Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2023 22:53
Static task
static1
Behavioral task
behavioral1
Sample
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Resource
win10v2004-20230915-en
General
-
Target
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
-
Size
520KB
-
MD5
3b4fa16b085177077129ee22d946fa7a
-
SHA1
007a18f9d487149ec5316cdddf647c009a1848a2
-
SHA256
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f
-
SHA512
43afc7734c26cb06f6200749b34f59c6c96d38fd0b4f653db490bd272a3c48e5ba9556761cca31ab57daa0751f508773465dfa4b744c9a1a6fde99e7cf5c9538
-
SSDEEP
12288:C7+ONcKAEJ6RLtx4c8PF39A55nJTuxGfqseVF+J92QpCgGy9RTPq6xy3NhYhYUnB:C7rNcKAEJ6Rpx4c8PF39A55nJMGfqse0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3868 Logo1_.exe 4064 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\Location\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fa-IR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ko-KR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\et-EE\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kn-IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe File created C:\Windows\Logo1_.exe c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe 3868 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3912 4416 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 85 PID 4416 wrote to memory of 3912 4416 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 85 PID 4416 wrote to memory of 3912 4416 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 85 PID 4416 wrote to memory of 3868 4416 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 86 PID 4416 wrote to memory of 3868 4416 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 86 PID 4416 wrote to memory of 3868 4416 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 86 PID 3868 wrote to memory of 2364 3868 Logo1_.exe 87 PID 3868 wrote to memory of 2364 3868 Logo1_.exe 87 PID 3868 wrote to memory of 2364 3868 Logo1_.exe 87 PID 2364 wrote to memory of 4592 2364 net.exe 90 PID 2364 wrote to memory of 4592 2364 net.exe 90 PID 2364 wrote to memory of 4592 2364 net.exe 90 PID 3912 wrote to memory of 4064 3912 cmd.exe 91 PID 3912 wrote to memory of 4064 3912 cmd.exe 91 PID 3912 wrote to memory of 4064 3912 cmd.exe 91 PID 3868 wrote to memory of 3132 3868 Logo1_.exe 49 PID 3868 wrote to memory of 3132 3868 Logo1_.exe 49
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a69D6.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"4⤵
- Executes dropped EXE
PID:4064
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ba24806644570741313b60a09c27cba4
SHA16ba98bc1253d61cd0afbabf608f325dd4dcf2c92
SHA25643c20e101fcd473b95cec7572e809aba2ec299255fe07092af4274e6333f15f9
SHA5121c3fde6176fadb0dc8c530957eca2f346498988d709c06647c0243aafa8f7b65652d729991a9b8d803901825c54387407957de9f6e2e560832888abf2efb80cf
-
Filesize
484KB
MD514f3836242c39a2de858ad495255fce1
SHA1f0c723beaa274fb3bc0d5b1bdf4e02adaa142fad
SHA256ab3f1a85f7e7f713f92e167036b74678ba2a197894c87c79ff47634469cafd2c
SHA512f023e29ad81ab57f0c72e7726e514b8da9d5cdd0dfe3efeb84091d89d31cfdf445961d678dab359a6b5a577bfb39357745d00dc54549eaa59388418e02b32a03
-
Filesize
722B
MD5d97268241a18fc9e7d56213d2cdd8bf7
SHA15982cfb5c5796077f89b0a90fc5863a761c754af
SHA256c3c5b67ea099b128c19e89da958dbbbc3f9501f213a81084811e5e46f17d4c39
SHA51258989cae42626ff425973350d3578762292d74243bb505e16dec13b48ae0d5062dbdfca4f9600fe6423ed63784b6da3e267c9b521e01b75576defb17ce167cda
-
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Filesize494KB
MD523820da01dedb3c8ba968cef45e80587
SHA168a4c2d2443f6dbbcb547c6da3eae63a45015f64
SHA256290be7cb3c5407af314885ce1adfcf4c4c22284ebbc55a5e0b261bd60f613fa8
SHA5128c826a9099c74fdc03ce76994bca9cbc911295f0723a2cb1f1104e8886bd37626594e2d318a128bd34545ddafc336211917f210f0a3abb19bb63b69b6c9528fa
-
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe.exe
Filesize494KB
MD523820da01dedb3c8ba968cef45e80587
SHA168a4c2d2443f6dbbcb547c6da3eae63a45015f64
SHA256290be7cb3c5407af314885ce1adfcf4c4c22284ebbc55a5e0b261bd60f613fa8
SHA5128c826a9099c74fdc03ce76994bca9cbc911295f0723a2cb1f1104e8886bd37626594e2d318a128bd34545ddafc336211917f210f0a3abb19bb63b69b6c9528fa
-
Filesize
26KB
MD51b31452e45df5fba0beb2d59bf0928ba
SHA11dd2c6fcd39ef7a34542e140184267edbd32b9c2
SHA256f6a58e3558b09e60f9df209b4f8e707fdba599dce13651fb6beb07c3d70058bd
SHA5122811492a404084570405f4b2d728501b6e508f98926f6e6fb042260dfd5f5420344e8dfb33449dd887d18f14faea65c1d2793f0377b6e96bfe89ec4e28f5ab12
-
Filesize
26KB
MD51b31452e45df5fba0beb2d59bf0928ba
SHA11dd2c6fcd39ef7a34542e140184267edbd32b9c2
SHA256f6a58e3558b09e60f9df209b4f8e707fdba599dce13651fb6beb07c3d70058bd
SHA5122811492a404084570405f4b2d728501b6e508f98926f6e6fb042260dfd5f5420344e8dfb33449dd887d18f14faea65c1d2793f0377b6e96bfe89ec4e28f5ab12
-
Filesize
26KB
MD51b31452e45df5fba0beb2d59bf0928ba
SHA11dd2c6fcd39ef7a34542e140184267edbd32b9c2
SHA256f6a58e3558b09e60f9df209b4f8e707fdba599dce13651fb6beb07c3d70058bd
SHA5122811492a404084570405f4b2d728501b6e508f98926f6e6fb042260dfd5f5420344e8dfb33449dd887d18f14faea65c1d2793f0377b6e96bfe89ec4e28f5ab12
-
Filesize
9B
MD5872506f1dadcc0cedd1e9dee11f54da4
SHA1d1e87145ed1d918f10ae4e93ccdbb994bc906ed5
SHA256a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104
SHA5126cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c