Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2023 19:39
Static task
static1
Behavioral task
behavioral1
Sample
b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe
Resource
win10v2004-20230703-en
General
-
Target
b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe
-
Size
118KB
-
MD5
f99ef8eb09b24dd7026e9680f666a54e
-
SHA1
f8ee5da2e1ce2f12481b67494b583f1781a95de4
-
SHA256
b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949
-
SHA512
93f3590216028c22b5c26aca08534f677b1b9e82f57f454e4ca5601110cd41de42317a2041d97eb2d3230509a8bef1807570731c7d0c7f18e81e2487086dc8a6
-
SSDEEP
1536:OmfgLdQAQfcfymNG+Kxwmn4Y4Ykv8JEn6M04HiKq7UkPlHae5:7ftffjmNoxwmn4YtkcQ6M04HalEy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1060 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\cef\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Shell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hr-HR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe File created C:\Windows\Logo1_.exe b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe 1060 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1132 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1132 2992 b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe 80 PID 2992 wrote to memory of 1132 2992 b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe 80 PID 2992 wrote to memory of 1132 2992 b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe 80 PID 2992 wrote to memory of 1060 2992 b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe 81 PID 2992 wrote to memory of 1060 2992 b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe 81 PID 2992 wrote to memory of 1060 2992 b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe 81 PID 1060 wrote to memory of 2616 1060 Logo1_.exe 82 PID 1060 wrote to memory of 2616 1060 Logo1_.exe 82 PID 1060 wrote to memory of 2616 1060 Logo1_.exe 82 PID 2616 wrote to memory of 556 2616 net.exe 84 PID 2616 wrote to memory of 556 2616 net.exe 84 PID 2616 wrote to memory of 556 2616 net.exe 84 PID 1060 wrote to memory of 3144 1060 Logo1_.exe 57 PID 1060 wrote to memory of 3144 1060 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe"C:\Users\Admin\AppData\Local\Temp\b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aEEF.bat3⤵
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:556
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5edf07d233b5fa4fbd83febae9adf82d9
SHA159dc0562df337c65f823037d474db6fe30c18e57
SHA2563cfee539be1a2652082a554d73be98d00611a00e9a65c61877c843dea89d3a0d
SHA512d17ee9f317bcf4f1fbdae2adc71b30427d0f9e398295c40333c871d6ee58a487682fb238f3e3e78f5cca28e6af86497eb29aea2dbc10ecdf9b7fde7a7194f30b
-
Filesize
690KB
MD5ae20401e650dab7ec454a3f12f7e3cfb
SHA16675171bef025a252a20bfe653ce39d6c88f9f84
SHA25612cd9e59dbda8e31799cdc799d165a077f78af1172f039da5e293c44a2d4370e
SHA5121b5b157b6b83ba5c6dc0f42265baea2f5f4180973b8510e7bacb5bb886719b116d62664763826cf475c2378253714a3478d80fa60afcd8492bda6a881a1338a1
-
Filesize
721B
MD518e0112e36144020d154086494593599
SHA1766f42d1b4064de7e14485a84f4ac102d3276ce6
SHA25671ca6af29f51461c7eb50ce0eedd84e80625d30a038f9681db9d32081680811b
SHA5125ded75c8a0a0669883d6a1b766e540df41811476762c53d5df7aa53f561951295723f85eae9b200ed9d3071a58c848f70568b93c6d50d35fd4b77c762f0c5e9a
-
C:\Users\Admin\AppData\Local\Temp\b82426cda9ed45d3321498c4773c2b1472de2baa01756812b1f87d73ac54c949.exe.exe
Filesize91KB
MD513bd3153788cd2b2507707cf4cfffad3
SHA137222b1be626903e89a840760394561bf0f46264
SHA25633870552c399350caa27ef708d0a883a366da5e08b7231301103427da5092b3a
SHA512f0f1fd5ed49214c68c22832c9f33acc826a4e4284fafa51b14241ffb04b2c0f30fe356c4110270768981aa1fe8bdc8beb9a19b01ffe872dbb925fd5280ad0f6d
-
Filesize
26KB
MD576d139dc82d0b5e4f8f9231f1a8ec2b4
SHA1d3af685526a7e0dddef11d6a5ce4a28334c4bf8a
SHA2569510462fe48643e4b616c731af8388e5fb614b36da73122d21f85a96aec71d66
SHA512967ef8402d092b89f11190cb8dfa37068f6e70f6b049139ddd38ca2e12e180616cc9e6b8268c60844e8a0c4bd44f98a81723f98ec0ab2aa76c6aa5507c4744db
-
Filesize
26KB
MD576d139dc82d0b5e4f8f9231f1a8ec2b4
SHA1d3af685526a7e0dddef11d6a5ce4a28334c4bf8a
SHA2569510462fe48643e4b616c731af8388e5fb614b36da73122d21f85a96aec71d66
SHA512967ef8402d092b89f11190cb8dfa37068f6e70f6b049139ddd38ca2e12e180616cc9e6b8268c60844e8a0c4bd44f98a81723f98ec0ab2aa76c6aa5507c4744db
-
Filesize
26KB
MD576d139dc82d0b5e4f8f9231f1a8ec2b4
SHA1d3af685526a7e0dddef11d6a5ce4a28334c4bf8a
SHA2569510462fe48643e4b616c731af8388e5fb614b36da73122d21f85a96aec71d66
SHA512967ef8402d092b89f11190cb8dfa37068f6e70f6b049139ddd38ca2e12e180616cc9e6b8268c60844e8a0c4bd44f98a81723f98ec0ab2aa76c6aa5507c4744db
-
Filesize
9B
MD52326d479b287193a70f520700dc8d23e
SHA1afea66d3788a50debd6f5d4c9dd51f68a4477e64
SHA25695d41561a1467d20977f59108e85da181e0b4dfd3db9e40182ae7378c4a927f8
SHA512cb971c406ddf7147536a6a1569d4ff49d7219aa52cde5d110be1109874d66daace832d423d7969af9e6bbc9738a65734c7e68e994591b7677aad51fa0f52cf37