Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 01:15
Static task
static1
Behavioral task
behavioral1
Sample
88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
Resource
win10v2004-20230703-en
General
-
Target
88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
-
Size
809KB
-
MD5
c59ae4b7ceb4027f0723183c4b884d1f
-
SHA1
4d08ac5c2000032f4037e581b38d56afa409be8d
-
SHA256
88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d
-
SHA512
9e1438a141daae9b28a78928993b446638f35a24bc490caf553e0b0e159c8146833342164dbbc1b4c6f296026fd715eaff5b6da3ca7846a29604c0399698221e
-
SSDEEP
3072:aftffjmNr50PC1gFD8Xnie/zKPMtsZX+H7Zu1uDrnBFEJQ/UG:aVfjmNd3i8X7pt4Oti0BWm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4416 Logo1_.exe 3504 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-BR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jsaddins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\el-GR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\capture\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Wide310x150\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\cpdf\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe File created C:\Windows\Logo1_.exe 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4196 3504 WerFault.exe 87 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe 4416 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 852 wrote to memory of 3492 852 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe 81 PID 852 wrote to memory of 3492 852 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe 81 PID 852 wrote to memory of 3492 852 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe 81 PID 852 wrote to memory of 4416 852 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe 82 PID 852 wrote to memory of 4416 852 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe 82 PID 852 wrote to memory of 4416 852 88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe 82 PID 4416 wrote to memory of 2932 4416 Logo1_.exe 84 PID 4416 wrote to memory of 2932 4416 Logo1_.exe 84 PID 4416 wrote to memory of 2932 4416 Logo1_.exe 84 PID 2932 wrote to memory of 1180 2932 net.exe 86 PID 2932 wrote to memory of 1180 2932 net.exe 86 PID 2932 wrote to memory of 1180 2932 net.exe 86 PID 3492 wrote to memory of 3504 3492 cmd.exe 87 PID 3492 wrote to memory of 3504 3492 cmd.exe 87 PID 3492 wrote to memory of 3504 3492 cmd.exe 87 PID 4416 wrote to memory of 3208 4416 Logo1_.exe 54 PID 4416 wrote to memory of 3208 4416 Logo1_.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a86D3.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe"4⤵
- Executes dropped EXE
PID:3504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 1885⤵
- Program crash
PID:4196
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1180
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3504 -ip 35041⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD57eec1334df94acedeb12513ecae38231
SHA1d3b7676b50a5611d1470dea62e2179e3a10cb1fb
SHA2565e4533676d931793e2dde85d9a069d7117edf4761e174219493f5255d405f038
SHA512160dda7a803e3a5a856d7b0ef78eae75b8050f2cd031d70cccdaec51fffdc15f79b8ed1f73e539359dbbaa899b5fdc75780006b9cdc576110f3ef150a5352469
-
Filesize
484KB
MD5a687a1d30bd2ec9c24536a5eefb146ad
SHA1cf4e28c4a8469d10d0216ac02de7b970950be1ae
SHA256b543de2bb907a73ad36fd6c94ccb6c8b1d0ba43c0ad6a40b0c72a7e710e3cdb7
SHA51234675b4733ee3b5e76b6cb1724087e46dced61e04623ddd244e4b852ecc78c3c149c127d4450abb8d2f3dd6743d66348f44b05cc054db67ad2c944a3de4686c3
-
Filesize
722B
MD529df8abed9dd7f028aa3a76e738e9d5b
SHA177f9c4c5c2eaa23ee0ddc667d6fd1d8b3f14b6a1
SHA256c27942401d3979acc2e4a2be9b7e04628dde804d516583437104afcd217be877
SHA512c9c3bad8a7a0cc51d645b0a6778f50e28fd750ce2b61011ecddc20a2677c99b127712871b792f4e58d1e4065fc3b93282ab77c4f3c2a3db8ed116f94d4c49a43
-
C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe
Filesize782KB
MD5a033be21d106286ae2bc02e16ac9abf6
SHA1a784c23826e33aaa80f1129ddde22549a4de04df
SHA256bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50
SHA512f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583
-
C:\Users\Admin\AppData\Local\Temp\88f8902b441294b41272992a5810d2e3f33060bbef7114e6bf6c87244a47188d.exe.exe
Filesize782KB
MD5a033be21d106286ae2bc02e16ac9abf6
SHA1a784c23826e33aaa80f1129ddde22549a4de04df
SHA256bf7d4777c2282c85e0a71d8e1a53569711a50a1fa2d9dee05c3784cf2558ae50
SHA512f3ba71b8673f74fc47381fe5a846eb145428ae7dd657f7196489b240eccbf42c4777130336f043fa1ea1348d9f008ef461819518250328fbd9a075918dac2583
-
Filesize
26KB
MD5c8d2b0c724ddd6b09cef9ca32d60e4b4
SHA1926f1f2dfd17610c86ace2cad82f8c9177e1ac0d
SHA256b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e
SHA51288eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3
-
Filesize
26KB
MD5c8d2b0c724ddd6b09cef9ca32d60e4b4
SHA1926f1f2dfd17610c86ace2cad82f8c9177e1ac0d
SHA256b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e
SHA51288eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3
-
Filesize
26KB
MD5c8d2b0c724ddd6b09cef9ca32d60e4b4
SHA1926f1f2dfd17610c86ace2cad82f8c9177e1ac0d
SHA256b2f4119c8742c3540498c62caa7a2a81579400ecde7b4d95c0021a76c7809d4e
SHA51288eda91c0f53ee75bcdef0b293063e3dba9a2d8a173f4eaf94ad0f63e6ca289e7254c7c60ee903c0db1fc2aaa37ceab943c8150249130299676e40a94a3d0ea3
-
Filesize
9B
MD5ec7139d5bb99bcebaf0b91c58a9ec5aa
SHA170404362dd74e309722fd282c3492ec95674123c
SHA256eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582
SHA512b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48