Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe
Resource
win10v2004-20231020-en
General
-
Target
b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe
-
Size
46KB
-
MD5
30a14c9e3297a4545860067b51b15075
-
SHA1
d803a96f74961602c0fd7808f3969a2571c2e06a
-
SHA256
b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3
-
SHA512
c9670f2036344846495a2ea3078b19fb8ba70964a42fe8c1c82185a5df94d3c905c1e449e1cfa6e11af6c365b78fea756900b63780fe8acbcb5114767b642e86
-
SSDEEP
768:ARJ1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoGwXnKxbWrbFcpfWDG7vUf2h:AJfgLdQAQfcfymNG+KxCSpftvUf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1100 Logo1_.exe 2168 b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Controls\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\libs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Text\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.177.11\MicrosoftEdgeUpdate.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe File created C:\Windows\Logo1_.exe b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe 1100 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3096 3328 b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe 86 PID 3328 wrote to memory of 3096 3328 b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe 86 PID 3328 wrote to memory of 3096 3328 b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe 86 PID 3328 wrote to memory of 1100 3328 b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe 87 PID 3328 wrote to memory of 1100 3328 b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe 87 PID 3328 wrote to memory of 1100 3328 b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe 87 PID 1100 wrote to memory of 4444 1100 Logo1_.exe 88 PID 1100 wrote to memory of 4444 1100 Logo1_.exe 88 PID 1100 wrote to memory of 4444 1100 Logo1_.exe 88 PID 4444 wrote to memory of 1160 4444 net.exe 90 PID 4444 wrote to memory of 1160 4444 net.exe 90 PID 4444 wrote to memory of 1160 4444 net.exe 90 PID 3096 wrote to memory of 2168 3096 cmd.exe 92 PID 3096 wrote to memory of 2168 3096 cmd.exe 92 PID 1100 wrote to memory of 3064 1100 Logo1_.exe 56 PID 1100 wrote to memory of 3064 1100 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe"C:\Users\Admin\AppData\Local\Temp\b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA73C.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe"C:\Users\Admin\AppData\Local\Temp\b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe"4⤵
- Executes dropped EXE
PID:2168
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1160
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD54ce7099971ace528948a8a4aebc3ff9c
SHA127398895057cd20390efdd9221b9690d366e76f3
SHA2562bb3ba284a7dcaf6fd29aa131aebd41b39b3f24ffc422468661b5bb3df3bd770
SHA512678b183ecc43d9717d8e8defd2153247b4f4c1c179f4b95cea73524c3df81c823de728f2e18b25974f51cb217d683c45ede401c0250f4cae5d6f513e8cba45a4
-
Filesize
484KB
MD589095f07ae2a61e67ce921ef53b28e96
SHA12caf13dad65e45f59137402896929904c86935b0
SHA2566ad020fcf6dcbd0c5aa345b68e618b1a04d5c2461edb28d75d6c026ea1c6e90d
SHA5129f794c74a06efd458a06791d97688231a8be71075aca2a1cb60db61d8c3a331b4201876dfbeca50b27c08b47ca36bbafa593a7cc9dd2fdbccbf35a25e9c741ea
-
Filesize
722B
MD58443aafeb53be89b903e2b85c4a1da1a
SHA1e7f969fe553e72003f39542245a378a89bce08d7
SHA256d8c6b6e08cdb61a4074fa1c029b41b6a7e7992b525e1d6b166c554c07a40d706
SHA512ab0f532d6bd2c769ce0110fe688fd4d7419c9937d0f1a65908d60053bde7c8327577f3c7a204a29bc140584fab8b4a4e20fc147ee7253395df6f49e40b266c81
-
C:\Users\Admin\AppData\Local\Temp\b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe
Filesize20KB
MD57d3213dba093eef6f2cc45a37604c11d
SHA1e57e860861390f40222ec1d782876b2da58e22f6
SHA256feb25888429fb3570d1d9b9d9d67116779ee82fa3aa0fcea025e7b283d2c2cb3
SHA5127ad71a85c0c1578e40e4d9a51604034fbdf339db6248ef4960ee4937d93c54aa2179f4cb9b5a337435b9be8f6dd9f7054873ee8ab0babe1aa28c67f65854a4e9
-
C:\Users\Admin\AppData\Local\Temp\b6071a72130f82796e6602e2f6223b14aa90383cef0fe8a5316c9ca8aeeccde3.exe.exe
Filesize20KB
MD57d3213dba093eef6f2cc45a37604c11d
SHA1e57e860861390f40222ec1d782876b2da58e22f6
SHA256feb25888429fb3570d1d9b9d9d67116779ee82fa3aa0fcea025e7b283d2c2cb3
SHA5127ad71a85c0c1578e40e4d9a51604034fbdf339db6248ef4960ee4937d93c54aa2179f4cb9b5a337435b9be8f6dd9f7054873ee8ab0babe1aa28c67f65854a4e9
-
Filesize
26KB
MD5edefa926ddb5dfe186d18e6203474ca0
SHA186c9f2eda46c448b917132afcc737f5a70265b2c
SHA25656d13ff3abc7dbc60ec382fa1411f2baa07920a5a6fa3f34f49ce61386c815db
SHA5123b4ffb3260e3ce6dadf94020953de7e59028ae110866a38e7e3fe38feefbe77c6f167ce60da06728935668c1d45272927501d9ef017379eb8b453be75a27486d
-
Filesize
26KB
MD5edefa926ddb5dfe186d18e6203474ca0
SHA186c9f2eda46c448b917132afcc737f5a70265b2c
SHA25656d13ff3abc7dbc60ec382fa1411f2baa07920a5a6fa3f34f49ce61386c815db
SHA5123b4ffb3260e3ce6dadf94020953de7e59028ae110866a38e7e3fe38feefbe77c6f167ce60da06728935668c1d45272927501d9ef017379eb8b453be75a27486d
-
Filesize
26KB
MD5edefa926ddb5dfe186d18e6203474ca0
SHA186c9f2eda46c448b917132afcc737f5a70265b2c
SHA25656d13ff3abc7dbc60ec382fa1411f2baa07920a5a6fa3f34f49ce61386c815db
SHA5123b4ffb3260e3ce6dadf94020953de7e59028ae110866a38e7e3fe38feefbe77c6f167ce60da06728935668c1d45272927501d9ef017379eb8b453be75a27486d
-
Filesize
10B
MD5efd2ef11e05f1e4e71c36b61f42f4b74
SHA166f050470e42f08b4f86a669c0c3e7739d334585
SHA256c4d0fb64b84374af29c373ad1807dd661605dc6714e45c6617f7f5c537b9c5f4
SHA51230402f761b30147ad56861e2c5da6b70c5a9056cf6b582a5c333b9f867259fd42bb2e18c8d8a43762a9365e7147d624e13f0356d307535863ba0b2c9567e486b