Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 09:39
Static task
static1
Behavioral task
behavioral1
Sample
f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe
Resource
win10v2004-20231023-en
General
-
Target
f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe
-
Size
2.9MB
-
MD5
439eec719b9a57cbef45355cd061e861
-
SHA1
fba81da3aeb8e17ee89b23bf95a6df2587dac08b
-
SHA256
f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05
-
SHA512
dbf6ace6ba1fe374f06fae6c70d4c83a4a97db92d2810e20be856b9555298f66294742b38c0e606846fdad477fbd2006a439323240147d6fe372f9cd332c1b75
-
SSDEEP
49152:17+4rYIA6+ngCDnW9GWuGUgs9E73Up0M+4A9IaC+T43x0bC+Q7HmlciT8urEdCc:s4RA6+nBbNgs97KbCl7HH0Ex
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3748 Logo1_.exe 3912 f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{CC33CE5D-25A0-4A19-8BF1-AA9F080685BC}\chrome_installer.exe Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office 15\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.177.11\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MLModels\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lo-LA\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe File created C:\Windows\Logo1_.exe f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe 3748 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5004 wrote to memory of 1852 5004 f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe 84 PID 5004 wrote to memory of 1852 5004 f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe 84 PID 5004 wrote to memory of 1852 5004 f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe 84 PID 5004 wrote to memory of 3748 5004 f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe 85 PID 5004 wrote to memory of 3748 5004 f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe 85 PID 5004 wrote to memory of 3748 5004 f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe 85 PID 3748 wrote to memory of 4824 3748 Logo1_.exe 86 PID 3748 wrote to memory of 4824 3748 Logo1_.exe 86 PID 3748 wrote to memory of 4824 3748 Logo1_.exe 86 PID 4824 wrote to memory of 1148 4824 net.exe 89 PID 4824 wrote to memory of 1148 4824 net.exe 89 PID 4824 wrote to memory of 1148 4824 net.exe 89 PID 1852 wrote to memory of 3912 1852 cmd.exe 90 PID 1852 wrote to memory of 3912 1852 cmd.exe 90 PID 1852 wrote to memory of 3912 1852 cmd.exe 90 PID 3748 wrote to memory of 3188 3748 Logo1_.exe 41 PID 3748 wrote to memory of 3188 3748 Logo1_.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe"C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aED6D.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe"C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe"4⤵
- Executes dropped EXE
PID:3912
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1148
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5e9325483409732a224d105e072546fa8
SHA1d23d39592deace449a7bf98427525d34b106b444
SHA256116a778a061a28cd9dd0d3c028fb8982daa3e3ca84e6f33b56f13bc4fa3c1a78
SHA512836d9b24a28b54f734c6d7e9bbb56f301db8a991a53310f9dffd620f76bf798ef1aa8f362b6cd330ec9c146095b6410f9cb174ff54f7b58322f1abd82818db59
-
Filesize
770KB
MD59632e12ca719a974fd6c6be22f8cde45
SHA1cddd3f3efb871110697a6c93baaa16dd0a864256
SHA256dd1b7e4009cbcf3fc15eb05d805207d60048ca0c4f020b94ca76307f09a4af7e
SHA512af0c630a9ba80322961ec8b147dfb120aa611788ce8678f85f963cb20e83280d120ec70945dba5e71a6dcd4e4a26b49467954dbb6ca6dd5f036ddb226eba153f
-
Filesize
722B
MD55044f8aef2578e0bb42ee4044979af5b
SHA1392127c1578788c291dca7905394642b4b8c7502
SHA2566964209cf8a8908a8a3052a96b28707998bef357f232991b54a2cbd33dfb23a7
SHA5121b8ca9660a014b4f1ede30815088b77b9dc38dd3eaa26508e985a7e914185d591c0bdffd5ee704970f25375e87f131e230e55fb0f8e5dd4e088d6b4e40a4c2f4
-
C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe
Filesize2.9MB
MD54ef9d5d47419e609f1720bc59ff64afd
SHA14420ab1d3b2a1eeae0ed382f352759c0d62d3220
SHA256d42760aeaf5d938b7be942507c19309859c8653c102cca7fe1c235bdea28c43d
SHA5123f7a383f08d9c38debbc5eabcd0994915594f65b1d09fb12b01f99e98b9e964742e6a53c40278de84426f6a52b9d42c8fb5a4ea633e8f5ca904b29884ef96bdb
-
C:\Users\Admin\AppData\Local\Temp\f68eaabcc3966bc5ab4dbb78de2ccfb107289502d4061c9c7afa8e4ed211db05.exe.exe
Filesize2.9MB
MD54ef9d5d47419e609f1720bc59ff64afd
SHA14420ab1d3b2a1eeae0ed382f352759c0d62d3220
SHA256d42760aeaf5d938b7be942507c19309859c8653c102cca7fe1c235bdea28c43d
SHA5123f7a383f08d9c38debbc5eabcd0994915594f65b1d09fb12b01f99e98b9e964742e6a53c40278de84426f6a52b9d42c8fb5a4ea633e8f5ca904b29884ef96bdb
-
Filesize
26KB
MD58922a4ac9c38bcb52124f9efe7e77593
SHA1d3ed9dd3a8326e982d90926ced067b1a4bb5a663
SHA256fece29ead615f8a7a4a13a36b8415c0fa517cc62954b77ca0c7dedb13a20a0d6
SHA5122e17a7c3247b5c38f89b8cb9b502bd92bbb50966662479e9fd476c207e2e1678d394fc3bb9fd3e06e2b83e9b05a83def8a0539fedeb1842f38f0cdcd01363c5c
-
Filesize
26KB
MD58922a4ac9c38bcb52124f9efe7e77593
SHA1d3ed9dd3a8326e982d90926ced067b1a4bb5a663
SHA256fece29ead615f8a7a4a13a36b8415c0fa517cc62954b77ca0c7dedb13a20a0d6
SHA5122e17a7c3247b5c38f89b8cb9b502bd92bbb50966662479e9fd476c207e2e1678d394fc3bb9fd3e06e2b83e9b05a83def8a0539fedeb1842f38f0cdcd01363c5c
-
Filesize
26KB
MD58922a4ac9c38bcb52124f9efe7e77593
SHA1d3ed9dd3a8326e982d90926ced067b1a4bb5a663
SHA256fece29ead615f8a7a4a13a36b8415c0fa517cc62954b77ca0c7dedb13a20a0d6
SHA5122e17a7c3247b5c38f89b8cb9b502bd92bbb50966662479e9fd476c207e2e1678d394fc3bb9fd3e06e2b83e9b05a83def8a0539fedeb1842f38f0cdcd01363c5c
-
Filesize
9B
MD5a496dc6e67a7c97fe6b5f93f052c5de1
SHA191d1cbd786e4ca543f5d364b42273efd1be384c5
SHA256f656a696c47b2c37afecab6674210ad082849577f4763b778f81ca947bef3e63
SHA512850c4fe29e0fa3388cb06d91a85330c1ac5eed337d23d2b6ee3d74142941dba27a49485ecf4a8cc73800c8c22d207b6586447ee3b20443f9a0e355614a6a1cb2