Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
Resource
win10v2004-20231025-en
General
-
Target
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
-
Size
56KB
-
MD5
dfd818b141baa165bf43194752aa6565
-
SHA1
dca2e96f7dbeb397401c99d3e1183be1cc17dfb4
-
SHA256
07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47
-
SHA512
89312c27b7d8a9b6e36ff8e443957500687ab23a0bdfee0467180eb1c04367c84ee11cf7f2f0213469f2efd63001e80c5443444674378359848b776ecd0ef369
-
SSDEEP
1536:XfgLdQAQfcfymNG+KxqYDK22zvgjgo5v1H:XftffjmNoxqYRVgoj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5076 Logo1_.exe 4320 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_proxy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\Location\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\UserControls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-il\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe 5076 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4148 wrote to memory of 1212 4148 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 86 PID 4148 wrote to memory of 1212 4148 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 86 PID 4148 wrote to memory of 1212 4148 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 86 PID 4148 wrote to memory of 5076 4148 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 87 PID 4148 wrote to memory of 5076 4148 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 87 PID 4148 wrote to memory of 5076 4148 07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe 87 PID 5076 wrote to memory of 1876 5076 Logo1_.exe 89 PID 5076 wrote to memory of 1876 5076 Logo1_.exe 89 PID 5076 wrote to memory of 1876 5076 Logo1_.exe 89 PID 1876 wrote to memory of 4252 1876 net.exe 91 PID 1876 wrote to memory of 4252 1876 net.exe 91 PID 1876 wrote to memory of 4252 1876 net.exe 91 PID 1212 wrote to memory of 4320 1212 cmd.exe 92 PID 1212 wrote to memory of 4320 1212 cmd.exe 92 PID 1212 wrote to memory of 4320 1212 cmd.exe 92 PID 5076 wrote to memory of 3156 5076 Logo1_.exe 13 PID 5076 wrote to memory of 3156 5076 Logo1_.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6C75.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe"4⤵
- Executes dropped EXE
PID:4320
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4252
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58492f566225e557f3908460cb8d51626
SHA1f9712b88a4825f7869494e8d4c3a2ec560878b89
SHA2561cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81
SHA5126c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874
-
Filesize
484KB
MD510486053ce3a4472595173ee8618c91e
SHA1314192d35b19998f7c8f4905066f340ad2ef43af
SHA2563fcf2511baa791e07a985a27bd2be372c64964d216611ebea153cc6c77c06e05
SHA5125f699f70e8e92c164844becd9e57e4a45b2602db75534e0dbe9ed76e7d3fc0e079d9a93af4c42e4f0df1c0e33ddaa8104f91ca7e82bfd826d9cd44e41390662f
-
Filesize
722B
MD5986969ffb157e6cadd1dc11e0eeb7ffa
SHA1472793262721aa4acb6302b093233d4743eb37a4
SHA256499adf921590e0c47c358e1b0a0c5546fab0132ed8b96b25b796c0644359ab0e
SHA512377bf949ecefc43dc86464aa875e642a7205984389193312dba98f9dc5ed58275866fb1d58eae93baae4739776365dbc7a5369c08e40a9010e741e715631cfb2
-
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe
Filesize30KB
MD5e5a07c7a8d47b4445318f0a34c5dcf61
SHA1e33cffbf4f0d122b51cae4cb63e410d5554bfd0b
SHA2568c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2
SHA512c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6
-
C:\Users\Admin\AppData\Local\Temp\07b3a912048571f65e859aa38b43cf8a1b986ff3bc0d642a1081a43f1376bf47.exe.exe
Filesize30KB
MD5e5a07c7a8d47b4445318f0a34c5dcf61
SHA1e33cffbf4f0d122b51cae4cb63e410d5554bfd0b
SHA2568c40039fadb0a8a45d638160c8f6f5c7cc3a8b85afe2dabf494926c610348fc2
SHA512c8de6f9dad39711456e0291ba72699b3a186b6132887425b16b4c7bbf380c27a16de010a4efdaf29e6216404500a4541e436dd49ecf1a814a2fa514ddcb9c7a6
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
10B
MD55e76cfc33a5459a5b5394ebf5b4fb5d7
SHA12f26d96447cf7431ca7ff0757b3edbae97f3c14e
SHA256e4313276577226a8016efa4678d1d8357aae1ba682953d56f8b0b1d5976f5bab
SHA512dd064e348691ba39ad6890deb29b6906bbc9fe4a390ae6fb3091cca3988d1757056904d1744c664113712b652ad10eba21e31b0b2df8a9e976bcaaebaedd5f79