Analysis
-
max time kernel
102s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe
Resource
win10v2004-20240508-en
General
-
Target
2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe
-
Size
3.1MB
-
MD5
43da24d1267639eac64824f187b857e2
-
SHA1
fc0a70390564a556f4c0a3977a29ab4e15bc0265
-
SHA256
2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00
-
SHA512
5612f92cd36690fa1e3fcadecdfda457590daf37d45090092a3409b62a0cf621c4d176369963b33400f53942826eb7da91ad705a099e24bfef6f940a883f39f5
-
SSDEEP
49152:Wigy13TW4jFCs2pfRdO8u60N1xcdd9gVIkdqfvEAkqcPI:W3Ts21i8WN1igVIf6O
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5092 Logo1_.exe 4924 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe Logo1_.exe File opened for modification C:\Program Files\dotnet\dotnet.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe Logo1_.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1940 2244 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe 81 PID 2244 wrote to memory of 1940 2244 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe 81 PID 2244 wrote to memory of 1940 2244 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe 81 PID 2244 wrote to memory of 5092 2244 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe 83 PID 2244 wrote to memory of 5092 2244 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe 83 PID 2244 wrote to memory of 5092 2244 2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe 83 PID 5092 wrote to memory of 3992 5092 Logo1_.exe 84 PID 5092 wrote to memory of 3992 5092 Logo1_.exe 84 PID 5092 wrote to memory of 3992 5092 Logo1_.exe 84 PID 3992 wrote to memory of 3584 3992 net.exe 86 PID 3992 wrote to memory of 3584 3992 net.exe 86 PID 3992 wrote to memory of 3584 3992 net.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe"C:\Users\Admin\AppData\Local\Temp\2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a48D0.bat2⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe"C:\Users\Admin\AppData\Local\Temp\2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe"3⤵
- Executes dropped EXE
PID:4924
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3584
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5a7b3865ba649fd66cd830878dea6c5f2
SHA1949f6d0eeff7efc6da7dc5bc1f4dd6e092bf2e2b
SHA2569fbc11a841eb1249c8635be81ad70286c0db9bc84fb51e32e584c7fff33469f7
SHA5121ebe25a263a61cf5156f1e7f835142fc9bc68563ca6857730c4675cbde26788b3b24378921476bfad6e8cd2c1f01f22b2de88ce901ab169e48536341c827f60a
-
Filesize
722B
MD5b5ae2dffe6513620b2868ab7e4d0bbe0
SHA18c2b879d2d100803a6f8aade24785bca393860e0
SHA256c38c30ac1dac3cc15ca7b56944adc3addddb17e3227826d18ee34103b918e894
SHA5128b83d0f8e14adf83dc4f6dc9ce3aa9f77508e4b9b59d80994baf2e751dac35f94f843bc68c3aa15203b822edc0f0e45672907c212b1d7119d97a4dc2a67d9e8e
-
C:\Users\Admin\AppData\Local\Temp\2b00e68e2008d557906e0a4f43aebbdd7d9ce649c9fc69416d62e02cfa183f00.exe
Filesize3.0MB
MD504e531df8ac0a7696570554ad87199da
SHA1d6cf2a47536e08f1a27ed128a2d8f5288ec97e05
SHA256f7aaad011fc7ed4d33e662641066e4808b42771b1228c352f3d68afa7fd0af44
SHA51279e19742b537fff213b17b350b3b61c76a9ac8533707bed45224b6a72c02f9eebe351c4c8537cca1451060d8703ea2fe95da1b1a4c34fdb96b141b88237ce5b9
-
Filesize
66KB
MD5a81c8cb12d60acf8c759fa71889799c6
SHA1797ea1fb6f2704e56448db6ff0992d5bc322b4ad
SHA256c8d74f72173f6a12145368db4df2d22522e58e06973e4360293fb6d83375079e
SHA512c8ddf074f4d467e170211fbcbca12fbec25b8ebcf40c0969bc9e9130c12337e633e5d8000803c1dfccb9edd34756c8beb2af66edeb1b39905b46534e1ea9bd67