Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 10:23
Static task
static1
Behavioral task
behavioral1
Sample
43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe
Resource
win10v2004-20230703-en
General
-
Target
43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe
-
Size
175KB
-
MD5
f302f54a69d60917e528f8dc434212dc
-
SHA1
86d7b44964fc2ce182df334514f4218861248dfb
-
SHA256
43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633
-
SHA512
9a269ec1c5eacc980e5e087b61a6d23f2f42aeb2cdab6e05e9ba84ab9443761d305bbf9b67ffd5041818438b53404e84789ccaa72a0c5dee73c9dac42b451f5d
-
SSDEEP
3072:TakuJVFoTEUC+VxP6eZgxhmWcCRaWoOWo666dn0ixm5lHB1ufdu:LuJXkfb/x+62iQ5la0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 420 Logo1_.exe 4748 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Videos\SmartSelect\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactNative\Tracing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\te-IN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe File created C:\Windows\Logo1_.exe 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe 420 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 460 wrote to memory of 4812 460 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe 81 PID 460 wrote to memory of 4812 460 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe 81 PID 460 wrote to memory of 4812 460 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe 81 PID 460 wrote to memory of 420 460 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe 82 PID 460 wrote to memory of 420 460 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe 82 PID 460 wrote to memory of 420 460 43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe 82 PID 420 wrote to memory of 4860 420 Logo1_.exe 84 PID 420 wrote to memory of 4860 420 Logo1_.exe 84 PID 420 wrote to memory of 4860 420 Logo1_.exe 84 PID 4860 wrote to memory of 852 4860 net.exe 86 PID 4860 wrote to memory of 852 4860 net.exe 86 PID 4860 wrote to memory of 852 4860 net.exe 86 PID 4812 wrote to memory of 4748 4812 cmd.exe 87 PID 4812 wrote to memory of 4748 4812 cmd.exe 87 PID 4812 wrote to memory of 4748 4812 cmd.exe 87 PID 420 wrote to memory of 3256 420 Logo1_.exe 41 PID 420 wrote to memory of 3256 420 Logo1_.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe"C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6A72.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe"C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe"4⤵
- Executes dropped EXE
PID:4748
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:852
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD58e7d72af16d480995008ce9377ad763d
SHA12c87ec754a40eee2b7c74e255e2f16974575e416
SHA25683106696096c3ef4d0c2d7c3b4012a35d07267ad415a8d67500cc78c0ed6a76e
SHA512fe8b1696715c085afad5a7d27a44b6ead31c09ea8eb7003b76759344ac8a3ae642527ede0629030bbd0d591bfa9aa96ec75badf2bae5943fba0600b62c1c3347
-
Filesize
1.5MB
MD5b7890c0f82843dd39428315d588ce3a4
SHA1900ad5209b4bdaa3c6f3002ed5fc0aa4b65c861c
SHA2567b8f66bc31ca2de8966f7224676677619c35bf431ba8c92e1e39ed644a4aec77
SHA512779611413aeae1c7a5397c36b47d19a89661a432241226debc4706b159da03f6a98d85a20378cb5e160c683b139005bca8dee424d0ac1fbb38675e6aeec5ae74
-
Filesize
722B
MD593dd528a87a95efa9c2b16351e8217d5
SHA1e13be405c066e02646ab47710b94a3b9f5b2b7c7
SHA256c76e02ecf543c839f55e30ad5eafd2353597dc23acce2098ac3ef0f8b69a2cd4
SHA512b2965ed2f9debd095f9e236628f642b84c26d107f89ac81b097075d033ff4c2351fadc6942873487cab16cbaee0cb300a5c33e7b52dff065dbba85a1c9408872
-
C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe
Filesize145KB
MD55b5c1a1d36299bf0a652c2cd9a1604f7
SHA17a8c26531e37e7438566def064dda378e05666d8
SHA256d69e8350dff47b787ad6b2e0cabf9c0e8e96f8804f0e5013986d949c790c4838
SHA512bce1ffa8e9856e7381541b20a912904b11c9134a194ec870e201473f81fe09aa69f25e93bc45bd528da1245bf25b6959dd593d9e4d2376b27047a76b0602e3d5
-
C:\Users\Admin\AppData\Local\Temp\43de581a60c3da5b121528779466ed71eaacc9c55f69fe170ff6b9baefba0633.exe.exe
Filesize145KB
MD55b5c1a1d36299bf0a652c2cd9a1604f7
SHA17a8c26531e37e7438566def064dda378e05666d8
SHA256d69e8350dff47b787ad6b2e0cabf9c0e8e96f8804f0e5013986d949c790c4838
SHA512bce1ffa8e9856e7381541b20a912904b11c9134a194ec870e201473f81fe09aa69f25e93bc45bd528da1245bf25b6959dd593d9e4d2376b27047a76b0602e3d5
-
Filesize
29KB
MD59f43fcf648cb02979e3b0637244cb859
SHA18fc35471aaf5616c83e4f0c42845556cbf91cc6d
SHA25693f34122cf461251d57040bdbd558d4bcb787e28bdbdbed0982d87c01f7b5f81
SHA5129335f837ffbe8a5b0973003606c19744ff6e52c2b46fab7e2d908eda772a1c824d0f393c8164d438c5e01b2f712f698b0ea36a7e5307f06e812083c480781a5e
-
Filesize
29KB
MD59f43fcf648cb02979e3b0637244cb859
SHA18fc35471aaf5616c83e4f0c42845556cbf91cc6d
SHA25693f34122cf461251d57040bdbd558d4bcb787e28bdbdbed0982d87c01f7b5f81
SHA5129335f837ffbe8a5b0973003606c19744ff6e52c2b46fab7e2d908eda772a1c824d0f393c8164d438c5e01b2f712f698b0ea36a7e5307f06e812083c480781a5e
-
Filesize
29KB
MD59f43fcf648cb02979e3b0637244cb859
SHA18fc35471aaf5616c83e4f0c42845556cbf91cc6d
SHA25693f34122cf461251d57040bdbd558d4bcb787e28bdbdbed0982d87c01f7b5f81
SHA5129335f837ffbe8a5b0973003606c19744ff6e52c2b46fab7e2d908eda772a1c824d0f393c8164d438c5e01b2f712f698b0ea36a7e5307f06e812083c480781a5e
-
Filesize
9B
MD5ec7139d5bb99bcebaf0b91c58a9ec5aa
SHA170404362dd74e309722fd282c3492ec95674123c
SHA256eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582
SHA512b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48