Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe
Resource
win10v2004-20231020-en
General
-
Target
59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe
-
Size
43KB
-
MD5
f90feee0b873e1cdbed2e9b808170c3a
-
SHA1
978c4bd73f1374c5a1f993fbf6e585923656caef
-
SHA256
59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392
-
SHA512
14f41bb0f0b18945e10c90889e21c8141534fa0db9c30229a76d26f224198a70b8e5620879664e4324d92f9fe1a4de8ae00271c4366835080097e5e69cd57874
-
SSDEEP
768:j1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLPxNIqhKDJUoKeALWUbCO75:5fgLdQAQfcfymNjIqhUAaQCO75
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 980 Logo1_.exe 2380 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-standard\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\0.2.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe File created C:\Windows\Logo1_.exe 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe 980 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2592 wrote to memory of 4896 2592 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe 86 PID 2592 wrote to memory of 4896 2592 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe 86 PID 2592 wrote to memory of 4896 2592 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe 86 PID 2592 wrote to memory of 980 2592 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe 87 PID 2592 wrote to memory of 980 2592 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe 87 PID 2592 wrote to memory of 980 2592 59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe 87 PID 980 wrote to memory of 1840 980 Logo1_.exe 89 PID 980 wrote to memory of 1840 980 Logo1_.exe 89 PID 980 wrote to memory of 1840 980 Logo1_.exe 89 PID 1840 wrote to memory of 212 1840 net.exe 91 PID 1840 wrote to memory of 212 1840 net.exe 91 PID 1840 wrote to memory of 212 1840 net.exe 91 PID 4896 wrote to memory of 2380 4896 cmd.exe 92 PID 4896 wrote to memory of 2380 4896 cmd.exe 92 PID 4896 wrote to memory of 2380 4896 cmd.exe 92 PID 980 wrote to memory of 3148 980 Logo1_.exe 63 PID 980 wrote to memory of 3148 980 Logo1_.exe 63
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe"C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA604.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe"C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe"4⤵
- Executes dropped EXE
PID:2380
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:212
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ca3cdb90057fbc3463681171313994e7
SHA1873e1af9bae05748986406679622740c95b427dc
SHA2566e71672c6558a66fe6b3cf6c48ce33b862798855811e12ea0cfe3fa1252b506b
SHA51209d1bcc49f523669431e1caec3ce0d1ef1258f244e2c38c685f8eb0056b2e5ff11108b1e07b89fc4a1d3f64fb29292897d1c629ead8c7d8d29b3943fd61042ba
-
Filesize
484KB
MD5b5a2c3ef34234395cd83d3d04f9a965b
SHA14d05dbf8f44b4b4df946f513cb8c5eb7f40e7459
SHA2563ba3e344fe4a69d7252bf3c7957e6017df662d52dc57150fa001e29d5e07b635
SHA51213d9f695ca14ff60036e6a0ae35058f7422690cb2692aa7dfe53b46d010a5fc277a0dc49f98c6ff63f48c44bac7fec21384157e3c6ef6274b26cf27d96d354b8
-
Filesize
722B
MD5ff6318ccbcec416094d563e2e38ef517
SHA17b6a748ce302bddf0711f6b3ea49b484da6c0d53
SHA256fe1a7a0d43671ea23d211bfec5fbc2f27a237d3af7e3592a21bb647bb99a5036
SHA51237864fbe2b0eda03b4aac0f37f608a8e75f40e8dc4e9e3f27f88ed839cf47b5747b46734f17a8e1f05bfd06cc232b89d41ae9d9cbd7a1fac7dde3ba43d78ceef
-
C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe
Filesize17KB
MD5322e72c39d2b837fbd3ad8b095a74fe0
SHA11d8fc1765a534fcd927b5a7de4461a3ee2156560
SHA256eec71c90e6bfc0e638449383f60728af490eecf3d4da04023857a984927b197e
SHA5121cffb3ddb62165d4013b441baafb08a5dfef7febb8ac4527faeffe1126340c5acad95fce830d863571fcce1ca50020542968d953b4a12b10ac9e2399e3ae90f4
-
C:\Users\Admin\AppData\Local\Temp\59e094e72f7e64b1fb56aa0853a8f42b66816d4d6e3df9c890bb8ed44bb5a392.exe.exe
Filesize17KB
MD5322e72c39d2b837fbd3ad8b095a74fe0
SHA11d8fc1765a534fcd927b5a7de4461a3ee2156560
SHA256eec71c90e6bfc0e638449383f60728af490eecf3d4da04023857a984927b197e
SHA5121cffb3ddb62165d4013b441baafb08a5dfef7febb8ac4527faeffe1126340c5acad95fce830d863571fcce1ca50020542968d953b4a12b10ac9e2399e3ae90f4
-
Filesize
26KB
MD55e7e06fbb6e21e6de73ca67cc4a63166
SHA10609802af5b07d9f1b794e4182f9d27ebc25c1bf
SHA256bb953dd3a09c6f84b34b954897457f8f8cd93fb1219f7ca907cfd95ffc253e12
SHA512561520e55562990019d205e26905183338988dea70008f394ec6159bc5c9c7885e8eae2881acdc01d50475610500ab2dac6c0f8a342cb98e0edb4a29fde904df
-
Filesize
26KB
MD55e7e06fbb6e21e6de73ca67cc4a63166
SHA10609802af5b07d9f1b794e4182f9d27ebc25c1bf
SHA256bb953dd3a09c6f84b34b954897457f8f8cd93fb1219f7ca907cfd95ffc253e12
SHA512561520e55562990019d205e26905183338988dea70008f394ec6159bc5c9c7885e8eae2881acdc01d50475610500ab2dac6c0f8a342cb98e0edb4a29fde904df
-
Filesize
26KB
MD55e7e06fbb6e21e6de73ca67cc4a63166
SHA10609802af5b07d9f1b794e4182f9d27ebc25c1bf
SHA256bb953dd3a09c6f84b34b954897457f8f8cd93fb1219f7ca907cfd95ffc253e12
SHA512561520e55562990019d205e26905183338988dea70008f394ec6159bc5c9c7885e8eae2881acdc01d50475610500ab2dac6c0f8a342cb98e0edb4a29fde904df
-
Filesize
9B
MD56e65261356966c380b6d0f666601373d
SHA132e89117530cec202f023f9b1baf357d39ea51f5
SHA2566ddad334aa359298e28f0f8f79feb928940367e1c95b4a74b73736ec81e7d2b5
SHA512a9f2dff591a56eacbc7e8bb8a0bf0772dc4428c952fc6551be55bddbc3f35be043e5b46fb834e0484266ef11de170970bd8664580140bd5b933f356d67dd7ba6