Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe
Resource
win10v2004-20231020-en
General
-
Target
c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe
-
Size
1.2MB
-
MD5
a1829110860f61b6d11844ae271343c9
-
SHA1
bafb93ed4c34bfba05f4ead0f2f2376cf00e11be
-
SHA256
c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6
-
SHA512
40507b9de94649b08645b7076b5d98a635e5cdb3ed60e6f77c5b1a2838492f72aa6520fa63070746172d1f9b4e85a9d0ca66e797ce6421bb9d5bdf2d35550298
-
SSDEEP
12288:fAPmhGLC+kPitN8Rju56BEdKSfQQeX6T6c73kFZEHZl0m9oKMA+nkb/8gJmkLcQ:fnBviuK5iEdKqQQRTkcb9v/8gJmOb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3752 Logo1_.exe 2560 c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.1813.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\cpdf\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\libs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\SuggestionsService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\firstrun\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\MutableBackup\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\Location\Shifter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe File created C:\Windows\Logo1_.exe c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe 3752 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4516 wrote to memory of 5076 4516 c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe 86 PID 4516 wrote to memory of 5076 4516 c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe 86 PID 4516 wrote to memory of 5076 4516 c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe 86 PID 4516 wrote to memory of 3752 4516 c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe 87 PID 4516 wrote to memory of 3752 4516 c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe 87 PID 4516 wrote to memory of 3752 4516 c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe 87 PID 3752 wrote to memory of 4132 3752 Logo1_.exe 88 PID 3752 wrote to memory of 4132 3752 Logo1_.exe 88 PID 3752 wrote to memory of 4132 3752 Logo1_.exe 88 PID 4132 wrote to memory of 4320 4132 net.exe 90 PID 4132 wrote to memory of 4320 4132 net.exe 90 PID 4132 wrote to memory of 4320 4132 net.exe 90 PID 5076 wrote to memory of 2560 5076 cmd.exe 92 PID 5076 wrote to memory of 2560 5076 cmd.exe 92 PID 3752 wrote to memory of 3148 3752 Logo1_.exe 45 PID 3752 wrote to memory of 3148 3752 Logo1_.exe 45
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe"C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA78A.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe"C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe"4⤵
- Executes dropped EXE
PID:2560
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4320
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5568f17750238ab463c745953a303648a
SHA125e9de37d6edb52c584c442e4f93a0448b4b37d4
SHA2565351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81
SHA5129034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3
-
Filesize
487KB
MD5bf1bbfb3abc86e299017bcb5474595bf
SHA1def80689c4abc742c6dcf47e68f362ec0efd1681
SHA256a89f39f3f9ac3f8397818e9052f9c8cc2a74810b5c7cb6c313f4c91c898a7236
SHA512063e46c0c3898e51c5ce35c67a079e9431ef356a8c4d532b9e8a5e8f4b4c2224fc067b5b40a3d3cebc3933345d45e93ea59782d8b887a41d1d1c7881bb00bd97
-
Filesize
722B
MD5ecc41eba41693349c0c9e21b488071e7
SHA164d89cbcd1efe48b73ce3db5a342facc342593f2
SHA256555bdb056a14f36abed573e73510f62f383bb336b671ce5fcb2d0dcacf93282f
SHA5123e5b1dfd814d18e84843114c8b69e64df8119103c1730d5b81169b86b6d048d588a7af3d130fa99dccadcaa574b42f3d6aa92649cb89e8e86a50632113da3ac5
-
C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe
Filesize1.2MB
MD56533cf0a67dfd46e6dba1d32ec59692f
SHA1317b5e6ceef606ffc7d8577a7f65d5e6033fbcf4
SHA256bc1eee308d746abe96701730f75b182438575209b7569a67323c5e837ceae2d2
SHA5122a2ac1e7c91b0a37c5120ac157e75f202ac4cf048adf2d92ad70f198637bd0f15988a4b9f215d714c5b5643cd08278e57988d5594b6f2ae7e24e99b370fbd3be
-
C:\Users\Admin\AppData\Local\Temp\c2fb67f0c6ef48bd5471463a865bc5ebc7cd2d4a5fa5e4e1753c8779cc217ad6.exe.exe
Filesize1.2MB
MD56533cf0a67dfd46e6dba1d32ec59692f
SHA1317b5e6ceef606ffc7d8577a7f65d5e6033fbcf4
SHA256bc1eee308d746abe96701730f75b182438575209b7569a67323c5e837ceae2d2
SHA5122a2ac1e7c91b0a37c5120ac157e75f202ac4cf048adf2d92ad70f198637bd0f15988a4b9f215d714c5b5643cd08278e57988d5594b6f2ae7e24e99b370fbd3be
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
9B
MD56e65261356966c380b6d0f666601373d
SHA132e89117530cec202f023f9b1baf357d39ea51f5
SHA2566ddad334aa359298e28f0f8f79feb928940367e1c95b4a74b73736ec81e7d2b5
SHA512a9f2dff591a56eacbc7e8bb8a0bf0772dc4428c952fc6551be55bddbc3f35be043e5b46fb834e0484266ef11de170970bd8664580140bd5b933f356d67dd7ba6