Analysis
-
max time kernel
151s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe
Resource
win10v2004-20231020-en
General
-
Target
14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe
-
Size
203KB
-
MD5
85ce23a719b1df2b5157077120bff3e5
-
SHA1
ec9c49ea391d35fe87c8579dfd85763aacc062db
-
SHA256
14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638
-
SHA512
694edfaea36896e575799513ea0ffc61ffd7a16b044e738feede1944900a142826d15c67962cbc891092e5cfb26ea913821da7fd9226014763abb99dd730ca11
-
SSDEEP
6144:DVfjmNh/zUPNXJnz1hfjnKgTAhduXIGpsZxkTE:Z7+h/MXJnz1hfjnKg0uXIGwkTE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4520 Logo1_.exe 1608 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Velocity\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\x64\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe File created C:\Windows\Logo1_.exe 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe 4520 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3952 wrote to memory of 3776 3952 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe 84 PID 3952 wrote to memory of 3776 3952 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe 84 PID 3952 wrote to memory of 3776 3952 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe 84 PID 3952 wrote to memory of 4520 3952 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe 85 PID 3952 wrote to memory of 4520 3952 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe 85 PID 3952 wrote to memory of 4520 3952 14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe 85 PID 4520 wrote to memory of 1288 4520 Logo1_.exe 87 PID 4520 wrote to memory of 1288 4520 Logo1_.exe 87 PID 4520 wrote to memory of 1288 4520 Logo1_.exe 87 PID 1288 wrote to memory of 4392 1288 net.exe 89 PID 1288 wrote to memory of 4392 1288 net.exe 89 PID 1288 wrote to memory of 4392 1288 net.exe 89 PID 3776 wrote to memory of 1608 3776 cmd.exe 90 PID 3776 wrote to memory of 1608 3776 cmd.exe 90 PID 3776 wrote to memory of 1608 3776 cmd.exe 90 PID 4520 wrote to memory of 3296 4520 Logo1_.exe 38 PID 4520 wrote to memory of 3296 4520 Logo1_.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe"C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB892.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe"C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe"4⤵
- Executes dropped EXE
PID:1608
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4392
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a4be970114fde7b4347a171ef559737b
SHA19ff5a5c55eca69d00aa5cf88a86831f2954ee214
SHA25654f93dd3fd4b973502236e7372591290aef4913ed31ab38fa17c4b0e52b86e21
SHA512e4fb957ac171ac1bbca431fbfbb8c9142b5493e3b875db7f61182c91adce87d29b410c766d5043b8bee276f9024b7b14ee636106a037db8f35d545b20ec635ce
-
Filesize
484KB
MD5819687f1cf2bf54b4cbd2f2d7d103c22
SHA15ce3e2c3ef8ad6be6281c1a260e08b9e6916fdb7
SHA256d098c31153c841455a20653fa4bde12eaa778548af01fc5bc8da622440d8fc03
SHA512cbfef2fb90fc9f8cc4146edddac2688506ed04a1eed08e55950ac74c4714f6145964020cad7b572ab8f05f015e8857ca825e4a1a7bda2e7e247376d223986d22
-
Filesize
722B
MD5223a309a724a24775fd56383594a6800
SHA15cd493a33dd4fabbf236afaf6e168fadce3a2d05
SHA256b10d38515307abbaa8c04b5350555f41c1da45d97efc3067e24872249e6f2917
SHA512517fd0eadf06f909bf0db5a822159effb580f660f87d9f05282781e69d85071c5f0d1e7d36a5a83b1315c406d932e1d62063b890132d22c3bb2f1b127d464ee2
-
C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe
Filesize176KB
MD51f78791f2b1d155c95f40d381ae7cd4d
SHA1fb44f4f698be81aa921e396ef46c6cdf0bae2276
SHA256b4c7dc2ed03d718d00f7f23d691331a14e58ef5d79da5bea67c770aee4205a3a
SHA5121846c4a3d9471ee13db6530d1726ba9789bd11d1447f9413aabdebc8ff33a0fcdbabaf20f32c28916277b523b38d7c78cc645f8304bb3ba894f94847383e479d
-
C:\Users\Admin\AppData\Local\Temp\14177ba8df65893a3580a4817c20d143c0ef443f065a4e1639bd173f4b577638.exe.exe
Filesize176KB
MD51f78791f2b1d155c95f40d381ae7cd4d
SHA1fb44f4f698be81aa921e396ef46c6cdf0bae2276
SHA256b4c7dc2ed03d718d00f7f23d691331a14e58ef5d79da5bea67c770aee4205a3a
SHA5121846c4a3d9471ee13db6530d1726ba9789bd11d1447f9413aabdebc8ff33a0fcdbabaf20f32c28916277b523b38d7c78cc645f8304bb3ba894f94847383e479d
-
Filesize
26KB
MD586f9430d4925c4f45151eea124081d83
SHA152df34b47184ed2700bbd92b68874c73592b6d1d
SHA25641b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350
SHA512910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8
-
Filesize
26KB
MD586f9430d4925c4f45151eea124081d83
SHA152df34b47184ed2700bbd92b68874c73592b6d1d
SHA25641b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350
SHA512910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8
-
Filesize
26KB
MD586f9430d4925c4f45151eea124081d83
SHA152df34b47184ed2700bbd92b68874c73592b6d1d
SHA25641b9e2bf3ce43d681d6dde91ffff8a23adcc4da2076516de2bf2631708b74350
SHA512910bce524874bbe43de4e9309b1e7aa6a547a6592e3cdcff1f992c156142dc4bf493d23218f635bb6f6366bc1616d96d6ca885d651c0b4be87ab845901f4e3e8
-
Filesize
10B
MD5d3c36a72fc1c8bd61b57107d5d012a29
SHA12a13da90a3c63c88dd43ae9c670876f0dd0fc03e
SHA256a2f94b462f3497d26399b1f5eda449b87e3ded10e09de07369f6a984eff5383d
SHA5124c08a9bdba23ece3ba391c1cd3696b046892c028f94e04e955fbee3a13dc181f1073c8f6e686529dd613bd468297d6b21a7de318ae61b88a2d642f3215c20232