Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Resource
win10v2004-20230831-en
General
-
Target
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
-
Size
298KB
-
MD5
20bfd2f230e5a9786c4aad703fbaee3d
-
SHA1
d7805fcac6a95e766b8907e257236914abe48ee6
-
SHA256
53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9
-
SHA512
5fef25a19aa7012197b4269a03befcdcea5655862932436c293e6337850f8a8aa33486c293478fb822e45f6b7638b1766e1cbbf3fc68aa84dfba0ddfcbfb4474
-
SSDEEP
6144:nVfjmNrbUARyUgzPcLactVks94DJ9TBA3QvE:V7+rlwUAPDsyLDJ9TagvE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1708 Logo1_.exe 3912 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sw-KE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\gl-ES\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_2019.716.2313.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4512 5056 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 83 PID 5056 wrote to memory of 4512 5056 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 83 PID 5056 wrote to memory of 4512 5056 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 83 PID 5056 wrote to memory of 1708 5056 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 84 PID 5056 wrote to memory of 1708 5056 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 84 PID 5056 wrote to memory of 1708 5056 53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe 84 PID 1708 wrote to memory of 3472 1708 Logo1_.exe 85 PID 1708 wrote to memory of 3472 1708 Logo1_.exe 85 PID 1708 wrote to memory of 3472 1708 Logo1_.exe 85 PID 3472 wrote to memory of 1952 3472 net.exe 87 PID 3472 wrote to memory of 1952 3472 net.exe 87 PID 3472 wrote to memory of 1952 3472 net.exe 87 PID 4512 wrote to memory of 3912 4512 cmd.exe 89 PID 4512 wrote to memory of 3912 4512 cmd.exe 89 PID 1708 wrote to memory of 3168 1708 Logo1_.exe 45 PID 1708 wrote to memory of 3168 1708 Logo1_.exe 45
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA6FE.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe"4⤵
- Executes dropped EXE
PID:3912
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1952
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD55725841defcb7e0548144bdc53e0b867
SHA1dd8c3c919b9ee5d068c5c42ba049cc2898add5c5
SHA2567a1876d6402a6e910fe1ace26d0fc6a0ae27599d0258f9352f6b81bc2b4b72a3
SHA512de6785d1de40c6b86ec99918bd3b0e884a81377ad1d353799cd34a3399cde727ccbcd48af0880cd5f48ee9ef1bb98fa8f870a83c38f8b9aea77cbea2ade0331c
-
Filesize
484KB
MD59ef9536b4ac85c7ea538b89cfc5d8d75
SHA1c251303b7a865926a5612bcd6dc3855dfcdb77ec
SHA25608fbc3682455d75cc26b0699e8004512e819841528fcd7198cb1d877e3e24ce1
SHA5123b8086c8a62a49a65d6c04df17acb6d7fc43580a59cedcd03061621a85eafea0e2afa7591d35e308f9d5ae583e15134549743f2a15719ab4cbadd98659c83fe7
-
Filesize
722B
MD5c666e6700840d694aaade305db3515b4
SHA1e399d0a7b6b4f1eeaba804f7eb5f35c865405017
SHA256731a00eb727adff9865cf6d65c53274699ebe070a682b82a00a52ead63f3e25d
SHA512faa4249776319ac287e495e8c1d9310dee84fd61d8aa071fd33318ff115e26e9a2ae93c0aae36966fbf106359996e6b33b977ec00b9faeeb59e9ee69314346a7
-
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
C:\Users\Admin\AppData\Local\Temp\53af8fc26acdfd57656bdc8037435807599c7e3502f7024a8e3b6db177f002b9.exe.exe
Filesize271KB
MD563475fca261f68f0d42c9372f9a77308
SHA1e1ab1002db6723da4cdd0ebd5952ad21c41b9a72
SHA25677d1bb014061f82e7dbb4038d062edff4cd961414283694ba5cb10386867b0f4
SHA512520689f8013607ff0a275d8437b6c089819f53134a029f656f8ae550985b20170d1386a8017799630f39e08bb7f79326725a78bf1256b04ce3e0d22706c96d96
-
Filesize
26KB
MD52da5a57d1ba2ed4b46bc3c9817948557
SHA18b28792220f874e0abd68de5d946c3ae111f6abb
SHA256e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f
SHA51229940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91
-
Filesize
26KB
MD52da5a57d1ba2ed4b46bc3c9817948557
SHA18b28792220f874e0abd68de5d946c3ae111f6abb
SHA256e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f
SHA51229940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91
-
Filesize
26KB
MD52da5a57d1ba2ed4b46bc3c9817948557
SHA18b28792220f874e0abd68de5d946c3ae111f6abb
SHA256e3c3821d97d831fe32ef85bf7e78b397eba5cd839568aeae330e28e702eb662f
SHA51229940a2b80714d8f816a0d6b4f5d93cfb4aeae5e0303f6f06d5091a3e0dc405ae1a1def41ea5e2e709ed6c20d4f4fd8f1d9527ca6eb4eb6d6cf1bc5fce4a7e91
-
Filesize
8B
MD595127a81ba5781b47158c7bade11f958
SHA1fa289ca07d3998db8f732dc188ff099b7dcefd86
SHA2564b413fdd0fc873cb5cf1b957078e2786827cb8d3665159e02b7bfda486133aaf
SHA512c1403a7b2e462b09a03f09ba4ecff788db0d0402c09086b65c435c606a5c898ebc9959e47f77a5985881eee0e4364b035a3fa926672e8b61e2cc9bf7c3b169a0