Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe
Resource
win10v2004-20231025-en
General
-
Target
fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe
-
Size
7.3MB
-
MD5
8c06ba25d98aa2b94df710616e898da2
-
SHA1
74c6bc0125135516b2eb6f1bbf9444ef608724e6
-
SHA256
fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5
-
SHA512
f67223abe116b2449e76a67cd68697cac66218f9547097972f93d961985d76e53cce848f416306ae0abf2fdac0a89530e457bfbe3c850a62ec308f44131d6cac
-
SSDEEP
98304:EmB9OWBVClfcaA1oZeSajfztbVCGQX4bME4bP8nQgMVQNKe5AJbI8D:Eg9OHi1oZepfxUGGNQNKe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1260 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Images\Ratings\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\firstrun\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe File created C:\Windows\Logo1_.exe fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe 1260 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3544 wrote to memory of 3332 3544 fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe 87 PID 3544 wrote to memory of 3332 3544 fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe 87 PID 3544 wrote to memory of 3332 3544 fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe 87 PID 3544 wrote to memory of 1260 3544 fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe 88 PID 3544 wrote to memory of 1260 3544 fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe 88 PID 3544 wrote to memory of 1260 3544 fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe 88 PID 1260 wrote to memory of 4948 1260 Logo1_.exe 90 PID 1260 wrote to memory of 4948 1260 Logo1_.exe 90 PID 1260 wrote to memory of 4948 1260 Logo1_.exe 90 PID 4948 wrote to memory of 1128 4948 net.exe 92 PID 4948 wrote to memory of 1128 4948 net.exe 92 PID 4948 wrote to memory of 1128 4948 net.exe 92 PID 1260 wrote to memory of 3260 1260 Logo1_.exe 40 PID 1260 wrote to memory of 3260 1260 Logo1_.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe"C:\Users\Admin\AppData\Local\Temp\fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8916.bat3⤵PID:3332
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1128
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD583156f326cbfda263c69aa7483942b52
SHA12678a927c50dffc984dbf96318c2368cbf9eae13
SHA2563e1584d8d0df28547eb7471438402367a205c24b3b1afbfa96e66a9e621a9e03
SHA5122599056c1c703760c099053cdbefb48137ceea1556457623506b88857a881f305d89fef9156cf0d740d35d02d3ce18089f5d7f6706dec7b257f9e9d5d27ff5a1
-
Filesize
1.2MB
MD5e0249c003a2d9041362d16f2b3b13932
SHA1d3b9b9dd8176c39673c2779843177699b1824581
SHA256a0aa870a5df7d8a32936e5ac851103490a7add2ad1b10052fb79160e55665e75
SHA512c5aecf38e304bf00968c57762e2c5512db5478fa655b14846f7055e5d3b868c4d23fa87e8f0e1483367751c6e3dddca1ff418e053d584a843a2fc15e80e762ad
-
Filesize
722B
MD56f9b79a3cd03100cc4f80c5b4623d923
SHA11b038d12a14a22f86a7d62d164092f60101693b6
SHA256b6c024223081e8ae5df0d100642f77494e15b2d791cdfae556c0dcc66438eaee
SHA512d4e8b06a6b84757c026d245798e00597fc45bbb65a84b51fda242b4ed465fc4a6ed849bdcdc05b8af6fb4f269760cbff85866e47d0c81f5027dd62ba31a9db9a
-
C:\Users\Admin\AppData\Local\Temp\fe38ecbc054b051b0d6ef87faf8169753e519e5997bd352836b799338026ecf5.exe.exe
Filesize7.3MB
MD5172b6d29b3cdcdf2b0b14332eb216161
SHA17534c39aecd8a968c8cdf34db4cb388d999a3065
SHA2563bb1c042bf917e6577be28edce3243628e9ce4245e9abbc2cc0196ccca26630c
SHA51271e4e14c689974821c0bb80637a53cd5234df0111b809612ac810846fe2ba9d288da20141455b984dd842c8343166f807f8da51e74b66fbe3aec181db72806ce
-
Filesize
29KB
MD5a62477e460e659315b21ece9526e0026
SHA18fafdc80bbee8b35e27ae3311925e683b0feb5cb
SHA256008730275226074245e4200da9af9bf3649c41679c74fabcce2dd9cf282a9d3f
SHA5124ee01b80cb4543180f5e90e576638a0e629b9f4b82664463c0232089189b148af371e08b400d1c5715ed57e881372cd53dddbaa25049b3eb1c30740a68ebb035
-
Filesize
29KB
MD5a62477e460e659315b21ece9526e0026
SHA18fafdc80bbee8b35e27ae3311925e683b0feb5cb
SHA256008730275226074245e4200da9af9bf3649c41679c74fabcce2dd9cf282a9d3f
SHA5124ee01b80cb4543180f5e90e576638a0e629b9f4b82664463c0232089189b148af371e08b400d1c5715ed57e881372cd53dddbaa25049b3eb1c30740a68ebb035
-
Filesize
29KB
MD5a62477e460e659315b21ece9526e0026
SHA18fafdc80bbee8b35e27ae3311925e683b0feb5cb
SHA256008730275226074245e4200da9af9bf3649c41679c74fabcce2dd9cf282a9d3f
SHA5124ee01b80cb4543180f5e90e576638a0e629b9f4b82664463c0232089189b148af371e08b400d1c5715ed57e881372cd53dddbaa25049b3eb1c30740a68ebb035
-
Filesize
10B
MD572a26291bcc1408e80553c90265fe898
SHA1a597c3e1d8792f9c1732ca655a17d7c3144e506e
SHA2562cf79adb55578ac8b37ff6133a48d876948392d25b36466d0a97ea24cdf4ab63
SHA51262dc3cfd82e41d1640cc18d1fc4a4a4e64173569105a05aac6402d41897bf7d35627756ed416087f5c27a35d7f1543eabc1b1a69bb6208780c97bfd9c37e3dab