Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2023 08:57
Static task
static1
Behavioral task
behavioral1
Sample
b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe
Resource
win10v2004-20230703-en
General
-
Target
b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe
-
Size
384KB
-
MD5
05742fbc0a4036981dff8f7cf5a3b0e6
-
SHA1
809a4562d77120cdd87fedea22b664f033f2acd7
-
SHA256
b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62
-
SHA512
8e282467ad8ba9e8d9363b01d40628f38352ea403e15652386719ee05c1792650bebc069eb57febab7f94813ab72eebd3bc04dddc793ce2f224d676b888d6b96
-
SSDEEP
6144:JuJtBjQ2xL9L5e6j9MfpMQkjkPNWEXzVGBJh:I7L9L5GfpM7Y1VUJh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\smsconnect\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fa-IR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sw-KE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nl-nl\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe File created C:\Windows\Logo1_.exe b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3892 wrote to memory of 3652 3892 b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe 81 PID 3892 wrote to memory of 3652 3892 b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe 81 PID 3892 wrote to memory of 3652 3892 b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe 81 PID 3892 wrote to memory of 2268 3892 b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe 82 PID 3892 wrote to memory of 2268 3892 b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe 82 PID 3892 wrote to memory of 2268 3892 b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe 82 PID 2268 wrote to memory of 4720 2268 Logo1_.exe 83 PID 2268 wrote to memory of 4720 2268 Logo1_.exe 83 PID 2268 wrote to memory of 4720 2268 Logo1_.exe 83 PID 4720 wrote to memory of 1232 4720 net.exe 86 PID 4720 wrote to memory of 1232 4720 net.exe 86 PID 4720 wrote to memory of 1232 4720 net.exe 86 PID 2268 wrote to memory of 2504 2268 Logo1_.exe 36 PID 2268 wrote to memory of 2504 2268 Logo1_.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe"C:\Users\Admin\AppData\Local\Temp\b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a803C.bat3⤵PID:3652
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1232
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD50b0dac311401ff1b6c3a092116a26c2b
SHA12a19d8ac6941b308707d87242033d4b628691daa
SHA2563ad8d5c2568c0022db72b64c9ca050cb18165605f0ad597f53021955f36eae47
SHA512a82a4a766b2a2d7badbc4d2de184031423ebe03fa73101b847085866d774386af5b69623c850150f5d36f45b3adfd53fccbdbe17a7041d01734ca8b0c24177d2
-
Filesize
487KB
MD5e393111b953db690bc71c65621e6b0f2
SHA141384b260c8990b1171807ad832f52f655a6c2ea
SHA2562fd108149c3fb1168bf6490b50e216da5d9d910fafb40489ae666d023f506456
SHA5128e491a859257fe5a3fa873e8f7fc61ef6238dd1dbc70080dafaf7fd3c97e01d410131edac41a29188c1bcc139b3893eabd50215bbffc32b0878bb0ab7f870bf5
-
Filesize
722B
MD55ca845355cbcb3d92bd2d5228d9120e0
SHA16059ffcfe6551929908838910510078544a30b2f
SHA25659f1d1fea1b5d294774fdf84c325ab1c4b7064fcfa33276e090304ce945f53ce
SHA512617bdf8ed1ccee5c3a74fc0f85be7964b98f1630e29a6f3a5995f5df587f59ea29059c5c22bb5c8c680cc2803fd2a7e8e920f6f6b7d474f678bf6f32f6576aff
-
C:\Users\Admin\AppData\Local\Temp\b885b6b34a016cc5d2f23d54a0ac169b44a69b5fa9e34ff2f1cc37c6e0393c62.exe.exe
Filesize354KB
MD5cea1ec5c3f5df72ffc043707ddc8f812
SHA19368633df5d61dc43ba034cc30e316e26f54b44f
SHA2566ecda38015ea84688cf3a60baee335d0df6ca8806afc4e695c192f224c124da4
SHA512fa239c447fc97fb9b037de254aa2f2d5e320b5b2da5bbdefeeaa13b37d361cc5718c9c93fe83fec15ec7a5a04284f8ef1a0ddc2c1fa49338e59cb0b5176adc2f
-
Filesize
29KB
MD5d0a661a02bca60ec3c2b4435aaba7432
SHA18a6f7729f2323bcd99c9b5c5c960b3627c8bfd0e
SHA25627bbde16b6b816535421e10e5b4ddcd11d679e740f2cc66707ddc5c7234829d0
SHA512289a5b28c9ed0e83e2b1ed4230a24d1daae743e0e816e2f3de30eb3ecf6b4b65c6b44ecbc9e07d70f0057b4efec3138b8e398beb928afab11647443ac55887bb
-
Filesize
29KB
MD5d0a661a02bca60ec3c2b4435aaba7432
SHA18a6f7729f2323bcd99c9b5c5c960b3627c8bfd0e
SHA25627bbde16b6b816535421e10e5b4ddcd11d679e740f2cc66707ddc5c7234829d0
SHA512289a5b28c9ed0e83e2b1ed4230a24d1daae743e0e816e2f3de30eb3ecf6b4b65c6b44ecbc9e07d70f0057b4efec3138b8e398beb928afab11647443ac55887bb
-
Filesize
29KB
MD5d0a661a02bca60ec3c2b4435aaba7432
SHA18a6f7729f2323bcd99c9b5c5c960b3627c8bfd0e
SHA25627bbde16b6b816535421e10e5b4ddcd11d679e740f2cc66707ddc5c7234829d0
SHA512289a5b28c9ed0e83e2b1ed4230a24d1daae743e0e816e2f3de30eb3ecf6b4b65c6b44ecbc9e07d70f0057b4efec3138b8e398beb928afab11647443ac55887bb
-
Filesize
9B
MD5c0232c2f01c543d260713210da47a57b
SHA163f2c13c2c5c83091133c2802e69993d52e3ec65
SHA256278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197
SHA5122ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0