Analysis
-
max time kernel
162s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2023 09:11
Static task
static1
Behavioral task
behavioral1
Sample
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Resource
win10v2004-20231020-en
General
-
Target
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
-
Size
86KB
-
MD5
71d0fbddb88e9f834205a05bf4f70265
-
SHA1
8abd11cc2735a90c6c411d9b411cf6c9bb8c3b76
-
SHA256
6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026
-
SHA512
f76bd916734684c17461aa4bfb61d485e7002de0b210ad5663c1b6dbd2876ffaa2bbcec0ab543dd9e59716e5d15c61af60de9cca08705975bd7e14b939662081
-
SSDEEP
1536:DfgLdQAQfcfymNANrCllSKgUWbCD4psuLP8xTYjPkepWJZCm:DftffjmNJvgqUpsuLP8xTYjPkepWJMm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1804 Logo1_.exe 1776 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\eu-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\vi-VN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe File created C:\Windows\Logo1_.exe 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe 1804 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4408 1484 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 82 PID 1484 wrote to memory of 4408 1484 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 82 PID 1484 wrote to memory of 4408 1484 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 82 PID 1484 wrote to memory of 1804 1484 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 83 PID 1484 wrote to memory of 1804 1484 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 83 PID 1484 wrote to memory of 1804 1484 6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe 83 PID 1804 wrote to memory of 3120 1804 Logo1_.exe 84 PID 1804 wrote to memory of 3120 1804 Logo1_.exe 84 PID 1804 wrote to memory of 3120 1804 Logo1_.exe 84 PID 3120 wrote to memory of 4480 3120 net.exe 86 PID 3120 wrote to memory of 4480 3120 net.exe 86 PID 3120 wrote to memory of 4480 3120 net.exe 86 PID 4408 wrote to memory of 1776 4408 cmd.exe 88 PID 4408 wrote to memory of 1776 4408 cmd.exe 88 PID 4408 wrote to memory of 1776 4408 cmd.exe 88 PID 1804 wrote to memory of 3240 1804 Logo1_.exe 31 PID 1804 wrote to memory of 3240 1804 Logo1_.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD30F.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe"4⤵
- Executes dropped EXE
PID:1776
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4480
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a03df97f734993bcc08b38862bf169f0
SHA1e945faf4bf80062bb45dabe17d07ffd20a750709
SHA2567943c4ce6eb9285b4f08653e63fe8302e39637ac7618ef5dd8ea61d95768c681
SHA51229666fe4ba713b83efe66ebc57bf95bf4af0e14ea50ad44cb35642fbb8b903ad7dca2f04c5c56accf278bb8b49bd743a6f31b1565a8e215c8b013ef0d3c20d42
-
Filesize
484KB
MD5999c73abd53f9ce3289c15116bccf46a
SHA185a1779dfb956bc41ce39208d18bda9c4d960069
SHA25613a46acb6c8e8b3bf85f9f91c17891eca9aca34aff44da178c178c2e9a42534a
SHA512bb5eb382072935e71f90f1fe2ebf55820b16104ef584d4f564a82528680b27bc72fc5f425c88a9359a2d6b48739269be4f981a09fe7d3420ad88129f05683899
-
Filesize
722B
MD58394ef34c06c666646eba82680e26f4c
SHA17adeac650280157d90d5c29b2ffb1325f023010c
SHA2562641fd57f5f0e01653e02089a823ddb3cbfa128273c0cb1e46740ca812d9f93f
SHA51273e736b019e53b0fecaca4dd5509649f26726b8d1a57b57cb395730e2a6fe4f4670dbe79448b57bc3b575e6490b9e8055fd24528a99d4eba36c75a5c4c15cc13
-
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe
Filesize60KB
MD589f0b7aa76594a5d30d04c24af5c5968
SHA15848d196944085ee1a8f24e6e3c699b19c4de474
SHA25612c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4
SHA512e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e
-
C:\Users\Admin\AppData\Local\Temp\6d4ecb3cd54b7ba1dc0988cc4077d2d87961e9e6f788da82c6d3c4f6b8822026.exe.exe
Filesize60KB
MD589f0b7aa76594a5d30d04c24af5c5968
SHA15848d196944085ee1a8f24e6e3c699b19c4de474
SHA25612c6fe8f5c28563f33485eaa750b27763ec2cfcc5ef55ddb56d755782fd676f4
SHA512e05fcad7a8f8c7740d30b41e075cefea9ceca5dd63127311b629636ae8505e680dbfd1a3e93d56d7526bbe73808b257c2522ea16c6111119fc59dc7523dd3a6e
-
Filesize
26KB
MD59f8d43de4a935d654d72d0fe7fb50aaa
SHA1e9ff31454ac3bfc9a310529f62aee1468d56bcc5
SHA256d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288
SHA5127506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f
-
Filesize
26KB
MD59f8d43de4a935d654d72d0fe7fb50aaa
SHA1e9ff31454ac3bfc9a310529f62aee1468d56bcc5
SHA256d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288
SHA5127506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f
-
Filesize
26KB
MD59f8d43de4a935d654d72d0fe7fb50aaa
SHA1e9ff31454ac3bfc9a310529f62aee1468d56bcc5
SHA256d177f5faa57a0d2c3f19478ce8b7738a8186120f134026d334936323b54ea288
SHA5127506bf4f203e158201ecdfb92ac38dab4338232f009798fd86b36c7ea911ca06413947aadfb9e6774501ba8608af8869842fd3e7a7e8fce192b2985d9670158f
-
Filesize
10B
MD5d3c36a72fc1c8bd61b57107d5d012a29
SHA12a13da90a3c63c88dd43ae9c670876f0dd0fc03e
SHA256a2f94b462f3497d26399b1f5eda449b87e3ded10e09de07369f6a984eff5383d
SHA5124c08a9bdba23ece3ba391c1cd3696b046892c028f94e04e955fbee3a13dc181f1073c8f6e686529dd613bd468297d6b21a7de318ae61b88a2d642f3215c20232