Analysis
-
max time kernel
171s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe
Resource
win10v2004-20230915-en
General
-
Target
02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe
-
Size
3.0MB
-
MD5
7c82501f3619bfe3de10c12f2481e140
-
SHA1
75d0eb6c246c8956651be36a0419d5553dc6665c
-
SHA256
02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9
-
SHA512
4e13dd0adde99ce7ecbdf3cf5d5af559e7325b7a72113116f2c3135935b9651adf5ca51ed9a3edfa2c37f0a03310fe9c10383741a3e43412733880246974680e
-
SSDEEP
49152:Y7Digy13TW4jFCs2pfRdO8u60N1xcdd9gVIkdqfvEAkqcPI:M3Ts21i8WN1igVIf6O
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3644 Logo1_.exe 2128 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\CoreEngine\Data\BrushProfile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ar-SA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\StartScreen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\LiveTiles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Resources\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\az-Latn-AZ\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\libs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe 3644 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3296 wrote to memory of 5040 3296 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe 85 PID 3296 wrote to memory of 5040 3296 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe 85 PID 3296 wrote to memory of 5040 3296 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe 85 PID 3296 wrote to memory of 3644 3296 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe 86 PID 3296 wrote to memory of 3644 3296 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe 86 PID 3296 wrote to memory of 3644 3296 02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe 86 PID 3644 wrote to memory of 4404 3644 Logo1_.exe 87 PID 3644 wrote to memory of 4404 3644 Logo1_.exe 87 PID 3644 wrote to memory of 4404 3644 Logo1_.exe 87 PID 4404 wrote to memory of 4428 4404 net.exe 90 PID 4404 wrote to memory of 4428 4404 net.exe 90 PID 4404 wrote to memory of 4428 4404 net.exe 90 PID 3644 wrote to memory of 3148 3644 Logo1_.exe 60 PID 3644 wrote to memory of 3148 3644 Logo1_.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe"C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE2BF.bat2⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe"C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe"3⤵
- Executes dropped EXE
PID:2128
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:4428
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD54e68211d5ca5b4384780da7163aca122
SHA1067ede6d5d2e700aede8416cbc1344b48bc7f403
SHA2563fc8a84a337c74c13ea397c9fd998726b36ccab37404f05a3460c0ee4be2d38d
SHA5129e0d960b1bba53fef5641d5b26ac1798547882cf3d556d58a14bdaf30c00dd5e88b569a7ea362f9f60c92b001aa3267e1968854f45f0897f4b27fdacf16f14de
-
Filesize
722B
MD5353270f7ec3a8e1206fc71eefe733bb7
SHA1912c36a00c5d5a3d1935acb40de7107042ef6efd
SHA2567fcab9dff247067d95157acb8db0f846dab6ecea5289930580dd6ca78b95912a
SHA5126ddc6c7936753be953f43ed2f90c3eea7c78bc7b35789638dfaa66bd6cce680f94f60fe3557e9f31b857a0f71d5d024595027637544adf6744e5847809f58d7a
-
C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe
Filesize3.0MB
MD504e531df8ac0a7696570554ad87199da
SHA1d6cf2a47536e08f1a27ed128a2d8f5288ec97e05
SHA256f7aaad011fc7ed4d33e662641066e4808b42771b1228c352f3d68afa7fd0af44
SHA51279e19742b537fff213b17b350b3b61c76a9ac8533707bed45224b6a72c02f9eebe351c4c8537cca1451060d8703ea2fe95da1b1a4c34fdb96b141b88237ce5b9
-
C:\Users\Admin\AppData\Local\Temp\02c91f77c4c7d2e4bdba6e8d92dd093725d823ce0f1248c06708831e0d57ebd9.exe.exe
Filesize3.0MB
MD504e531df8ac0a7696570554ad87199da
SHA1d6cf2a47536e08f1a27ed128a2d8f5288ec97e05
SHA256f7aaad011fc7ed4d33e662641066e4808b42771b1228c352f3d68afa7fd0af44
SHA51279e19742b537fff213b17b350b3b61c76a9ac8533707bed45224b6a72c02f9eebe351c4c8537cca1451060d8703ea2fe95da1b1a4c34fdb96b141b88237ce5b9
-
Filesize
26KB
MD528948521636f027a6e321d0ece85f68b
SHA14cc393871c2174328558347094d44cef430836d9
SHA25637d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197
SHA5122952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b
-
Filesize
26KB
MD528948521636f027a6e321d0ece85f68b
SHA14cc393871c2174328558347094d44cef430836d9
SHA25637d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197
SHA5122952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b
-
Filesize
26KB
MD528948521636f027a6e321d0ece85f68b
SHA14cc393871c2174328558347094d44cef430836d9
SHA25637d128b4b8f41d2ed52a38ef4b628fa082d4693729b1af11d4067a1781a1a197
SHA5122952a8aca9924a6c5a1dbdb94f79a9da49696e88c06f50ca1ce3390efb2b9bb86c8fd1184a160e810485c8f7ff11bc0d58c22787877ae5a46c66d1a6a8173c3b
-
Filesize
10B
MD581570c50286369016cef7a9f904c4b04
SHA1b5758b23667cb35cad0adb23371b830fcee4f4e5
SHA256b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1
SHA5120e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162