Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2023 09:21
Static task
static1
Behavioral task
behavioral1
Sample
3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe
Resource
win10v2004-20230831-en
General
-
Target
3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe
-
Size
1.2MB
-
MD5
9b132130d596f1267c033e6836c6dae0
-
SHA1
f79117f9afb7988bcf3dec3bedf7f630919986b3
-
SHA256
3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438
-
SHA512
a01b28c0e5f189e0483752b48f7d1cc92a216d96b682aa55ae5e7fcc745ad37331c3f628d0d913271ee48d0842abdc50aa226714fba460d3afe7fa3bdf4f8476
-
SSDEEP
12288:bwuNTkUqw8FOw2uRpfd2PSKWcRn8FvhPkCBZg87KvQSqWy/SUfo3MA+nkzixGy3:b9Ww8Fh2uRpMPSJcx8FvdlgGCh8hfZGA
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3636 Logo1_.exe 4328 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{896FC373-1779-4998-B6DD-71084873917A}\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\HoloAssets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\Attribution\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\id-ID\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MLModels\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\eu-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe File created C:\Windows\Logo1_.exe 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe 3636 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4164 wrote to memory of 4116 4164 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe 80 PID 4164 wrote to memory of 4116 4164 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe 80 PID 4164 wrote to memory of 4116 4164 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe 80 PID 4164 wrote to memory of 3636 4164 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe 81 PID 4164 wrote to memory of 3636 4164 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe 81 PID 4164 wrote to memory of 3636 4164 3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe 81 PID 3636 wrote to memory of 4428 3636 Logo1_.exe 84 PID 3636 wrote to memory of 4428 3636 Logo1_.exe 84 PID 3636 wrote to memory of 4428 3636 Logo1_.exe 84 PID 4428 wrote to memory of 1744 4428 net.exe 85 PID 4428 wrote to memory of 1744 4428 net.exe 85 PID 4428 wrote to memory of 1744 4428 net.exe 85 PID 3636 wrote to memory of 2568 3636 Logo1_.exe 74 PID 3636 wrote to memory of 2568 3636 Logo1_.exe 74
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe"C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5D72.bat3⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe"C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe"4⤵
- Executes dropped EXE
PID:4328
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5568f17750238ab463c745953a303648a
SHA125e9de37d6edb52c584c442e4f93a0448b4b37d4
SHA2565351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81
SHA5129034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3
-
Filesize
781KB
MD5bcfb6bd2668a601a5970d0c2736774ba
SHA11f26d662ddd2aca57cc5426949770e0a9c64144d
SHA2562c2ede4ad08c37fbfaff4ec777d657210df4534e51302956ed1a5ba06ab7c9f5
SHA51233a6b9921ab62ccb2d7fc54c9fe3a3384740f5028f0964c82df8d103dda25ccaf2b45e7510c06b4bdc6a5bc0ec1c80f72261c9c32a88c0163a3d051725f305a2
-
Filesize
722B
MD58d1487352cdb7ce195ce1f096b45dd04
SHA11737c862d47fa8b25df8dfc8d227aa525d1b5629
SHA256472d71f98c00eaba1cc1aa55a8c151296b950ae586ef61b12385783f6166a269
SHA512613ccb0d5c9fb8573eb42ef480c6b680e50e063dcc86c3d1fbde8dd19afd4fd59306117b2a7f8367cb2b7e983b283f53c1e7cdf6dafd964651415fac083676a1
-
C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe
Filesize1.2MB
MD5a51cd5d5d0d731a48ff85bc636f6857c
SHA1980018a6fbf1122e7d5fc5d5cdb01ae212d80b70
SHA25692345a3ff8ee21ed4f830f4a581c8f385536c00e492f078f542d2f5e72229529
SHA51204d7c8787c0f44fcc7d2fe4a10016c1b72f9356987148f9e133d6b8e438c60a16c0a931f00129f0cf3b80fe19c941f7445fe1240b9b1c8eb7e1636e7b25ac947
-
C:\Users\Admin\AppData\Local\Temp\3254d014eb001868dbfce3df28ef1e96d533955a4bafb44e048e86435aaa2438.exe.exe
Filesize1.2MB
MD5a51cd5d5d0d731a48ff85bc636f6857c
SHA1980018a6fbf1122e7d5fc5d5cdb01ae212d80b70
SHA25692345a3ff8ee21ed4f830f4a581c8f385536c00e492f078f542d2f5e72229529
SHA51204d7c8787c0f44fcc7d2fe4a10016c1b72f9356987148f9e133d6b8e438c60a16c0a931f00129f0cf3b80fe19c941f7445fe1240b9b1c8eb7e1636e7b25ac947
-
Filesize
29KB
MD5a0a84e76a495cbe3dd66615625e80be3
SHA1e17712c6939d13dc78aa8306871ff685c9cf00b5
SHA256908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d
SHA512b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2
-
Filesize
29KB
MD5a0a84e76a495cbe3dd66615625e80be3
SHA1e17712c6939d13dc78aa8306871ff685c9cf00b5
SHA256908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d
SHA512b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2
-
Filesize
29KB
MD5a0a84e76a495cbe3dd66615625e80be3
SHA1e17712c6939d13dc78aa8306871ff685c9cf00b5
SHA256908960608aff75cbb5bb3855d25f86dbc86847905b1c6bcfbe4da648e58c507d
SHA512b3c066856ff1bdff4b8825ab8e849a95ad2133e6e104d14b88e750792479690e2cf9d807f197adfdd73549b706774150e2574973e750c7f4e0c71bed95e9faa2
-
Filesize
8B
MD56bdc569e34ba772e6a02bf98e5269208
SHA1d6e9053ccd9906f78c9f4dd12414246f31622d49
SHA256a2f6c9ea9fb63e52c84ba26b60450f841bafcf7378af3f8310c32c86701dc148
SHA512d25858c63ebf7077fbf1a96c3fbb6577cab1ebd3d133f6982672e6c721bebee655028a8f35292c1c3fc1d3d1a166256da32a54e3981c453fa0b30df3b2278ee0