Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe
Resource
win10v2004-20230831-en
General
-
Target
e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe
-
Size
251KB
-
MD5
e51942534e975a10d4a82f48ad033621
-
SHA1
3f3ee8d1ce6a5766a760006a5e7422add57b90ab
-
SHA256
e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611
-
SHA512
fb3b9fe6f397fc59b3a084d0fd9dc1450ea8c8b5d43df5ff054b48652e7b891e6db333842aaad5a5d26f42e50a61407e19a2d1e36ae6e8f42a0b0f920f4bffa3
-
SSDEEP
6144:xVfjmNwgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:n7+LitXqsTkiR7twRx+gD8PJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3716 Logo1_.exe 1756 e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\be-BY\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\cs-CZ\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\Images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe File created C:\Windows\Logo1_.exe e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe 3716 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4916 4696 e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe 85 PID 4696 wrote to memory of 4916 4696 e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe 85 PID 4696 wrote to memory of 4916 4696 e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe 85 PID 4696 wrote to memory of 3716 4696 e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe 86 PID 4696 wrote to memory of 3716 4696 e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe 86 PID 4696 wrote to memory of 3716 4696 e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe 86 PID 3716 wrote to memory of 1728 3716 Logo1_.exe 88 PID 3716 wrote to memory of 1728 3716 Logo1_.exe 88 PID 3716 wrote to memory of 1728 3716 Logo1_.exe 88 PID 1728 wrote to memory of 2044 1728 net.exe 90 PID 1728 wrote to memory of 2044 1728 net.exe 90 PID 1728 wrote to memory of 2044 1728 net.exe 90 PID 4916 wrote to memory of 1756 4916 cmd.exe 91 PID 4916 wrote to memory of 1756 4916 cmd.exe 91 PID 4916 wrote to memory of 1756 4916 cmd.exe 91 PID 3716 wrote to memory of 3168 3716 Logo1_.exe 35 PID 3716 wrote to memory of 3168 3716 Logo1_.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe"C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBCB8.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe"C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe"4⤵
- Executes dropped EXE
PID:1756
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2044
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD505837162449feda11dd795d03402268c
SHA1ed5d26c8c53b676650d028e1b3014de10bce8456
SHA25619446ff46a22fc264a82d155dc51a15a52f11068027611617a8ec1b2fe208f38
SHA51277b6553f9650fd92f7fada8481d3b427882741e3eeaf5ca3dfcdbb16eda0c86933d7fb42f86acd05df44d56751fc394fdd30b59a95e30c07ce9d8dd538653c88
-
Filesize
722B
MD5710874947d1928274162ab0288eb527f
SHA140a79077467607ff2fd4ecb1955c8008427a91db
SHA2565f7cca78eba73fc1c1fc81d6126cca3bd84f4ca5ad5a6148eab06671dbcf847f
SHA512282ceae1a8261bb2472a73b7fdbf36746ae9b00d23c5906215acf91813323fd7ba18bb3d8ab5c883d95c05a426533971fd771367fdd9585e78f65e9f0fd2ad34
-
C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe
Filesize224KB
MD5d4b257c01bbaa68d15d8368475a4e227
SHA1fafae083a882e163cfa8c77258baaab891c17df2
SHA256dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546
SHA512167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502
-
C:\Users\Admin\AppData\Local\Temp\e74cb3ec663b1b60fd41f92d2ddd0546656233d872cfd8d0349a90317dbb5611.exe.exe
Filesize224KB
MD5d4b257c01bbaa68d15d8368475a4e227
SHA1fafae083a882e163cfa8c77258baaab891c17df2
SHA256dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546
SHA512167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502
-
Filesize
26KB
MD5126becf8099e1c58345358ed37931228
SHA1d6870a8b2320fc2f28343c2089e972a120f5bd18
SHA256499b62fcbdbbafc71126b753a799897bdb099f09c78fab30ec868dbcfca821a1
SHA512776a2aac52f708f124490ee27fd196f6c3a6a81e09a0bcf99de9f370940b53d2b64648a2fc0a49588474352d641c0f003fdc9df1a2d2a08461037615803c6425
-
Filesize
26KB
MD5126becf8099e1c58345358ed37931228
SHA1d6870a8b2320fc2f28343c2089e972a120f5bd18
SHA256499b62fcbdbbafc71126b753a799897bdb099f09c78fab30ec868dbcfca821a1
SHA512776a2aac52f708f124490ee27fd196f6c3a6a81e09a0bcf99de9f370940b53d2b64648a2fc0a49588474352d641c0f003fdc9df1a2d2a08461037615803c6425
-
Filesize
26KB
MD5126becf8099e1c58345358ed37931228
SHA1d6870a8b2320fc2f28343c2089e972a120f5bd18
SHA256499b62fcbdbbafc71126b753a799897bdb099f09c78fab30ec868dbcfca821a1
SHA512776a2aac52f708f124490ee27fd196f6c3a6a81e09a0bcf99de9f370940b53d2b64648a2fc0a49588474352d641c0f003fdc9df1a2d2a08461037615803c6425
-
Filesize
8B
MD5587438ba3214d6958f23eced1b2cd39c
SHA156d9150b977089419b026aaf6ee032981c437dfd
SHA2564a9d4c3f321c10e2bb0319dca7695b9b3252a0e1d35cfc2a09bac15d5c36e090
SHA51231309fcfa73bf18bb138cbe3744414acc13498184290586c8f185e828027f7b0c647f3f102826099465c7995a29e8a33d95f832ffac8d16b619b53f037e4fd63