Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2023 07:47
Static task
static1
Behavioral task
behavioral1
Sample
042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe
Resource
win10v2004-20230915-en
General
-
Target
042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe
-
Size
106KB
-
MD5
5e9cf02766e819ed2e9790701a15abc8
-
SHA1
8560510b425f265fc0d5d692dda1b9736231bccc
-
SHA256
042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e
-
SHA512
35a2b60f192c49f160e88cb91374e586969efd3fa6f0c3e8a4fd522fd802bd720babad7b165f11ccbca07f9a6ed5cba5605e760d33172b20b1544a658dc4e1c6
-
SSDEEP
3072:pykuJVLgzoTNenyOLZaYWbB7dol+pW77M90B:5uJuzoTkLZa/lRol+pf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1428 Logo1_.exe 3836 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Microsoft.Support.SDK\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Speech\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.513.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\firstrun\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Shell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\ThirdPartyNotices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe 1428 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3912 2020 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe 86 PID 2020 wrote to memory of 3912 2020 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe 86 PID 2020 wrote to memory of 3912 2020 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe 86 PID 2020 wrote to memory of 1428 2020 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe 88 PID 2020 wrote to memory of 1428 2020 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe 88 PID 2020 wrote to memory of 1428 2020 042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe 88 PID 1428 wrote to memory of 4076 1428 Logo1_.exe 90 PID 1428 wrote to memory of 4076 1428 Logo1_.exe 90 PID 1428 wrote to memory of 4076 1428 Logo1_.exe 90 PID 3912 wrote to memory of 3836 3912 cmd.exe 92 PID 3912 wrote to memory of 3836 3912 cmd.exe 92 PID 4076 wrote to memory of 4652 4076 net.exe 93 PID 4076 wrote to memory of 4652 4076 net.exe 93 PID 4076 wrote to memory of 4652 4076 net.exe 93 PID 1428 wrote to memory of 3168 1428 Logo1_.exe 62 PID 1428 wrote to memory of 3168 1428 Logo1_.exe 62
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe"C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aF695.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe"C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe"4⤵
- Executes dropped EXE
PID:3836
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4652
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
487KB
MD57933abe48809ab31e0918d9e179da33b
SHA1f85cc9e1049e57ec6da464a404a926d43119fd0f
SHA256ab2d9f6b589b63d388bcf8ea14bfc2dd0ad18fb0bb82db5f13bebe75ce990856
SHA512dfb982067c6daa2ec19b9b6e0e92be11a9784a06ef9c5b239fc12c84cada1dfa4252512253afdd052aba5940928b58eff8ffb479e1a68a1b685491948030f21a
-
Filesize
722B
MD582314c322684294e97cd57a788c51ed4
SHA139549cc4db9b2f912983c175fbd6438100454479
SHA2569f87d0f38db4ecc25aee69a314c48fd1e597ea9380c54feee208233864a7bb6e
SHA512b086628b8303a001701666bfddb39466198bbefeedfa8c66f975ad3d7e26a5e07a1bcab4a14de84e9566c41aef197920a21f808d05f2463667bac0b13c74856f
-
C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe
Filesize77KB
MD5a7716d38fea21265e471d4ef980e71c5
SHA1371ce2ec176015299d9605e06271dd85bb35b393
SHA2562d9749fb6e3fbf080c8261974ade955fbb10dbba5ef7f37863820a199caf81f1
SHA512c402373b60e50166537334116bc7a3e78f7794de198700f610101e6a479071c395fbbef66f23d2169e212672ef85debd45c17b9290eae929cb22fc9ff480d3b8
-
C:\Users\Admin\AppData\Local\Temp\042376058c11550b79de907155ccd7b983c72a28f1b36f1b77b3cbf41a97d56e.exe.exe
Filesize77KB
MD5a7716d38fea21265e471d4ef980e71c5
SHA1371ce2ec176015299d9605e06271dd85bb35b393
SHA2562d9749fb6e3fbf080c8261974ade955fbb10dbba5ef7f37863820a199caf81f1
SHA512c402373b60e50166537334116bc7a3e78f7794de198700f610101e6a479071c395fbbef66f23d2169e212672ef85debd45c17b9290eae929cb22fc9ff480d3b8
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
29KB
MD5cf88808bf1a7bb211e559a06b88bcb9d
SHA1494e46d62930a122e416356c9d2cec58d7fd7e45
SHA2564bf3328e40fd19185b720238497918abdbf018580f705675729f300f4acc25c4
SHA512e92c6ceec34424b33ebcdbda8a3eaa5054410ac49c720eb052f107d0650db69cab07a1abcbc64b872d4fc64593cb1128d7bd9ad2eaaf8b12f1900f30e0b95e65
-
Filesize
9B
MD5dff4f6f0cc6b8b3bb8efb4a275a8f779
SHA1e87d0f214e09712ed6d4d73e571edb2c1b140327
SHA25634eaeafe313f318504cabbbdf6a150f2928ed89c13a836126478f56c6904cd20
SHA5121a534267509c4dd7c0421a5460ea7b3d58e05ba1343c2f45ca6ca537ff5259f1fae31c68928acba3492875ba270242f41c43ed5d705d31cf9af5a56ca4edd0e0