Analysis
-
max time kernel
161s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
Resource
win10v2004-20231023-en
General
-
Target
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
-
Size
184KB
-
MD5
242b3f0ab91d79dd962387373da59207
-
SHA1
2783cbc9761b2af1fe745e1526d2f226925649f0
-
SHA256
b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28
-
SHA512
cb72baa44817a034ad470100f6820892b1eb8a3794e44bd2b17546159ed46988de7481acf740bb2b5b70375e31510eee044885b0d9e8782d46a407d33df526a1
-
SSDEEP
3072:OftffjmNzwzvOYRt5YP/aKavT/DvbEvK9aobNI2B+Tls7LOjkWxmfd36Z9YJh0GY:2VfjmNEtiP/aK2h9H/B+3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4532 Logo1_.exe 3444 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hu-HU\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\cef\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-MX\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Resources\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe File created C:\Windows\Logo1_.exe b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe 4532 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4608 wrote to memory of 5004 4608 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 86 PID 4608 wrote to memory of 5004 4608 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 86 PID 4608 wrote to memory of 5004 4608 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 86 PID 4608 wrote to memory of 4532 4608 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 87 PID 4608 wrote to memory of 4532 4608 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 87 PID 4608 wrote to memory of 4532 4608 b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe 87 PID 4532 wrote to memory of 1736 4532 Logo1_.exe 88 PID 4532 wrote to memory of 1736 4532 Logo1_.exe 88 PID 4532 wrote to memory of 1736 4532 Logo1_.exe 88 PID 1736 wrote to memory of 4600 1736 net.exe 90 PID 1736 wrote to memory of 4600 1736 net.exe 90 PID 1736 wrote to memory of 4600 1736 net.exe 90 PID 5004 wrote to memory of 3444 5004 cmd.exe 92 PID 5004 wrote to memory of 3444 5004 cmd.exe 92 PID 5004 wrote to memory of 3444 5004 cmd.exe 92 PID 4532 wrote to memory of 3312 4532 Logo1_.exe 40 PID 4532 wrote to memory of 3312 4532 Logo1_.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aAE51.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe"4⤵
- Executes dropped EXE
PID:3444
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4600
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD57de1c02e8ab947f4ae861b58389e567b
SHA17c533225d360cd5f9ce11192ef48da213c626790
SHA2564b09ef1f8925ffb05bca2f4f9e10dcf0b8a419885328703fd3ccf7ba0384b2c5
SHA512e4cde157e434fb9636c71e6e51ce97d880485665ed677ec75df898e4bf137f582fafe14fd7b745a7c68b332f83bb716655ce15f20d713e49038d40300def6842
-
Filesize
722B
MD5127e79375bc1795e08f4d5764631120e
SHA13e53545580014d16845045372b75374874fabb3d
SHA2566a6262c257ae96dacfdc9e1298d1a058a9901f7dcde86d617ed33542ba4b5cb5
SHA512d2dab773552e5a526f77697312be71a3ab6e3132590609b2fcb52a9999208d2a3afa127dd7ee1dd70dd1d12d96cd6769bc69e21930de7f25a12ceba4ae74c02f
-
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe
Filesize158KB
MD5b07f2b96517cf26510f56b0f51e576be
SHA1872cb09ef723042057f2af82a6a38421b9588f27
SHA25683f0585a53cb0c83e4ff4e9a405bfe65aa538e3dabe384896007d823e7244e4b
SHA5125b9ec4cbf149e62fd5a1f4948d7832e7e84b80be10ed8d08aa37f10c2ccd9210963fac916b336dd3657c25c772ad448753fc627484e87ba8f9ba55f882518ef3
-
C:\Users\Admin\AppData\Local\Temp\b2186ab9e322d2039cd0551d460673e59faaab25bc7012ac439920f4d5404d28.exe.exe
Filesize158KB
MD5b07f2b96517cf26510f56b0f51e576be
SHA1872cb09ef723042057f2af82a6a38421b9588f27
SHA25683f0585a53cb0c83e4ff4e9a405bfe65aa538e3dabe384896007d823e7244e4b
SHA5125b9ec4cbf149e62fd5a1f4948d7832e7e84b80be10ed8d08aa37f10c2ccd9210963fac916b336dd3657c25c772ad448753fc627484e87ba8f9ba55f882518ef3
-
Filesize
26KB
MD5b4d5e3bb5ec37189c3d1642c6c70d24f
SHA1d3814805abcfc193dceff88708c5e027ba1b7b73
SHA256d5adf7b3d9a2eab15f28362d2d2a31492b7bdb7ee7bb3db94ed1b3147f537085
SHA512f25faa0df1abc892e7f644c75190023f1669fcd8670280f19a41ddfc07838c3f95b690e299ba797d697f8ca8cb72808aabd2d523c88325547acd80919445d12f
-
Filesize
26KB
MD5b4d5e3bb5ec37189c3d1642c6c70d24f
SHA1d3814805abcfc193dceff88708c5e027ba1b7b73
SHA256d5adf7b3d9a2eab15f28362d2d2a31492b7bdb7ee7bb3db94ed1b3147f537085
SHA512f25faa0df1abc892e7f644c75190023f1669fcd8670280f19a41ddfc07838c3f95b690e299ba797d697f8ca8cb72808aabd2d523c88325547acd80919445d12f
-
Filesize
26KB
MD5b4d5e3bb5ec37189c3d1642c6c70d24f
SHA1d3814805abcfc193dceff88708c5e027ba1b7b73
SHA256d5adf7b3d9a2eab15f28362d2d2a31492b7bdb7ee7bb3db94ed1b3147f537085
SHA512f25faa0df1abc892e7f644c75190023f1669fcd8670280f19a41ddfc07838c3f95b690e299ba797d697f8ca8cb72808aabd2d523c88325547acd80919445d12f
-
Filesize
10B
MD5efd2ef11e05f1e4e71c36b61f42f4b74
SHA166f050470e42f08b4f86a669c0c3e7739d334585
SHA256c4d0fb64b84374af29c373ad1807dd661605dc6714e45c6617f7f5c537b9c5f4
SHA51230402f761b30147ad56861e2c5da6b70c5a9056cf6b582a5c333b9f867259fd42bb2e18c8d8a43762a9365e7147d624e13f0356d307535863ba0b2c9567e486b