Analysis
-
max time kernel
145s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 07:19
Static task
static1
Behavioral task
behavioral1
Sample
5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe
Resource
win10v2004-20230915-en
General
-
Target
5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe
-
Size
122KB
-
MD5
37d6524eb4963e9e3599a7b7c987d265
-
SHA1
56e9e18af67a456d0e37b5ca285062c28ccba3be
-
SHA256
5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750
-
SHA512
89ce74ab2abf831a81971bd84ac99b671c0d3714305cd851cf1e44c23bbb1ddd5fcba6a86b19a3ccd4c4280d292eb9a54c6306acc4a6d02ab32204ffdbf64fda
-
SSDEEP
3072:BftffjmN9oFHzg2I0PpPNX6RLXWertCQyyNU:JVfjmNeZzhPpPNq6QyH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 784 Logo1_.exe 2688 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ar-SA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\libs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_2020.1906.55.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-BR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x86__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fi-fi\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe File created C:\Windows\Logo1_.exe 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe 784 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1136 wrote to memory of 1120 1136 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe 86 PID 1136 wrote to memory of 1120 1136 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe 86 PID 1136 wrote to memory of 1120 1136 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe 86 PID 1136 wrote to memory of 784 1136 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe 87 PID 1136 wrote to memory of 784 1136 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe 87 PID 1136 wrote to memory of 784 1136 5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe 87 PID 784 wrote to memory of 4880 784 Logo1_.exe 88 PID 784 wrote to memory of 4880 784 Logo1_.exe 88 PID 784 wrote to memory of 4880 784 Logo1_.exe 88 PID 4880 wrote to memory of 624 4880 net.exe 90 PID 4880 wrote to memory of 624 4880 net.exe 90 PID 4880 wrote to memory of 624 4880 net.exe 90 PID 1120 wrote to memory of 2688 1120 cmd.exe 92 PID 1120 wrote to memory of 2688 1120 cmd.exe 92 PID 784 wrote to memory of 3236 784 Logo1_.exe 24 PID 784 wrote to memory of 3236 784 Logo1_.exe 24
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe"C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8220.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe"C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe"4⤵
- Executes dropped EXE
PID:2688
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:624
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5dd7289d41bdd1d4e797fb59ec03c9ced
SHA1d42c057bcd13b424abe11adfef721a10d2609288
SHA25629bc1fa38ad291825d1e2d43db6bca71124243251b52df5b31922ff0f377684e
SHA512bb2585c9bf1a9e8ab0f393b6e2e24eeea430c4a610ff5912b22b6ac860ba97b05dba5179159343a935bdecccaf1cdc3de03e437f86a0ea988d6e73ce4f832c14
-
Filesize
722B
MD5bfa6fe76ccbff182cbda6ac820149580
SHA1d03e0d2aca0e02cc361acde43f982ffa8b189bf6
SHA256c0339fe00e7202972e8f536d53809cece8870caf18fff1bf2a20c7e3fa962c15
SHA51209b325ad8dcb9e7ce9c7d6631f05b0df0bd4b3dea105b13ec15d9f669dd8cd500b8854314bcccce7cd538ae59a903b42a00db934246f79df1e28e271b5d6ca28
-
C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe
Filesize96KB
MD54f777a9f156035ab4670da6cdcbd651c
SHA178b6f97056e6d5674bbcb94f13c4bf5527319c02
SHA25677a8efbcc5e81e9534ad80aa2836105491f015d8a7355d0ba960f8fe5df3d0c8
SHA512244dae23bcabfe4f7bcd10af02f24f88840fd91defd989cd39ad8a7ea4cb2829f9101e966a8d8ff95099269461afef587c7f8008437d8c23a91fee08acd33437
-
C:\Users\Admin\AppData\Local\Temp\5ce4903edc588fd1fab610d5b5479ea6a969c92c8b071279d28918a275a11750.exe.exe
Filesize96KB
MD54f777a9f156035ab4670da6cdcbd651c
SHA178b6f97056e6d5674bbcb94f13c4bf5527319c02
SHA25677a8efbcc5e81e9534ad80aa2836105491f015d8a7355d0ba960f8fe5df3d0c8
SHA512244dae23bcabfe4f7bcd10af02f24f88840fd91defd989cd39ad8a7ea4cb2829f9101e966a8d8ff95099269461afef587c7f8008437d8c23a91fee08acd33437
-
Filesize
26KB
MD52001b3d40d05330d0c289354fd39c442
SHA131c0c109110e336da3bdfee62d6986e50be0affd
SHA256ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815
SHA51292847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69
-
Filesize
26KB
MD52001b3d40d05330d0c289354fd39c442
SHA131c0c109110e336da3bdfee62d6986e50be0affd
SHA256ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815
SHA51292847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69
-
Filesize
26KB
MD52001b3d40d05330d0c289354fd39c442
SHA131c0c109110e336da3bdfee62d6986e50be0affd
SHA256ba1346ea33d2c9d045b75592ce50046974aaf474b530fd4c4d16dbf16cbaf815
SHA51292847dfb9be7c658b61063cedaf0f7faa51fc8afe4dae11ab4bdfdeb4ad1f8a976f20901d2d8532a60df5ad528dbd907064889412d14370dd17f5e73289cde69
-
Filesize
9B
MD5872506f1dadcc0cedd1e9dee11f54da4
SHA1d1e87145ed1d918f10ae4e93ccdbb994bc906ed5
SHA256a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104
SHA5126cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c