Analysis
-
max time kernel
80s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe
Resource
win10v2004-20240426-en
General
-
Target
62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe
-
Size
260KB
-
MD5
aa630f8158f8c6a1344ce0657481d58c
-
SHA1
f63830f73224ab05af0c4cd04e3c4dcc6769d1f4
-
SHA256
62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e
-
SHA512
bc5231950f4e874922c26913300a118ed9538ebb5c529a1293ca9d324d118958248982682007ac4826c071cd9881e299b5c51db38a1e04652065412debac692a
-
SSDEEP
1536:pWk3SHuJV9N1ILFkbeumIkA39xSZW175V7UZQJ0UjsWpcdVO4Mqg+aJRaCAd1uhg:pWkkuJVL1LRkgUA1nQZwFGVO4Mqg+WDY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4744 Logo1_.exe 3244 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am_ET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\ModifiableWindowsApps\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre8\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\include\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe File created C:\Windows\Logo1_.exe 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe 4744 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3416 wrote to memory of 3240 3416 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe 81 PID 3416 wrote to memory of 3240 3416 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe 81 PID 3416 wrote to memory of 3240 3416 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe 81 PID 3416 wrote to memory of 4744 3416 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe 82 PID 3416 wrote to memory of 4744 3416 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe 82 PID 3416 wrote to memory of 4744 3416 62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe 82 PID 4744 wrote to memory of 4208 4744 Logo1_.exe 84 PID 4744 wrote to memory of 4208 4744 Logo1_.exe 84 PID 4744 wrote to memory of 4208 4744 Logo1_.exe 84 PID 4208 wrote to memory of 4572 4208 net.exe 86 PID 4208 wrote to memory of 4572 4208 net.exe 86 PID 4208 wrote to memory of 4572 4208 net.exe 86 PID 3240 wrote to memory of 3244 3240 cmd.exe 87 PID 3240 wrote to memory of 3244 3240 cmd.exe 87 PID 3240 wrote to memory of 3244 3240 cmd.exe 87 PID 4744 wrote to memory of 3424 4744 Logo1_.exe 57 PID 4744 wrote to memory of 3424 4744 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe"C:\Users\Admin\AppData\Local\Temp\62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a33C2.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe"C:\Users\Admin\AppData\Local\Temp\62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe"4⤵
- Executes dropped EXE
PID:3244
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4572
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD576f7a1163a5fc31bb5344ba1b202fed8
SHA115a2cea406042e2e9809d0980e62701c77929d7f
SHA256064a9416a904e64a1fc3670b7b326ea72bd1a0871e9e56fc55e381e8e8fdccc3
SHA5123dd7dd114c80805d24e865ddaabe54c0d9a826c6edebe52b8dbaae621651fc448a664f0a03dcda581e29647246aca0a84cd70af855c6eb2480c200a2b6309cb3
-
Filesize
573KB
MD5eaf5c7310ef7e48ff1d0dce1ef4fcd20
SHA1c0d7950bc14afdf159eea62ef231a4086137d1ec
SHA2568411c80aeca9f35dd06be9c7f5774f2d2915fd06be4582edb408100f127c51a4
SHA5128855d4bfd452595d94c9705941c61314771f8e17b3091dd3b8c5a874f66a00fc54fa655cddbcd845b9d428a0cb7bb390fb3ac448709a161bbdd840afd25000db
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5c168f1400f09b767044170c5c0603287
SHA1806b134d2145304a602bc358c2664cc266a52aeb
SHA25605d52614bdae4496eb435a35b3eb91cc424abb582fdaaae8a8f96a3cf34e2676
SHA512532f698580361daa78290a7871c1a58fd6e9a445ec78224f7b90bea454fb15183eaa9cee1ef9dcf3fb30a56b5fa6e57de67b817fe04cd5bd61ca5e6710f8f9a1
-
Filesize
722B
MD524f8cb84d964d04825139ee8503c26bf
SHA1a195c1b3256074f87db9e255a1ba83f030a2482b
SHA2560fb0b51ce0b4092b216ecf46cc7eaf2c8f29002a446c467de217b60b027038f6
SHA512d85ce9e8b6d1d71d6b3b0c4e6e97769f0c905c35df75cb1175fd7a77cb3019c539345c76977e92d61344620f468087dfa86785b722caf879b3fd7f73a857124d
-
C:\Users\Admin\AppData\Local\Temp\62cb24949ba3e484fe090870ad96e159185019882ac17d890cc6f8d3bffbd98e.exe.exe
Filesize231KB
MD56f581a41167d2d484fcba20e6fc3c39a
SHA1d48de48d24101b9baaa24f674066577e38e6b75c
SHA2563eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7
SHA512e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6
-
Filesize
29KB
MD5e76bc01a95541b7053d812c194d99999
SHA1958bb2a983d7c04de2a6a21fe6784d09f9406130
SHA256681838ab6bee836a3724d70b442fedfebeb0da5f5f38264f8fe6990640c79401
SHA5125d238d9886296877e1583c20d5dc00e8529c9fb5a6d0522a30ae3fc5a371e71952b10cf6f23510bfe9865fda5b938e2c3ed075c21f265912d022ef9185793623
-
Filesize
9B
MD560b1ffe4d5892b7ae054738eec1fd425
SHA180d4e944617f4132b1c6917345b158f3693f35c8
SHA2565e9944cc48c7ec641cf7b1b0125f47f26102c371a973612f0583f604bc3900d4
SHA5127f5c200924dbb5531df997e6a35cb94f36b54f5651284b0d6404f0576301125ef72b410a170fca889d46c033063663cfc7791f9e4c3c30695af069053eee66cc