Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe
Resource
win10v2004-20230824-en
General
-
Target
030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe
-
Size
138KB
-
MD5
9b6a830d72a32c3b6d364120ff4d91b4
-
SHA1
0267bafe4c16a02c92b6ec21146309ddffa805dc
-
SHA256
030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455
-
SHA512
11dd4a946ab2b41425ffb7f4af3bc473e65f892514ea64011ceb9577d6c4ae797b01b2c8ffc3e7ae72e73528267fe8c53046a2aa9a057c2cdd3202c16a93bf82
-
SSDEEP
3072:IftffjmNcmZWXyaiedMbrN6pnoXPBsr5ZrR:YVfjmNcSNaPM4loo5Zd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2352 Logo1_.exe 3492 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WindowsIcons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\0.2.2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Calculator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\messaging\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe File created C:\Windows\Logo1_.exe 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe 2352 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1620 4564 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe 86 PID 4564 wrote to memory of 1620 4564 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe 86 PID 4564 wrote to memory of 1620 4564 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe 86 PID 4564 wrote to memory of 2352 4564 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe 87 PID 4564 wrote to memory of 2352 4564 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe 87 PID 4564 wrote to memory of 2352 4564 030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe 87 PID 2352 wrote to memory of 2960 2352 Logo1_.exe 90 PID 2352 wrote to memory of 2960 2352 Logo1_.exe 90 PID 2352 wrote to memory of 2960 2352 Logo1_.exe 90 PID 2960 wrote to memory of 1408 2960 net.exe 92 PID 2960 wrote to memory of 1408 2960 net.exe 92 PID 2960 wrote to memory of 1408 2960 net.exe 92 PID 1620 wrote to memory of 3492 1620 cmd.exe 93 PID 1620 wrote to memory of 3492 1620 cmd.exe 93 PID 1620 wrote to memory of 3492 1620 cmd.exe 93 PID 2352 wrote to memory of 3148 2352 Logo1_.exe 52 PID 2352 wrote to memory of 3148 2352 Logo1_.exe 52
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe"C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a460.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe"C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe"4⤵
- Executes dropped EXE
PID:3492
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1408
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD595fe7d22989d731e00a79d55c4d76db6
SHA14501a8c7a996c576a4f03c6fe6aa3b8a2a28893b
SHA256b44b445347f0c0c4c754a4c9f9cc2b1002e624142959bad3f0393ab2cdbdfed8
SHA512dfe339302c55a71fe42f03d4c381442af52aec8d55bd93d9005a50939d743a731901ff613c47edb3a193da90b3fff30e70d1aa6136e3a8d3c81d45bed006908e
-
Filesize
484KB
MD5e4a3eb85cd8330582277b55607c0190c
SHA1d233f39a9bbb953877ab51d1331bd0b7cf916c0f
SHA256fae5bbff79207f3fa2cb34ca09b5ea399c64b4912f492f30e42faa763d9ec859
SHA512cd7f355e2e4b9fc58f918d12265ed335686e324b9adf6a40c90b1ae1526abfc6b64b45aa1380a3cd38cf7a0a7492cdd1265c5df8f03d82072d17180a3d6f7326
-
Filesize
721B
MD59aa4dce2c65e59e0716d4dae924b85e0
SHA172c20687e811d14f3f19076294bea97992b8daa4
SHA25642b324ecdc15f5906d540c4a3660b07991039f63aff7b7c734d8ef3626c95b8a
SHA512803f7114e33495cdd548928960e718fcd65cb48d3db9f3077951c2f96b184c094c79dc4640c1a126d26dbca32731f95d7c59cd64b838c3d34a4deaecd2f5c170
-
C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe
Filesize112KB
MD5e9cc8c20b0e682c77b97e6787de16e5d
SHA18be674dec4fcf14ae853a5c20a9288bff3e0520a
SHA256ef854d21cbf297ee267f22049b773ffeb4c1ff1a3e55227cc2a260754699d644
SHA5121a3b9b2d16a4404b29675ab1132ad542840058fd356e0f145afe5d0c1d9e1653de28314cd24406b85f09a9ec874c4339967d9e7acb327065448096c5734502c7
-
C:\Users\Admin\AppData\Local\Temp\030740488b87a0bda7e21868600253276da74e4a86ac036445c8523031b55455.exe.exe
Filesize112KB
MD5e9cc8c20b0e682c77b97e6787de16e5d
SHA18be674dec4fcf14ae853a5c20a9288bff3e0520a
SHA256ef854d21cbf297ee267f22049b773ffeb4c1ff1a3e55227cc2a260754699d644
SHA5121a3b9b2d16a4404b29675ab1132ad542840058fd356e0f145afe5d0c1d9e1653de28314cd24406b85f09a9ec874c4339967d9e7acb327065448096c5734502c7
-
Filesize
26KB
MD54c87b635843dc2ee1f35839d6e93e070
SHA15711bc3684f6c4e6771841d16bc11c6ccdcc17b9
SHA25640574ace535eb8f57606fef5bc59f24af911b86a3c59c01b150979ddb78d881a
SHA512d13d127dcd103a5343c470aa44bb99136ee317e80ac0e3a394416db7503e894b1e8b0e9cee15e2b38a3e29ad036856a30f2e2b373152b56e3071844b581f2587
-
Filesize
26KB
MD54c87b635843dc2ee1f35839d6e93e070
SHA15711bc3684f6c4e6771841d16bc11c6ccdcc17b9
SHA25640574ace535eb8f57606fef5bc59f24af911b86a3c59c01b150979ddb78d881a
SHA512d13d127dcd103a5343c470aa44bb99136ee317e80ac0e3a394416db7503e894b1e8b0e9cee15e2b38a3e29ad036856a30f2e2b373152b56e3071844b581f2587
-
Filesize
26KB
MD54c87b635843dc2ee1f35839d6e93e070
SHA15711bc3684f6c4e6771841d16bc11c6ccdcc17b9
SHA25640574ace535eb8f57606fef5bc59f24af911b86a3c59c01b150979ddb78d881a
SHA512d13d127dcd103a5343c470aa44bb99136ee317e80ac0e3a394416db7503e894b1e8b0e9cee15e2b38a3e29ad036856a30f2e2b373152b56e3071844b581f2587
-
Filesize
9B
MD5ec7139d5bb99bcebaf0b91c58a9ec5aa
SHA170404362dd74e309722fd282c3492ec95674123c
SHA256eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582
SHA512b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48