Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2023 14:29
Static task
static1
Behavioral task
behavioral1
Sample
1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe
Resource
win10v2004-20230915-en
General
-
Target
1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe
-
Size
180KB
-
MD5
80a11cd2aeb53af45f78af93e0cd1d33
-
SHA1
65367038e9d89a113b1a1c1dd4da42d8930e6951
-
SHA256
1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18
-
SHA512
b1f9aaad935d1493f2a5d5b145c399e476cfe5de17cf81ea6d56d3008ab60ae1cf6305be0dfd6c294ba038776f2959bd7624aa7934b68c81cf9980d0c4a8f6fd
-
SSDEEP
3072:5ftffjmNs9CEAGxiVRh+h85ufeKg0eylJ6YSXWkvDObXt4O:RVfjmNUxiVRh+i4Wt0ey/6YSXAmO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2196 Logo1_.exe 1680 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Shell\Themes\Glyphs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\MicrosoftEdgeUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\EnsoUI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\SetupMetrics\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\Microsoft.Advertising\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-gb\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe File created C:\Windows\Logo1_.exe 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe 2196 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4916 wrote to memory of 3312 4916 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe 82 PID 4916 wrote to memory of 3312 4916 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe 82 PID 4916 wrote to memory of 3312 4916 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe 82 PID 4916 wrote to memory of 2196 4916 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe 83 PID 4916 wrote to memory of 2196 4916 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe 83 PID 4916 wrote to memory of 2196 4916 1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe 83 PID 2196 wrote to memory of 1968 2196 Logo1_.exe 84 PID 2196 wrote to memory of 1968 2196 Logo1_.exe 84 PID 2196 wrote to memory of 1968 2196 Logo1_.exe 84 PID 1968 wrote to memory of 952 1968 net.exe 86 PID 1968 wrote to memory of 952 1968 net.exe 86 PID 1968 wrote to memory of 952 1968 net.exe 86 PID 3312 wrote to memory of 1680 3312 cmd.exe 88 PID 3312 wrote to memory of 1680 3312 cmd.exe 88 PID 3312 wrote to memory of 1680 3312 cmd.exe 88 PID 2196 wrote to memory of 3188 2196 Logo1_.exe 50 PID 2196 wrote to memory of 3188 2196 Logo1_.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe"C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA345.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe"C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe"4⤵
- Executes dropped EXE
PID:1680
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:952
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5cf60447b5a5d7b2e800c5389c00686b9
SHA1537bd6ffe4c8393f09faf07ce7e67c6355a29683
SHA25615ca4a536e83e6637b34d89a07be1aa47f19c24eb4ed8cc8ce4f7cd5a7d6e6be
SHA512ed7c4691f3ffec6a19538b872525758d17c4b72de2efe24b49da3197d1454e07ca4c9cfbcc02db692d4adada71936ecdcb4e44e1508aea778d80028430d831ac
-
Filesize
484KB
MD54296ca7070db49a5a0927a486d0b9d67
SHA12d74bf8174925d4746bf98046bac314ea1fb511b
SHA256e81ed268575198411bafd037b4bc2666dd5fd99bd843e626e7ae7a0c775182c0
SHA512f0d7c24fb9c93843884b2ff5e6b1100766f7436228b443ebb64fcd367cda5422bfd677d040e09117948e288f572a3c6b9936525826f1b89a6322d7e4f0c72b9d
-
Filesize
722B
MD527f5cf619daef02b31ca721937c4f258
SHA121f3f3051887ed00039bd404bfae30ad646df91c
SHA256f3572007e1dd196df277f61c855f9e64a15e02218c69dca204304df69d367615
SHA5124f8444bff810192a5dd2beb20d742a28ccef449bc5108dec2613be4e4eaa1e6c0cc6afbfa2e539bb64899d6e2fe0f6eeabecdd6218e3f235d79b0ec423b33231
-
C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe
Filesize154KB
MD599c93b09d70b12cda44554b78d0667a7
SHA12241e25b63f032dd5167e29375eb9565a0fa1406
SHA2564a3dd52b06a4334ca382e9fd669ecb3fcd37d1b38c2f91a757d32fa76c762ce2
SHA51245935d5670d6d1c37807c214c87d2c81e6b4147df0dff6bc3629a286eb1391834e406fc70b84cdd9a1468ed429ffdc174fef3c0afcac901a97e66b21d1659af4
-
C:\Users\Admin\AppData\Local\Temp\1ea0f9780257a0b172b505888106f54e0cc8be69e713753827143d245426af18.exe.exe
Filesize154KB
MD599c93b09d70b12cda44554b78d0667a7
SHA12241e25b63f032dd5167e29375eb9565a0fa1406
SHA2564a3dd52b06a4334ca382e9fd669ecb3fcd37d1b38c2f91a757d32fa76c762ce2
SHA51245935d5670d6d1c37807c214c87d2c81e6b4147df0dff6bc3629a286eb1391834e406fc70b84cdd9a1468ed429ffdc174fef3c0afcac901a97e66b21d1659af4
-
Filesize
26KB
MD536b3f02b659eb0ad5fddf054af96b525
SHA117eab1988b6601611ae0683bb8b26ec04c377cb9
SHA256a1822df7617c493bc4dca454e06a5f93d3dac7b6133b5a8dca37866d3cd3c1c6
SHA512e20e9add4525449be31da571226255cb3cb06bf1f2efe84591e77972283407c783321b676f2e3bc78dd85dcfb0f20db77a40bcd179599cdd0f453534acf9dbaf
-
Filesize
26KB
MD536b3f02b659eb0ad5fddf054af96b525
SHA117eab1988b6601611ae0683bb8b26ec04c377cb9
SHA256a1822df7617c493bc4dca454e06a5f93d3dac7b6133b5a8dca37866d3cd3c1c6
SHA512e20e9add4525449be31da571226255cb3cb06bf1f2efe84591e77972283407c783321b676f2e3bc78dd85dcfb0f20db77a40bcd179599cdd0f453534acf9dbaf
-
Filesize
26KB
MD536b3f02b659eb0ad5fddf054af96b525
SHA117eab1988b6601611ae0683bb8b26ec04c377cb9
SHA256a1822df7617c493bc4dca454e06a5f93d3dac7b6133b5a8dca37866d3cd3c1c6
SHA512e20e9add4525449be31da571226255cb3cb06bf1f2efe84591e77972283407c783321b676f2e3bc78dd85dcfb0f20db77a40bcd179599cdd0f453534acf9dbaf
-
Filesize
9B
MD52c012c1af0648018cb6d8f5d91a5a1df
SHA1a55ab94d1fdb3374bee98660f16093ebca4e9258
SHA25650313ae96f06443d8a81be791ed17d2060cbbe0b3ab5675290bf34eabbbdce3a
SHA5121db76dae120f6de58372c7aec1c84b213242e991bdd92fb1a327b32bb91af55bab93719d55d49ae3712bf0b42998d561960ffe086bb3e42e806acc248ce1664e