Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe
Resource
win10v2004-20230915-en
General
-
Target
67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe
-
Size
2.2MB
-
MD5
2eecb82127b8616ae0daa0fe790a5c33
-
SHA1
052dff3e2d6a1570ee3d87cce27f565ca1d2f2fb
-
SHA256
67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428
-
SHA512
90173c0580d6df225fddbd5c4fcff720322d5ffb5f5168675ed9aba66f0a5dbc4e95fb2992b2145d3381022ff90da2c00c620e8126fcb4bda3087cdad5357000
-
SSDEEP
49152:M7Oo/h+moA0LVE2VU5zbJ49DzdIc/YYRCBTcJC:XO1NJYDTYYHJC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3372 Logo1_.exe 1240 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Multimedia Platform\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ro-RO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\nb-NO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\116.0.1938.76\EBWebView\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-high\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\animations\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ha-Latn-NG\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\te-IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe File created C:\Windows\Logo1_.exe 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe 3372 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2356 4776 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe 83 PID 4776 wrote to memory of 2356 4776 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe 83 PID 4776 wrote to memory of 2356 4776 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe 83 PID 4776 wrote to memory of 3372 4776 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe 84 PID 4776 wrote to memory of 3372 4776 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe 84 PID 4776 wrote to memory of 3372 4776 67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe 84 PID 3372 wrote to memory of 4248 3372 Logo1_.exe 86 PID 3372 wrote to memory of 4248 3372 Logo1_.exe 86 PID 3372 wrote to memory of 4248 3372 Logo1_.exe 86 PID 4248 wrote to memory of 1820 4248 net.exe 88 PID 4248 wrote to memory of 1820 4248 net.exe 88 PID 4248 wrote to memory of 1820 4248 net.exe 88 PID 2356 wrote to memory of 1240 2356 cmd.exe 89 PID 2356 wrote to memory of 1240 2356 cmd.exe 89 PID 3372 wrote to memory of 2500 3372 Logo1_.exe 46 PID 3372 wrote to memory of 2500 3372 Logo1_.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe"C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE35B.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe"C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe"4⤵
- Executes dropped EXE
PID:1240
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD50552771f528638131f55a9e6490f3326
SHA11b901e2f055ea532434011108711c630bd2810b0
SHA2567f3d847976f1ece3c062dd97d4d027f427aaf8a96169098eaf2dab2854107730
SHA51220a90b4778da24b1706bafb626ad032440197a3403b46ce8c1a2b115d662efb9ea91da2f14dc8e3b29475730cea703ac35bd49e545415410935b80653b9331a6
-
Filesize
484KB
MD5d6ef5a13e561dd400cab71c780ee2f47
SHA14c11e8de79732a6313da0f7783659734995d2793
SHA25618d9a8c03b1360c768cb5b7a2072bb31608c4049079ee292a466bf91ff236e8c
SHA5120bb2941c9df7209a89dab34174ff6e5609ffebcb3479c11d686b3ba3abad20ddf13cb9462a722ddd3c11eb6b84785ffa56fc504a7127db9c89439775697719dc
-
Filesize
722B
MD5529d45ae7322da3366237aff0c684780
SHA146eb7b4840b0d62c66436bd13cdd914431ff9dbe
SHA2561fad96a914a19a58dc76f2cf421e3f62871b92f84f393d24206985980e4d2b13
SHA512b0ad4445c58ee5ac5430383bcc26ef4ee78a4148660fe2d4076ba93216c7143bd6c8bdd548ecc679e91d471abf844fb59b748996fdb72b4858d5e6e303265fde
-
C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe
Filesize2.1MB
MD5af3363329baffc22d26621413dd3b27e
SHA13186306c73d0f15db59d12c1d65265763d1ab7ac
SHA2568ed8d9304aa5778b4eeddbd64981d14db5d87e78481c2584e1d521cbeed078f8
SHA5126bedd460e20b6720b30fa63fdaed5ec041eebfdcd34901c9a52068a3acf1c8de2b03563b47e49a2eb944c29d54d6fc662f402aeb52c1fd9054234e0e35ed2aad
-
C:\Users\Admin\AppData\Local\Temp\67166c6180f6624be7f5a42fffca88d2a721dba167b10264610aae71499b3428.exe.exe
Filesize2.1MB
MD5af3363329baffc22d26621413dd3b27e
SHA13186306c73d0f15db59d12c1d65265763d1ab7ac
SHA2568ed8d9304aa5778b4eeddbd64981d14db5d87e78481c2584e1d521cbeed078f8
SHA5126bedd460e20b6720b30fa63fdaed5ec041eebfdcd34901c9a52068a3acf1c8de2b03563b47e49a2eb944c29d54d6fc662f402aeb52c1fd9054234e0e35ed2aad
-
Filesize
26KB
MD5fa7187d52031d8ed051bd81b2ec67b99
SHA17a5f07ec0f06d37b3c98ba31b515b61edc7a8e85
SHA2560490247e51fceaf8c554e75c84a43cb4f6efc9655b5a8a87591c5609a1d6ac49
SHA512dfb27bdb65be8d9c8071144205948d91d8dcb9d2f9dbee4f6e9387e8355c9c78ce835f63b96932cdfdc66038a95dff1f9e719d80522d783400b7f7fd19af5009
-
Filesize
26KB
MD5fa7187d52031d8ed051bd81b2ec67b99
SHA17a5f07ec0f06d37b3c98ba31b515b61edc7a8e85
SHA2560490247e51fceaf8c554e75c84a43cb4f6efc9655b5a8a87591c5609a1d6ac49
SHA512dfb27bdb65be8d9c8071144205948d91d8dcb9d2f9dbee4f6e9387e8355c9c78ce835f63b96932cdfdc66038a95dff1f9e719d80522d783400b7f7fd19af5009
-
Filesize
26KB
MD5fa7187d52031d8ed051bd81b2ec67b99
SHA17a5f07ec0f06d37b3c98ba31b515b61edc7a8e85
SHA2560490247e51fceaf8c554e75c84a43cb4f6efc9655b5a8a87591c5609a1d6ac49
SHA512dfb27bdb65be8d9c8071144205948d91d8dcb9d2f9dbee4f6e9387e8355c9c78ce835f63b96932cdfdc66038a95dff1f9e719d80522d783400b7f7fd19af5009
-
Filesize
10B
MD564a8745f77935c35c66f3aeeddf5d47d
SHA11214a584f661cb008b494ce6278289f8cf406810
SHA2567841de37b0bf8c995d0b903bef18bd4159f94d9c2a35c91b06dabe8198c6c63a
SHA512807b8f5512f868d0a2b1a10889164f787aa07b4309511326f4755d1121e666ec30dfb444a0565a5a7426cbd45b41d49d6429c9baf63a0bd3948b85b57841af3b