Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe
Resource
win10v2004-20231023-en
General
-
Target
27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe
-
Size
631KB
-
MD5
b0a88542ec31b27b5a80214dd1f986a0
-
SHA1
6d84b15665cbba4c93121eb216ac56677477ad10
-
SHA256
27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679
-
SHA512
abea5d2e206776362a61fa1e47b530e6f965050deae5112d20d99daa0954821e1229808e4571ecf9a3638b0a9f4b6f98e4c65f18d2ac7ad6095d654d6ebc07fe
-
SSDEEP
12288:K7+zrVFiAFasywTUzDV7Nwk/dvbKCnGy3tcp98:K7SrszDDwk/ICG2u98
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1408 Logo1_.exe 2516 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsPowerShell\Configuration\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Sigma\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\Content\Shaders\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe File created C:\Windows\Logo1_.exe 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe 1408 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 680 wrote to memory of 3432 680 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe 91 PID 680 wrote to memory of 3432 680 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe 91 PID 680 wrote to memory of 3432 680 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe 91 PID 680 wrote to memory of 1408 680 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe 92 PID 680 wrote to memory of 1408 680 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe 92 PID 680 wrote to memory of 1408 680 27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe 92 PID 1408 wrote to memory of 4572 1408 Logo1_.exe 94 PID 1408 wrote to memory of 4572 1408 Logo1_.exe 94 PID 1408 wrote to memory of 4572 1408 Logo1_.exe 94 PID 3432 wrote to memory of 2516 3432 cmd.exe 96 PID 3432 wrote to memory of 2516 3432 cmd.exe 96 PID 3432 wrote to memory of 2516 3432 cmd.exe 96 PID 4572 wrote to memory of 4388 4572 net.exe 97 PID 4572 wrote to memory of 4388 4572 net.exe 97 PID 4572 wrote to memory of 4388 4572 net.exe 97 PID 1408 wrote to memory of 3232 1408 Logo1_.exe 38 PID 1408 wrote to memory of 3232 1408 Logo1_.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe"C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a29E9.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe"C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe"4⤵
- Executes dropped EXE
PID:2516
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4388
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD548ee00228e77405f1c8a8ab779c66b3b
SHA121900c5d606474cd0b23985bfa2af241671e2492
SHA256ab5b3c90b8f0aed7dea077fdae0aae58ffa3fef27df5cc40922392e9a047cd42
SHA512ab67a00c1bebf0a62a384fa920f6db10f73eba0e0c303a90ba76879452a0559ae185a1a5bf7e0f85b11360bf3451f48ee36ce619015d5c368833039ad134fccd
-
Filesize
484KB
MD5dedd6b598bace785557a241a4a5edd8d
SHA15a0c5244f670373c64fe9aa8932f4d0ebf10c933
SHA256df8cd7c76f52f14f7b30c69f3d35fcf01c9d0f5367ac24e1c10e59a3212615b4
SHA51209d6354f912e3973bff89e9f3fcfc8cf5aa362164484881472213464f6bc3b3d5f183c9bd6141dd56b4574be59e813abf07bff2a7bb9e72d55ab2d3ca6582045
-
Filesize
722B
MD52d90cf66ee87442285f269a32be536f0
SHA1f2f3e695f654ba5c89ac66023ee534179729c80e
SHA256a6c5f9ea41c5bee9756d0afbde8ce4dee515743595220105c7e48a7e7b12861b
SHA512dbabc5811f610de8a6fd18af3ab11051292629cd7cf67ad079c361047d639f1ec7a987f22faedcbc4f1a477d989185a01411af350055ed821a01380e0a62a872
-
C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe
Filesize604KB
MD5a879a9af3f7d91226e4ad82f9ac6436a
SHA1b5f2ed114f222fe5c0ba2c9049e9191810905442
SHA25663f8208e1f2560186063455c8a01f5e41e3ab40280b43c49cd4d557956b25a35
SHA512688c9dc57cbe707ab42ebbd43a84ac2a7950f887f580bd686b368eecc921b2134689fcacbe8636c641b00d8fdb7d68f77d6439b6a9b0d1e9501e5e8b8324635d
-
C:\Users\Admin\AppData\Local\Temp\27552837e8a2fabd3edbae9fb9f9d0d1306524f84a2c0c5ee03e3130ebd40679.exe.exe
Filesize604KB
MD5a879a9af3f7d91226e4ad82f9ac6436a
SHA1b5f2ed114f222fe5c0ba2c9049e9191810905442
SHA25663f8208e1f2560186063455c8a01f5e41e3ab40280b43c49cd4d557956b25a35
SHA512688c9dc57cbe707ab42ebbd43a84ac2a7950f887f580bd686b368eecc921b2134689fcacbe8636c641b00d8fdb7d68f77d6439b6a9b0d1e9501e5e8b8324635d
-
Filesize
26KB
MD5deeeb79dbcdd21896392c99148c76a1b
SHA1583ffea0d38c41c7c4ce94dc67c04f8cba670ad0
SHA25615ddeadbca3438d54d250d169706de6ff313ac3b68e80c13a8466b897153047d
SHA5121050b72c6faf603c07420e6dd0cd6e49d6b0b695356fa489297d0ad4af7d728fc474d32f71eea895b9a77d15eb405fbf5882cd50afed698593ea23b001320047
-
Filesize
26KB
MD5deeeb79dbcdd21896392c99148c76a1b
SHA1583ffea0d38c41c7c4ce94dc67c04f8cba670ad0
SHA25615ddeadbca3438d54d250d169706de6ff313ac3b68e80c13a8466b897153047d
SHA5121050b72c6faf603c07420e6dd0cd6e49d6b0b695356fa489297d0ad4af7d728fc474d32f71eea895b9a77d15eb405fbf5882cd50afed698593ea23b001320047
-
Filesize
26KB
MD5deeeb79dbcdd21896392c99148c76a1b
SHA1583ffea0d38c41c7c4ce94dc67c04f8cba670ad0
SHA25615ddeadbca3438d54d250d169706de6ff313ac3b68e80c13a8466b897153047d
SHA5121050b72c6faf603c07420e6dd0cd6e49d6b0b695356fa489297d0ad4af7d728fc474d32f71eea895b9a77d15eb405fbf5882cd50afed698593ea23b001320047
-
Filesize
10B
MD5964ac8d4b418c88016736343238e671b
SHA1bb68a3642be99aa9c113d48e397ad6578a3e9953
SHA256930485019ca5a8337ebfc670ff859a8a828e8d23578a93af9ef0ec302cc4bc2f
SHA5126e17b4086ac2efc6d57f97534b73f6a1465a75d213d0ddabf113c6b669b452ddac6ac43adeaabc3e67be53f1515fd9ff526f065d472d3f1f9a5fea16a6200846