Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
Resource
win10v2004-20230703-en
General
-
Target
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
-
Size
271KB
-
MD5
46e9e8be2076e9e00ccebef922ac66a8
-
SHA1
de9f37c87d6fec9afba149cc25bc8f954104fabd
-
SHA256
9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2
-
SHA512
6df42bb3bf84b5456195351a51220dfd98c3522b78e68f7097a76d3e31d448c41a8f2720611b78f5a9ccec7d3929428b0fb47da942373300098ca1fd53da3988
-
SSDEEP
6144:4VfjmNv6iC5/7Z7mEGiin0u9HJAxdrt10xdUy95WkLmzdWsQELvLf884rxJp1Vsu:i7+2lGp0Bk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4772 Logo1_.exe 920 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Sounds\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fr-CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Shell\Themes\Glyphs\Font\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Text\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\sr-cyrl-cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe File created C:\Windows\Logo1_.exe 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe 4772 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1228 wrote to memory of 408 1228 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 82 PID 1228 wrote to memory of 408 1228 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 82 PID 1228 wrote to memory of 408 1228 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 82 PID 1228 wrote to memory of 4772 1228 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 83 PID 1228 wrote to memory of 4772 1228 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 83 PID 1228 wrote to memory of 4772 1228 9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe 83 PID 4772 wrote to memory of 2732 4772 Logo1_.exe 84 PID 4772 wrote to memory of 2732 4772 Logo1_.exe 84 PID 4772 wrote to memory of 2732 4772 Logo1_.exe 84 PID 2732 wrote to memory of 3276 2732 net.exe 87 PID 2732 wrote to memory of 3276 2732 net.exe 87 PID 2732 wrote to memory of 3276 2732 net.exe 87 PID 408 wrote to memory of 920 408 cmd.exe 88 PID 408 wrote to memory of 920 408 cmd.exe 88 PID 408 wrote to memory of 920 408 cmd.exe 88 PID 4772 wrote to memory of 3248 4772 Logo1_.exe 40 PID 4772 wrote to memory of 3248 4772 Logo1_.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a79D3.bat3⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe"4⤵
- Executes dropped EXE
PID:920
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3276
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d6fa4af4febadf5acdb9e2307966c048
SHA1d1d5f9269989f1975821acac49d89859faad0cf1
SHA256c84003660b418a35570e293a333750259586e1b3ddec78893a7ccbd26d5c4589
SHA5123397ca12c77bdc2ffc92ae0baeee21ba829123a6c0d033084ac021ff68abef4111a9f6c7fa2cf6664ebed7f03c9f6bff02f22cd923a6fa34120432e6bfec8b1a
-
Filesize
484KB
MD5f883faabece44d8bcb93cd2c92931171
SHA10905b65200740fb17de1de8ad7615e91ddf35cc9
SHA2563cf10af220b5216f30f49c5e7a59bfde7bacd8b8dc0385b6d058db498d3919ca
SHA512132a4cb505d795105dd1efa7d9002cbb7542756edbec2c631ec431543a85142d5fdec99380bf0fc354300f2f912524bf1aab3bb660492c69d0316b976509173e
-
Filesize
722B
MD5a571f303249069c6e7a6fae78c20ce60
SHA1ab8518f4c6195d2c263b97941a6b29a9212477f6
SHA2561185d2db5c542ef6e8ebb79f0fdb85b37ce374c9dae63f4a1de64a502c3e8257
SHA51299579638e92069845c4af92d25495599c59f1c8985214a3e6cdd1bf9eaf14f06f4c14a2853dba21651278134ecda55cf34985d54dfae35868e09533697be9608
-
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203
-
C:\Users\Admin\AppData\Local\Temp\9c91822396df21d78457b502f5d145c35a248aef2d363838706ceb5c1d8f3db2.exe.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203
-
Filesize
26KB
MD51c43d4ba8e4a702f49c25855c29bba2d
SHA12571c4428b580e6afbbd2d7fb92bc0c180107d2a
SHA25647f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140
SHA512ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869
-
Filesize
26KB
MD51c43d4ba8e4a702f49c25855c29bba2d
SHA12571c4428b580e6afbbd2d7fb92bc0c180107d2a
SHA25647f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140
SHA512ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869
-
Filesize
26KB
MD51c43d4ba8e4a702f49c25855c29bba2d
SHA12571c4428b580e6afbbd2d7fb92bc0c180107d2a
SHA25647f348a11b3c02efbac346aeb342176a9820599a6f94792659bd1a8373f47140
SHA512ea0cef3a7fb6956d6c98dc5d5fe4e3a778fbed6dc56433fccd9003268642aa407abe82d4f5e027c71a44b20618589c366f6c9c99df3dde1798bb4655da6c6869
-
Filesize
9B
MD5c0232c2f01c543d260713210da47a57b
SHA163f2c13c2c5c83091133c2802e69993d52e3ec65
SHA256278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197
SHA5122ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0