Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2023, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe
Resource
win10v2004-20231020-en
General
-
Target
59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe
-
Size
147KB
-
MD5
8e846769386624adffd297deec221d6c
-
SHA1
21fb762f49f2dce7fc7a183be4133f046204fe62
-
SHA256
59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c
-
SHA512
9cba669009a56e80bdd27c0af46d4a9cc1a0c78f3030d9169358a5ed364947b98a1fd93ced8883c0b94570a77dda61a85797e8021075e73265fefa3e7ef53d62
-
SSDEEP
3072:o1ftffepVPtytjg9wMGdRK5qr396fhrrqVen6h+tiLqL:MVfgPto61GLpDoBfnTtT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1744 Logo1_.exe 4368 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_2020.1906.55.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\winsdkfb\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fil-PH\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\te-IN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.513.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe File created C:\Windows\Logo1_.exe 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe 1744 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 224 wrote to memory of 4880 224 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe 86 PID 224 wrote to memory of 4880 224 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe 86 PID 224 wrote to memory of 4880 224 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe 86 PID 224 wrote to memory of 1744 224 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe 87 PID 224 wrote to memory of 1744 224 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe 87 PID 224 wrote to memory of 1744 224 59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe 87 PID 1744 wrote to memory of 4124 1744 Logo1_.exe 88 PID 1744 wrote to memory of 4124 1744 Logo1_.exe 88 PID 1744 wrote to memory of 4124 1744 Logo1_.exe 88 PID 4124 wrote to memory of 816 4124 net.exe 91 PID 4124 wrote to memory of 816 4124 net.exe 91 PID 4124 wrote to memory of 816 4124 net.exe 91 PID 4880 wrote to memory of 4368 4880 cmd.exe 92 PID 4880 wrote to memory of 4368 4880 cmd.exe 92 PID 1744 wrote to memory of 3160 1744 Logo1_.exe 49 PID 1744 wrote to memory of 3160 1744 Logo1_.exe 49
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe"C:\Users\Admin\AppData\Local\Temp\59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBC0C.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe"C:\Users\Admin\AppData\Local\Temp\59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe"4⤵
- Executes dropped EXE
PID:4368
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:816
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58ce669e0c5c16e39c632994123c0b7ab
SHA15edcc020a13794046f13bfe895d38fc14851a913
SHA2564dd26f92c626b4b76622575336966f31d944aee9a848de1599072656a176a3ae
SHA512b28a4bca6c759c4fdec69753e7113781d3f025e4b1697ab6a2e1705f40921b35ffe42fd2f858f809c0159789d0884fa416732ced303e5249e617d927f8b8df0d
-
Filesize
484KB
MD5ad556822dc7cd11021557553f3765ec1
SHA1dd2bfa0b91ad1e49c090e7f37e7b8df9bdc4e114
SHA256f008df2126814eb1add60d87a480bef5b383a3b885831e7b0ee5692867d3b140
SHA512a1c0679d1b21fac0e95a6496f2e856a7c61c9750f3cd47c59887c0e78fda38c4492a78882069296c1d3d3ef9e9ca05cd9ac9c5420b6d90db29d224eadf411d22
-
Filesize
722B
MD59ae02adb66c733e89884ddda4aafde21
SHA1498cdc719c1b72b76845ac9a01d378dd09a8c7fc
SHA2569d9ff24d5d75072898cc9ca822484b6c353855ba937c8b7824fc6a54d87e4b96
SHA51222826189c64b12fb529bf09b0bec789df9fef77d45b2e21ef792f6df5b31a72536afaae7e4fab23865f992e904e987bf685f4e914735e7d58e7b540fd53096c1
-
C:\Users\Admin\AppData\Local\Temp\59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe
Filesize120KB
MD598abe07ef09304a4aa541fec3d5b49b3
SHA150d3dab2d9a03aafb147be730fc46e19acfc2be7
SHA256014d4631972b53353ea2de898abda4d2ef8a7d78184ae9a4da111463138284f7
SHA5120dec2050eefe22f840a06408a366b63f5b3f22d5d3bdfe503ab41bd626f913525707cf7f1982ba7fc1e38107f352196572c0b918fa339cf8846ccf94c6a332fb
-
C:\Users\Admin\AppData\Local\Temp\59f60abf1d2b3bb4203b5062dd5a8d6fe2999685008ffbf1e2b423c5e626a93c.exe.exe
Filesize120KB
MD598abe07ef09304a4aa541fec3d5b49b3
SHA150d3dab2d9a03aafb147be730fc46e19acfc2be7
SHA256014d4631972b53353ea2de898abda4d2ef8a7d78184ae9a4da111463138284f7
SHA5120dec2050eefe22f840a06408a366b63f5b3f22d5d3bdfe503ab41bd626f913525707cf7f1982ba7fc1e38107f352196572c0b918fa339cf8846ccf94c6a332fb
-
Filesize
26KB
MD5fb302bb3e9a63790b545fbae9cf76e95
SHA136a3ff29e20e8c6a98e0ed0b62facf588e0de5c1
SHA256e431f29fd728f254e78f03cb50ddea4203ab6863abe479d5cd89127a2a2ef391
SHA5123c7b9db7a7030479e800f51971a223773c249758f4e38cff51214034b207cdcf427005476b3177662060e1d049d23d67627baa0548c16cc4db4236d4126d79b4
-
Filesize
26KB
MD5fb302bb3e9a63790b545fbae9cf76e95
SHA136a3ff29e20e8c6a98e0ed0b62facf588e0de5c1
SHA256e431f29fd728f254e78f03cb50ddea4203ab6863abe479d5cd89127a2a2ef391
SHA5123c7b9db7a7030479e800f51971a223773c249758f4e38cff51214034b207cdcf427005476b3177662060e1d049d23d67627baa0548c16cc4db4236d4126d79b4
-
Filesize
26KB
MD5fb302bb3e9a63790b545fbae9cf76e95
SHA136a3ff29e20e8c6a98e0ed0b62facf588e0de5c1
SHA256e431f29fd728f254e78f03cb50ddea4203ab6863abe479d5cd89127a2a2ef391
SHA5123c7b9db7a7030479e800f51971a223773c249758f4e38cff51214034b207cdcf427005476b3177662060e1d049d23d67627baa0548c16cc4db4236d4126d79b4
-
Filesize
10B
MD517de2acd7b02442c9cb0e8c0fccf8e96
SHA1e062bd3af8ffe48988392987af8cbbddddffb804
SHA256af7f402fe1458d28f48714376dd0e26175e667690e61b41c8bd0e61d818822d3
SHA512e04d6d828edc3ef3443dfd40f72f76351bf981a16566cf0f31e60015f588440764461b52be088f549e8a2a6fa41370129e60d36b63b66f9a63c6df89f44fdbd8