.exe 89 PID 2728 wrote to memory of 692 2728 net.exe 89 PID 3316 wrote to memory of 2852 3316 cmd.exe 91 PID 3316 wrote to memory of 2852 3316 cmd.exe 91 PID 3316 wrote to memory of 2852 3316 cmd.exe 91 PID 3660 wrote to memory of 3448 3660 Logo1_.exe 56 PID 3660 wrote to memory of 3448 3660 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe"C:\Users\Admin\AppData\Local\Temp\bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a69B6.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe"C:\Users\Admin\AppData\Local\Temp\bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe"4⤵
- Executes dropped EXE
PID:2852
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 7884⤵
- Program crash
PID:1972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3660 -ip 36601⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5db82ebe7e8d3aa4c18238ce4cca5dd17
SHA178d1b820bc3cc712ed6bf53a4464143a64f934fe
SHA256cd324e09877c9b952fa419a68949d37384a332ab7ef02b8c575244a919826c38
SHA512bb136f779cfa0ebaeff155a4bcf0621f47fb0ff0dfda07437bff9c4b74f06b9c1633d438cada7cca2d0000fe23ceaa75391a6a2e0bf1932772bfa5d6d74731e7
-
C:\Users\Admin\AppData\Local\Temp\bf071c8609802f65261675176e2ce580c6252d4b4e8afa079c454ea93a1e7b4f.exe.exe
Filesize231KB
MD56f581a41167d2d484fcba20e6fc3c39a
SHA1d48de48d24101b9baaa24f674066577e38e6b75c
SHA2563eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7
SHA512e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6
-
Filesize
31KB
MD531c40ad002aec19c96432c3718cc2094
SHA18976214f3a06ef71424ea2bd68cf2eda92a2055a
SHA256612fde4b588fec65c70481c238f089ab4d1ed5237976dbd807f79c50d3149cf4
SHA5125c03fabcbd8864bcecd6203db9f0c3c5f7f9ad0fa217fb9d61b8beaacfe3a5ab6ffb54cc6764bff152c42f83688d9f860cd7177eb2abe1212e7e3cd26d9b703e
-
Filesize
9B
MD527729a3995958245e2d6799df42e26e7
SHA1dfe386f53277c8387b50122f3fda9bc2467815ba
SHA2569313041e89d4585b2606afa4809b101e7e8a2c944d063a28c796b0c0f070b5f1
SHA512ba9157cea7ca5c01b52e2a4a758f4e12e018990e49f1ece5fa6d83423f37a0a4dd5246d9b01e5e212d5e8c36a66a8d0e2645bc73753671295965a855a5028ec6