Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 09:37
Static task
static1
Behavioral task
behavioral1
Sample
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe
Resource
win10v2004-20231215-en
General
-
Target
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe
-
Size
104KB
-
MD5
8cc1d6c72cc4cfd9c50f350813b2cba3
-
SHA1
ce417c2563c93772f42fee53cca7e86fef518b54
-
SHA256
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332
-
SHA512
0d6e39ce05ab1ef45599ecc1a1088dba0aad8605ab9f5b6727a70e9e265c02fe3c31a2e2da3671ef1aa51824f7edefb7ea2fd97465170cd405029208726695e3
-
SSDEEP
3072:QftffjmNruuKxHSbz07u4zjJY251dZmxq4hi9ezOhu9vPt:QVfjmNAHSb45dZWqdezOhI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4428 Logo1_.exe 4604 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\xaml\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\fxr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe File created C:\Windows\Logo1_.exe 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1036 wrote to memory of 1448 1036 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 89 PID 1036 wrote to memory of 1448 1036 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 89 PID 1036 wrote to memory of 1448 1036 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 89 PID 1036 wrote to memory of 4428 1036 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 90 PID 1036 wrote to memory of 4428 1036 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 90 PID 1036 wrote to memory of 4428 1036 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 90 PID 4428 wrote to memory of 2984 4428 Logo1_.exe 92 PID 4428 wrote to memory of 2984 4428 Logo1_.exe 92 PID 4428 wrote to memory of 2984 4428 Logo1_.exe 92 PID 2984 wrote to memory of 5052 2984 net.exe 95 PID 2984 wrote to memory of 5052 2984 net.exe 95 PID 2984 wrote to memory of 5052 2984 net.exe 95 PID 1448 wrote to memory of 4604 1448 cmd.exe 96 PID 1448 wrote to memory of 4604 1448 cmd.exe 96 PID 1448 wrote to memory of 4604 1448 cmd.exe 96 PID 4428 wrote to memory of 3472 4428 Logo1_.exe 53 PID 4428 wrote to memory of 3472 4428 Logo1_.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6EA8.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"4⤵
- Executes dropped EXE
PID:4604
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:5052
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5e075d6f023b7cb10033019a8de098f1e
SHA1e9803456c485c4c47936d5c305b8ce82742cc986
SHA25694151a22a001563daa308189de19e39a15b37575c63931214e7e2491a2208138
SHA512038a9d76c7b2bac8a0240007772f6cbd3f95a6279608e76b5c1ccae0ff856a98ba16181c74d1e80d581960212324c5b27e87c251127bcebd9de54d5c4ada788d
-
Filesize
570KB
MD557250ccd5e5e346baba4af1c6c626b65
SHA1be61f0ce53d06c7db09a93a783b722120f70a43d
SHA25616c2700b93dc82f95448ffda8ac2e873641275e479a872e3fb969424193fe35a
SHA512017992a9d92d606acd2c75c359aacf909aa512990e8c409cfcde0e8f3b28b177b5cb5b8bd0f07d940f536df9e3d6563c559d200886b10f6b207dd1c027ffe353
-
Filesize
722B
MD56129e758625f6f3569dc38579edd81e8
SHA1fcbb974bdfb03a5049c335f2c5c93c06f4e596b7
SHA256cb99af86ff7212ff9296a87310bf2f059cd6fc9e7ecfaa4ebc94cefe75f04645
SHA512ad3c0992e4464e178b3f2fa25908d174ee854a638a7429afa72c121fcaddc14f9b0259cef917ce1b4df890f8f9e194cdf6dbd9e98e2c49eba52d146e08b9e1db
-
C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe.exe
Filesize78KB
MD5b82829adc9cfa9931fd90db4c064fa42
SHA10a717fc3f7ef3bd6fad81a358fbfd629a07da565
SHA256b811979578ed2fda03e2537ad221d6861ff5e425c11d34a20a4b24bf508fcaf2
SHA512c09a8159b661975cc5e9be6de12e40592c208f7e0ac99481e2be86ae705c3f8c475a885461da4c01519b9cb17187c2cef0de8b9620c633ac7fd5a86d313c4023
-
Filesize
26KB
MD54583153f094bff89d91f62da9f4b0345
SHA16a195668b1548bf26c3860c0ead4d87d0c53e82f
SHA2562cfdad99035f50d6b9cf9a29d8b5e9e7611421a6f2c6d65f70124b18bb99372d
SHA512c308e29361a53bc172b3ad7e2a65bf6eef0146bec262e59110cae001047765ad666362deb5fe323cfea236ebe9a6c3355413db465b2118fd4f538e8468365c55
-
Filesize
10B
MD5157dcc32271e1367e7e2dd14aa27e5a3
SHA14971ce85072488f8136ba098ba71b0e6b45e221a
SHA256763de86e71d2e922753efeaf737c37f65f77f3fdef2ae784faf43ffacf606ec8
SHA5121c6e4cbf451952cdc047759d933761ae156643f6b7372a95f1a8e3739aebad946e6b1916dbb77d786316456419357d9f358034a8750e2c96938d8c915ecd46ed