Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
Resource
win10v2004-20231023-en
General
-
Target
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
-
Size
53KB
-
MD5
57b9314acd1bbd7a9edac75056a9966f
-
SHA1
7233a3c31b5add992e1a6e53877a21cbf672803c
-
SHA256
46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53
-
SHA512
a484a1ec10bb6cf26d21c518851c64f711a3ed3db426b90ca5065a94afa8d0a2279ddb9363e236c01ed7c1077ec3da0c996aabbeb17c8a730b5d6f201aec6adc
-
SSDEEP
1536:c331fgLdQAQfwt7FZJ92BsooAYPJwPo5y7:cn1ftffepVPJAYPJwg5Q
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4528 Logo1_.exe 4076 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ms-MY\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Configuration\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Retail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-PT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.177.11\MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\Light\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ar-ae\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe File created C:\Windows\Logo1_.exe 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe 4528 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 760 wrote to memory of 4316 760 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 85 PID 760 wrote to memory of 4316 760 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 85 PID 760 wrote to memory of 4316 760 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 85 PID 760 wrote to memory of 4528 760 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 86 PID 760 wrote to memory of 4528 760 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 86 PID 760 wrote to memory of 4528 760 46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe 86 PID 4528 wrote to memory of 4388 4528 Logo1_.exe 87 PID 4528 wrote to memory of 4388 4528 Logo1_.exe 87 PID 4528 wrote to memory of 4388 4528 Logo1_.exe 87 PID 4388 wrote to memory of 3304 4388 net.exe 89 PID 4388 wrote to memory of 3304 4388 net.exe 89 PID 4388 wrote to memory of 3304 4388 net.exe 89 PID 4316 wrote to memory of 4076 4316 cmd.exe 91 PID 4316 wrote to memory of 4076 4316 cmd.exe 91 PID 4316 wrote to memory of 4076 4316 cmd.exe 91 PID 4528 wrote to memory of 3312 4528 Logo1_.exe 52 PID 4528 wrote to memory of 3312 4528 Logo1_.exe 52
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a1894.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"4⤵
- Executes dropped EXE
PID:4076
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f4248ef43978b9abee5a392ad8a53570
SHA1a76be5ee8ce18dcbb9beb7039ac212c33dcdfa8c
SHA25603bb5c0f3c63de1ffe74ef992b0b5445904095250291b9678f342ff684babf02
SHA512c43850d304970d194b548d384d31fc49afcb350bc6067f9eabbe3f7279c55815d600adee262b7ede9e86596b46cdac96756d5abdb305dcd854b96a0c6d165ad3
-
Filesize
484KB
MD5eb71a453ff4e8f6780e2b587b134d274
SHA1136c98801e46a204e79020a36737e13d1579609a
SHA2561543d9815dab4cd3cfa02ea1a18307fb35b4983759ab68b680de2cc098332cd3
SHA5126cd506093ce3abe49794e0f2e997451fdedc5a1bcabee8319b86b484d6b87bced6d5a41ff382cbd9a84362db869b4445e2ec0e959cc861dbf6d1b54e0c936c79
-
Filesize
722B
MD5392abaf11437023ded5ce0c55344cd09
SHA1aeddb1e2bf8df1bf729e93cbba06b2567080374a
SHA2567b3b85956b4c99590ea098a5d116ab47bae118313c66ebbe3f99d26ef4fe3729
SHA512e17ba96efec25f931dc6ca7c5b098a68f9af46efab7b12599e85bc3246e29d165548c68c223b89fdb6872e1197dffc789253067b38b2cae6e8cf546c2e3cd1ee
-
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
Filesize27KB
MD5827a092884efbae20acbaa713a5c87c5
SHA13edac2e7b2f1adc6701ccc14a99f8050e73eb7b6
SHA25677ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046
SHA51225943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731
-
C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe.exe
Filesize27KB
MD5827a092884efbae20acbaa713a5c87c5
SHA13edac2e7b2f1adc6701ccc14a99f8050e73eb7b6
SHA25677ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046
SHA51225943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731
-
Filesize
26KB
MD5934cdf8e20087ae21c328ff42ebb5cb4
SHA1758db62111fd17fd95c8afcec7f1f459b0b3e14b
SHA25608ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c
SHA5128cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c
-
Filesize
26KB
MD5934cdf8e20087ae21c328ff42ebb5cb4
SHA1758db62111fd17fd95c8afcec7f1f459b0b3e14b
SHA25608ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c
SHA5128cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c
-
Filesize
26KB
MD5934cdf8e20087ae21c328ff42ebb5cb4
SHA1758db62111fd17fd95c8afcec7f1f459b0b3e14b
SHA25608ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c
SHA5128cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c
-
Filesize
10B
MD50d897ff63d6d70834691031400f75fba
SHA11527f718ccce51339d233a1a409fbc4a27fe73d6
SHA2564ae6beff7729c454ddd8204bac0ebeaf452455e43ffb2e7e6fef227f1ad09169
SHA5126cdd19fa414b78c81ac442e75cb85fc7ec97444b80373cd4de0ca20b72f7a6a474589d44202ab04d7a493f2c202ab60951c51d031a4ff95f5a878fa93039794d