Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe
Resource
win10v2004-20230915-en
General
-
Target
f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe
-
Size
239KB
-
MD5
e901a439877039b187d424356f5b7167
-
SHA1
4ff344a889fae1b21208ab1cb4472f7f94edf831
-
SHA256
f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138
-
SHA512
1e74c2c3c2d52ec301d2b930223710fcd32256677e3957d27a39e8eaeccf852f3a6f5163bc94bf4dbdff9256ffba6ffe34436b19c361f297b98cce9ee772ff08
-
SSDEEP
3072:aftffjmNXqcVz5fzsTl4dsOc6v2vTzwU+Pho86meq+FaSoB2+vSHrX:aVfjmN6cT93PiY+Fa7BdvGX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4244 Logo1_.exe 2468 f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\af-ZA\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sv-SE\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Toolkit\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\StartScreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MLModels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Calculator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe File created C:\Windows\Logo1_.exe f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe 4244 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 368 wrote to memory of 956 368 f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe 85 PID 368 wrote to memory of 956 368 f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe 85 PID 368 wrote to memory of 956 368 f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe 85 PID 368 wrote to memory of 4244 368 f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe 86 PID 368 wrote to memory of 4244 368 f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe 86 PID 368 wrote to memory of 4244 368 f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe 86 PID 4244 wrote to memory of 316 4244 Logo1_.exe 88 PID 4244 wrote to memory of 316 4244 Logo1_.exe 88 PID 4244 wrote to memory of 316 4244 Logo1_.exe 88 PID 316 wrote to memory of 4492 316 net.exe 90 PID 316 wrote to memory of 4492 316 net.exe 90 PID 316 wrote to memory of 4492 316 net.exe 90 PID 956 wrote to memory of 2468 956 cmd.exe 91 PID 956 wrote to memory of 2468 956 cmd.exe 91 PID 956 wrote to memory of 2468 956 cmd.exe 91 PID 4244 wrote to memory of 2496 4244 Logo1_.exe 44 PID 4244 wrote to memory of 2496 4244 Logo1_.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe"C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5FE3.bat3⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe"C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe"4⤵
- Executes dropped EXE
PID:2468
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58591b14f2c92328b95455ec670799642
SHA1d17c6a31a66dbd3cc53961d2f0e85fdb605af667
SHA256ce9bfeb973ae43c94157901c348098551f599a8ad1ed62dc845ad9198c029182
SHA512cf2dfde459a660000e0af861be7708218537319040b220972de5aeca886f8e520f26dcf05902e4b3875ae6bf34576a18334064f100550bb15125c3a46a97445c
-
Filesize
484KB
MD57322201ea1f1128a2d6bdea39cc37b8e
SHA1c646cd395d37fda6aa3a6a831b205b7cf39fa147
SHA256c3f63033404d2b285b0eba68635f6971debbbb9654b4444b2d0876f214a817b9
SHA512fe32ba19f98b1f8a28fc32f035778c3fc1a97b52fa1ec6aa10c9a141b82b533752ad7d3f3b9461338e15053305f686432e454b73c05b1976753e04b723733cf0
-
Filesize
722B
MD587e3fe898e4cfcf357f6d927d0f21c7c
SHA16fe6c7ecdcbdafe3625a808e420a45c7fbf0b786
SHA256dcf07a4b1f76e40e8bd7ffdc5ab07bf5f4c3aaf15c91906f9cf52fcf5e3a58bd
SHA512be6af798f939e362b0ac2eaafd856855b2bb611a87c6a8c38159d8bfefef232447ef0817f020619995ef8c6779f5474c1d138073d7dfa2843703f913b8844a6c
-
C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe
Filesize213KB
MD520d89d1781cde87db3a8b59da816efcc
SHA14f6670c4dcd8d978b21d1db91e081e609f5abcd0
SHA2564653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983
SHA5127b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e
-
C:\Users\Admin\AppData\Local\Temp\f0903f3f9a0dd815c7cd6398aae917902e89f12d31dd48f868d1db8bf4903138.exe.exe
Filesize213KB
MD520d89d1781cde87db3a8b59da816efcc
SHA14f6670c4dcd8d978b21d1db91e081e609f5abcd0
SHA2564653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983
SHA5127b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e
-
Filesize
26KB
MD5effabf58aa1a3a22c697a47eab559ac7
SHA148d54b1aa74e05414e98824a769682907b4cba8b
SHA256142c3db22634f219899ef2f0a60a7f857419dc69d896bec778bbef38c055c5c0
SHA5126bfbb7159315b1d396edf318539e152fcfbc3aa9a1f8d7737957dd3cf43bffedeee9a60b68a2b2c3cc4025316b16509b5c504eca93619e18806c57af2e5fbc39
-
Filesize
26KB
MD5effabf58aa1a3a22c697a47eab559ac7
SHA148d54b1aa74e05414e98824a769682907b4cba8b
SHA256142c3db22634f219899ef2f0a60a7f857419dc69d896bec778bbef38c055c5c0
SHA5126bfbb7159315b1d396edf318539e152fcfbc3aa9a1f8d7737957dd3cf43bffedeee9a60b68a2b2c3cc4025316b16509b5c504eca93619e18806c57af2e5fbc39
-
Filesize
26KB
MD5effabf58aa1a3a22c697a47eab559ac7
SHA148d54b1aa74e05414e98824a769682907b4cba8b
SHA256142c3db22634f219899ef2f0a60a7f857419dc69d896bec778bbef38c055c5c0
SHA5126bfbb7159315b1d396edf318539e152fcfbc3aa9a1f8d7737957dd3cf43bffedeee9a60b68a2b2c3cc4025316b16509b5c504eca93619e18806c57af2e5fbc39
-
Filesize
9B
MD523e9e04bdc208ed2faea8df16fc821d5
SHA16a685f0967e907daad0ccef02d08a369103c7341
SHA2562077bbb75045c2110e350ac69eb9a01de6bb4bd991c16ff10de73587781e445f
SHA51264a5a2d6754b0e0dee759ef283262e9a984e9d1a12e17839a107c3fa08f437512c43b5615cc3a8db3024b5bcc62f7b9fb15611d11df69e2ed427cd0d2fb15020