Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe
Resource
win10v2004-20231023-en
General
-
Target
316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe
-
Size
84KB
-
MD5
40200b61f1beb43445ac45feb1623e11
-
SHA1
d29e1d5018e29bc1d005773b3c81ede40a6509d7
-
SHA256
316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f
-
SHA512
081a10cfefd36a1382e65170b60166c54b07a16714160b72ed93bf2aac56a5a9a879a58fb3ec05775fa448080a0c5623d177eca80309ea95a16eede21cc1e3e7
-
SSDEEP
1536:XfgLdQAQfcfymNG+Kx6kRssFOUCHaLObuc72RSciqjudzp:XftffjmNoxXRsssN1um2RwqgF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3680 Logo1_.exe 4556 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ro-RO\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square150x150\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Configuration\Schema\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\HelpAndFeedback\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pl-PL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\script\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Multimedia Platform\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\bg-BG\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fr-FR\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe File created C:\Windows\Logo1_.exe 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe 3680 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1192 2584 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe 89 PID 2584 wrote to memory of 1192 2584 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe 89 PID 2584 wrote to memory of 1192 2584 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe 89 PID 2584 wrote to memory of 3680 2584 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe 90 PID 2584 wrote to memory of 3680 2584 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe 90 PID 2584 wrote to memory of 3680 2584 316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe 90 PID 3680 wrote to memory of 4572 3680 Logo1_.exe 91 PID 3680 wrote to memory of 4572 3680 Logo1_.exe 91 PID 3680 wrote to memory of 4572 3680 Logo1_.exe 91 PID 4572 wrote to memory of 2420 4572 net.exe 93 PID 4572 wrote to memory of 2420 4572 net.exe 93 PID 4572 wrote to memory of 2420 4572 net.exe 93 PID 1192 wrote to memory of 4556 1192 cmd.exe 95 PID 1192 wrote to memory of 4556 1192 cmd.exe 95 PID 3680 wrote to memory of 3168 3680 Logo1_.exe 23 PID 3680 wrote to memory of 3168 3680 Logo1_.exe 23
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe"C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8CFE.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe"C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe"4⤵
- Executes dropped EXE
PID:4556
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2420
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58492f566225e557f3908460cb8d51626
SHA1f9712b88a4825f7869494e8d4c3a2ec560878b89
SHA2561cbcf9daf8569840caad44f23bf4b61296f4b908472e08a5d9e425018002ee81
SHA5126c6649c5464136e5929257abcc5c1fa61c0aae74d43d4332da19ff0aaa4cf683a5dc6d681d1806d8698a0bf7914200bfe14ed5009bc83c267ea2df06d6914874
-
Filesize
484KB
MD510486053ce3a4472595173ee8618c91e
SHA1314192d35b19998f7c8f4905066f340ad2ef43af
SHA2563fcf2511baa791e07a985a27bd2be372c64964d216611ebea153cc6c77c06e05
SHA5125f699f70e8e92c164844becd9e57e4a45b2602db75534e0dbe9ed76e7d3fc0e079d9a93af4c42e4f0df1c0e33ddaa8104f91ca7e82bfd826d9cd44e41390662f
-
Filesize
722B
MD5495a39db28586b85045137d70e9c99f9
SHA161a32a7c07f889f009385a81ec74f5be566403b4
SHA256cb2f34282e8cbd4cb3b448741c8cc2bf7479e44f946732ac523b884fa534f0bb
SHA5122d28a1f05c4ff613d499692c5cd31003a0481f9013e68108a4bba71e685cad7f782153b5f27edc328b3e5f664a0dcc82a920a10f37069b4382a1569fc977eba0
-
C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe
Filesize57KB
MD5fe10a00fee1b2f96d7261c5e295629c9
SHA11a173bff0227c544d7fad7f6fe2b3a9785b1e1e9
SHA25638e4d1b58485e7e83f75cc0bc40b6d86b3c34b2472ca1bd87e6732de1720cc78
SHA51220f490f37f2648b1fedbbe913c36ba3e779447ae85c9b559d5272b0436963e99248e48ed2f5217fe16ea18fbf89aef527a96479009f7a950b0a600191480c02a
-
C:\Users\Admin\AppData\Local\Temp\316387c9905a91ad2d40166a0765485306acaef57c18720476d0c1c231fc455f.exe.exe
Filesize57KB
MD5fe10a00fee1b2f96d7261c5e295629c9
SHA11a173bff0227c544d7fad7f6fe2b3a9785b1e1e9
SHA25638e4d1b58485e7e83f75cc0bc40b6d86b3c34b2472ca1bd87e6732de1720cc78
SHA51220f490f37f2648b1fedbbe913c36ba3e779447ae85c9b559d5272b0436963e99248e48ed2f5217fe16ea18fbf89aef527a96479009f7a950b0a600191480c02a
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
26KB
MD5a8cc9593630738ee6e1093a6d7be47ea
SHA145d401d61a84284452f75e1e028a40d81a9aeb1a
SHA256c5cfbea5959f951bbd93dffc6b569e8c35e315c71ddf07ccbeb1fb3c3730f604
SHA512f32485ad04863eb8819363c488747efc375ced09b30148874688dadfa292ed8dd89c819d420eb4d440fbf9bb6b4f8df29e86d858adc6efa37007edbeb70b62a8
-
Filesize
10B
MD5964ac8d4b418c88016736343238e671b
SHA1bb68a3642be99aa9c113d48e397ad6578a3e9953
SHA256930485019ca5a8337ebfc670ff859a8a828e8d23578a93af9ef0ec302cc4bc2f
SHA5126e17b4086ac2efc6d57f97534b73f6a1465a75d213d0ddabf113c6b669b452ddac6ac43adeaabc3e67be53f1515fd9ff526f065d472d3f1f9a5fea16a6200846