Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Resource
win10v2004-20231020-en
General
-
Target
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
-
Size
207KB
-
MD5
0816c5fcff41e9523e003e400ad116f8
-
SHA1
d8f38f6d6e1ed8ac2838a59d4367605154033ee1
-
SHA256
f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75
-
SHA512
7f093e9a7e850861320e28d8b7a906e14cec80175eda567fc066129f6e10d960980693011bb4e8b68e0285c661be4b6689317633b88fe1b88784fc59163bdd9c
-
SSDEEP
6144:8VfjmNAni3F8QrBAmWt9h8QlLISZWVRohcq7d:+7+Gi35rBRy9hdFIdRoGU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4712 Logo1_.exe 3452 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-MX\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ko-KR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-PT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\he-IL\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\th-TH\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_2019.125.2243.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hi-IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\x86\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe File created C:\Windows\Logo1_.exe f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe 4712 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3888 wrote to memory of 220 3888 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 86 PID 3888 wrote to memory of 220 3888 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 86 PID 3888 wrote to memory of 220 3888 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 86 PID 3888 wrote to memory of 4712 3888 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 87 PID 3888 wrote to memory of 4712 3888 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 87 PID 3888 wrote to memory of 4712 3888 f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe 87 PID 4712 wrote to memory of 536 4712 Logo1_.exe 89 PID 4712 wrote to memory of 536 4712 Logo1_.exe 89 PID 4712 wrote to memory of 536 4712 Logo1_.exe 89 PID 536 wrote to memory of 1996 536 net.exe 91 PID 536 wrote to memory of 1996 536 net.exe 91 PID 536 wrote to memory of 1996 536 net.exe 91 PID 220 wrote to memory of 3452 220 cmd.exe 94 PID 220 wrote to memory of 3452 220 cmd.exe 94 PID 4712 wrote to memory of 3264 4712 Logo1_.exe 38 PID 4712 wrote to memory of 3264 4712 Logo1_.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8482.bat3⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe"4⤵
- Executes dropped EXE
PID:3452
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1996
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD519f338940fb0d223a19e76271653621f
SHA16ec7c0ead9051e02de5d30e85c042959da25447f
SHA256967e34e22c679e09c56114a5107732bbb33576683c66615a2040e59402181c68
SHA5125afcbf04d14ecbef4fcb8e505c69fe3447ebdf7de4005ce1f3fb0572201fe539d5aa001673c7d49fbc578c77bb57e3da592f06d62c25f75b63bf80f3aa22849a
-
Filesize
722B
MD5c6d5ae12889e152e4573b3a149a2b132
SHA183217b19e19f20bb38e771bb068819e052447ad9
SHA25614dbcaf0bca30bd0465738b536aeb21c1727b88a38ab6028fa993f792a46368b
SHA5120d56c225f9aca6a728501d846ec0cdd7b706768fb44114ae98372fe6d02dc2e1150a91cb1c08f23879e9466ce13fb703da67d8360894d688e164663d8b83deeb
-
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe
Filesize181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
C:\Users\Admin\AppData\Local\Temp\f985290d2472a63583fe3782196cf72d10b57e4cc19d253b664fb903c4f6ba75.exe.exe
Filesize181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
10B
MD503d3ebeca3d19630e02fda3c0e9d35b3
SHA156283b1f54235b653d0224cca2e3bbf10a0f7ae1
SHA256865a0d9b66a168264e3a3b734eb9b719a4e207988cb0880ed54c5d69e9af8163
SHA512e6c9eb80b92a7840e6f2cb04e34403ac8abd3a3439f4998d9e11b26c2989b0dda11131a772fa7c54d9882f95d167d4b33e5e87035e9654033b75fff13efd7f3b