Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe
Resource
win10v2004-20230703-en
General
-
Target
4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe
-
Size
65KB
-
MD5
a441a8c24d3848bd143b8ec2904b47b6
-
SHA1
cfbeb02a0db0ac08e9a508643b7f00d36874a297
-
SHA256
4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb
-
SHA512
2ea23f173d4c256f5659391cc4ba95199e68ea39b89a9898997231c496ee5604e82513003e80917c44f533c00dd1af3820dd008695935c6d4179985fe82a1d3d
-
SSDEEP
1536:T/Wu3SHuJV9QaxvQoNhuHB1gTXL7jueis:T/tkuJVFvQ4huHB1ufxx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1716 Logo1_.exe 4380 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoEditor.Common\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\msinfo32.exe Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\Schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-high\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe File created C:\Windows\Logo1_.exe 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe 1716 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4256 3212 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe 81 PID 3212 wrote to memory of 4256 3212 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe 81 PID 3212 wrote to memory of 4256 3212 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe 81 PID 3212 wrote to memory of 1716 3212 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe 82 PID 3212 wrote to memory of 1716 3212 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe 82 PID 3212 wrote to memory of 1716 3212 4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe 82 PID 1716 wrote to memory of 3704 1716 Logo1_.exe 83 PID 1716 wrote to memory of 3704 1716 Logo1_.exe 83 PID 1716 wrote to memory of 3704 1716 Logo1_.exe 83 PID 3704 wrote to memory of 4000 3704 net.exe 85 PID 3704 wrote to memory of 4000 3704 net.exe 85 PID 3704 wrote to memory of 4000 3704 net.exe 85 PID 4256 wrote to memory of 4380 4256 cmd.exe 87 PID 4256 wrote to memory of 4380 4256 cmd.exe 87 PID 1716 wrote to memory of 3168 1716 Logo1_.exe 51 PID 1716 wrote to memory of 3168 1716 Logo1_.exe 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe"C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aAAC7.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe"C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe"4⤵
- Executes dropped EXE
PID:4380
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4000
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5f68dd712fd4e86890036ca669c686945
SHA120bb9c1f512f9cde68a3fb9a213b514a4ab61114
SHA2565eca8b9bf40b30a334b4476c909b0daa2f49da37e254435a794b0a61e1a87c44
SHA5129335071ef6c6b7c2018d898db89759052f1c1fa634b81ea7e5214b272a557ddd72fcc151dc2978da29cde3b24ac7126b39381831a60163942646ce934efa93c7
-
Filesize
487KB
MD51f1ed863f4554d31f7949816d33b44c9
SHA1b997d4d3a1936e11b4b54a95d5cedd08c2666a9e
SHA256da244286e9d1b1eb120802054365a1b9051b1976ca3eccd1bf3153129c49b1a2
SHA5122eed40022d3d3e366ea1d1f05dfdd80a75fd1acb2d40a4f3853d796e80a8ba8dc63f22e0647d9fa8ad6f3bc8e2b029fd7c507bcf5fe66b357e6ea7ccdf2e6f99
-
Filesize
722B
MD542f5ddf0f5d361c655f9c149ab4d69aa
SHA1ad1e973ace88d4f7b1f862f52aeee3817b0e6e87
SHA2568b2ae7f5737640f9c854d156cfc2b99449738a91f86d09ee83781e154537d9ad
SHA512b12b3253208ca23a189761f881a3cad86deaffe48d1d13092969ee1267901338a83cb0e41f91e46cb4a57d4cec18cf199ac5744b3e901eec897ac4b34e828985
-
C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe
Filesize35KB
MD5cc5cbe8044521b544feadcc7062d217f
SHA15edaf0457ed0a8c417b70922f915493d35cb09ab
SHA25609463cf6d559b5774c6c6b665e69294a07eb111ccffb7b27f81378b5a58dc802
SHA512fb347f2baa9586f83c5f5b7cf79a3925f68091483d5b2bad434dc070682ce0aef8bad744874593898bdd546f6fd20ce9e0d3448f676c9d230339865aed01cf45
-
C:\Users\Admin\AppData\Local\Temp\4aecd87a133171fd2118616be2cd8a406c9f8760d4e0e1afc141e259d89eeceb.exe.exe
Filesize35KB
MD5cc5cbe8044521b544feadcc7062d217f
SHA15edaf0457ed0a8c417b70922f915493d35cb09ab
SHA25609463cf6d559b5774c6c6b665e69294a07eb111ccffb7b27f81378b5a58dc802
SHA512fb347f2baa9586f83c5f5b7cf79a3925f68091483d5b2bad434dc070682ce0aef8bad744874593898bdd546f6fd20ce9e0d3448f676c9d230339865aed01cf45
-
Filesize
29KB
MD5aa63a6c869b0d64b1dbae98ba2bd00b9
SHA11b45f9e7390a3aa7a27a824696e7e6fcc50bf11a
SHA2560ac780ea7c76c362cd52165342ad2598c608d292d83e4d7fc27643ba98fac875
SHA512343127beeec7713eb3ce9b2936c858c2570374571b229e204d44bab573c2683b5983f2ceb0c7d38b3c233acd37528e84077991309154b38655ec62c11a979ca3
-
Filesize
29KB
MD5aa63a6c869b0d64b1dbae98ba2bd00b9
SHA11b45f9e7390a3aa7a27a824696e7e6fcc50bf11a
SHA2560ac780ea7c76c362cd52165342ad2598c608d292d83e4d7fc27643ba98fac875
SHA512343127beeec7713eb3ce9b2936c858c2570374571b229e204d44bab573c2683b5983f2ceb0c7d38b3c233acd37528e84077991309154b38655ec62c11a979ca3
-
Filesize
29KB
MD5aa63a6c869b0d64b1dbae98ba2bd00b9
SHA11b45f9e7390a3aa7a27a824696e7e6fcc50bf11a
SHA2560ac780ea7c76c362cd52165342ad2598c608d292d83e4d7fc27643ba98fac875
SHA512343127beeec7713eb3ce9b2936c858c2570374571b229e204d44bab573c2683b5983f2ceb0c7d38b3c233acd37528e84077991309154b38655ec62c11a979ca3
-
Filesize
9B
MD54a4922bdf377baedb0460540a7e52405
SHA182789c7c3ee038da34ac62e38ddde0fe667d52ac
SHA256589848447b17adf03dfa9db6e17b5ec00d1fabf203fa496bae29ed64764a052f
SHA512fe635f97709f5f3df9290c6c53a374351481f13aa45105f48fe3709c15532313eb4d032eed20f2a278b9837c84bba9ba7a7fa2d83cd2a1e3adc0bc930d40c2a1