Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe
Resource
win10v2004-20230915-en
General
-
Target
2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe
-
Size
46KB
-
MD5
971ac149216883afad3ce3364df60d3a
-
SHA1
79292e2392bdef035343a3d081a38c3f3cca8c25
-
SHA256
2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049
-
SHA512
ed311830d3669810072e9a85ee15165e24b49523d282a6ab812c854abeb03db7a74d26b6f4fd712460e1ca0a28885253c2fdc6df04f97de05fe12f512aa0c7b8
-
SSDEEP
768:W41ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLfnV9P8RGZ2FXjfLDG7AhUf2hU:zfgLdQAQfcfymNLV9GjfsAhUf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 468 Logo1_.exe 3540 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x86__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Notifications\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleAppAssets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe File created C:\Windows\Logo1_.exe 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe 468 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4468 wrote to memory of 828 4468 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe 85 PID 4468 wrote to memory of 828 4468 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe 85 PID 4468 wrote to memory of 828 4468 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe 85 PID 4468 wrote to memory of 468 4468 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe 87 PID 4468 wrote to memory of 468 4468 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe 87 PID 4468 wrote to memory of 468 4468 2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe 87 PID 468 wrote to memory of 964 468 Logo1_.exe 88 PID 468 wrote to memory of 964 468 Logo1_.exe 88 PID 468 wrote to memory of 964 468 Logo1_.exe 88 PID 964 wrote to memory of 4204 964 net.exe 90 PID 964 wrote to memory of 4204 964 net.exe 90 PID 964 wrote to memory of 4204 964 net.exe 90 PID 828 wrote to memory of 3540 828 cmd.exe 91 PID 828 wrote to memory of 3540 828 cmd.exe 91 PID 468 wrote to memory of 3156 468 Logo1_.exe 51 PID 468 wrote to memory of 3156 468 Logo1_.exe 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe"C:\Users\Admin\AppData\Local\Temp\2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aC5D0.bat3⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe"C:\Users\Admin\AppData\Local\Temp\2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe"4⤵
- Executes dropped EXE
PID:3540
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4204
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD50b8ca9bd200cfc077367fafb2f5e99ba
SHA10a8494c1fb2a50067e6ecd63af5ce1431439ad0a
SHA256bb93e63dbe4a922d8a33ce7d446ef9c52e489991fb586884a28b0bb66a363263
SHA51239585db684d3a59d72bf049c9d4611dc7539ae7be7471bdacf7cdb9a63d8ac2b643658b77143e7827a6d3502f87c4cb48add5dc80966db3a5e2c4ec362389723
-
Filesize
484KB
MD589e54ea772ef901ff7caffcb3f101908
SHA17e5487877aee934d5051770f20d035e06045c305
SHA2563a0ab9afc68a3c77800c999453b46079ab475adcde67f6e17685f65e351e9704
SHA51206001f9828eb632f25b20509256f90860149a409cb96737dc3b809b30acb78274492beb1fa7d9b95d93a7df0febf34f10478469830e8ea19dab20ea6ec75bb14
-
Filesize
722B
MD59de11d51f6167c66ab8b3b88df3eb703
SHA17cde5d93f33ba8407f664d284e86f3ac7242ccac
SHA2567e1f9d0c3bc20be11479010dee835bf71e35703040bfc65458cf3ed3179453de
SHA51284ba160a1012090dfad6b53952b9ba41f2ef62221ff415314411fb54a1a3f5e365949945ef9ad4b9efa004c7d9143424a2bb1ee45a9e0192316f452de9088e38
-
C:\Users\Admin\AppData\Local\Temp\2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe
Filesize20KB
MD5a9db34f9927e88710bab2e9930bd86f4
SHA1e76446aff69441e29315e0dc3966efb3387538c3
SHA25669a22c0c6dc5c31c04720b613cd4227ff2073b03108910a3f7aaa3924d8ab6c1
SHA512ec28dd2f1c86b94afdc9ae50721ddaaed984a441fa039f79df0f3cda6c4ed98306c010295bdfeab4c553bc5a28af92a7d129389176b83a9404ca856a0505ef88
-
C:\Users\Admin\AppData\Local\Temp\2f26e46b1b926c071df1fb0704ec697bf4dc823828b1fe9b80edf157639f8049.exe.exe
Filesize20KB
MD5a9db34f9927e88710bab2e9930bd86f4
SHA1e76446aff69441e29315e0dc3966efb3387538c3
SHA25669a22c0c6dc5c31c04720b613cd4227ff2073b03108910a3f7aaa3924d8ab6c1
SHA512ec28dd2f1c86b94afdc9ae50721ddaaed984a441fa039f79df0f3cda6c4ed98306c010295bdfeab4c553bc5a28af92a7d129389176b83a9404ca856a0505ef88
-
Filesize
26KB
MD57aa3f7d0ddde37d1ba8a81eb45ae6238
SHA1f6cfaf6008198edfb624e959404928c0fd860d5c
SHA2568aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8
SHA5125440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061
-
Filesize
26KB
MD57aa3f7d0ddde37d1ba8a81eb45ae6238
SHA1f6cfaf6008198edfb624e959404928c0fd860d5c
SHA2568aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8
SHA5125440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061
-
Filesize
26KB
MD57aa3f7d0ddde37d1ba8a81eb45ae6238
SHA1f6cfaf6008198edfb624e959404928c0fd860d5c
SHA2568aee1ead2b934856107773de256c27c38118249a07a88e5f3fb0e710f61f4fc8
SHA5125440020514ad92a5c52113cfd5077dd012cb0605530140a582d55a828d9b626cbc809593f1400685b1109f17e98e5f03e0e228ebca1ec19bf09430ce2fa11061
-
Filesize
9B
MD5872506f1dadcc0cedd1e9dee11f54da4
SHA1d1e87145ed1d918f10ae4e93ccdbb994bc906ed5
SHA256a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104
SHA5126cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c