Analysis
-
max time kernel
158s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2023, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe
Resource
win10v2004-20231215-en
General
-
Target
5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe
-
Size
240KB
-
MD5
bd982c42ce5b35176c0152da0489ff92
-
SHA1
7c09dbc7f889b63296e84c54f447df8c866df726
-
SHA256
5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742
-
SHA512
b68684002df3b01c262dd763cd9308ff4670d2f1f8d27c400a01386d446f90d2593616b82aac5bda09a47001a9a3fe598ab83b8389039e9a0996dafe12e6d278
-
SSDEEP
6144:RVfjmN6Zu82sMVU6ChCWzBx5O9tqVROmD:H7+6osMVcDj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3756 Logo1_.exe 1164 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-high\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\ModifiableWindowsApps\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\cef\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ms-MY\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.MagicEdit\Pages\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Notifications\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ar-ae\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe File created C:\Windows\Logo1_.exe 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe 3756 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 408 wrote to memory of 3600 408 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe 88 PID 408 wrote to memory of 3600 408 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe 88 PID 408 wrote to memory of 3600 408 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe 88 PID 408 wrote to memory of 3756 408 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe 89 PID 408 wrote to memory of 3756 408 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe 89 PID 408 wrote to memory of 3756 408 5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe 89 PID 3756 wrote to memory of 3608 3756 Logo1_.exe 90 PID 3756 wrote to memory of 3608 3756 Logo1_.exe 90 PID 3756 wrote to memory of 3608 3756 Logo1_.exe 90 PID 3608 wrote to memory of 4208 3608 net.exe 95 PID 3608 wrote to memory of 4208 3608 net.exe 95 PID 3608 wrote to memory of 4208 3608 net.exe 95 PID 3756 wrote to memory of 3372 3756 Logo1_.exe 44 PID 3756 wrote to memory of 3372 3756 Logo1_.exe 44 PID 3600 wrote to memory of 1164 3600 cmd.exe 96 PID 3600 wrote to memory of 1164 3600 cmd.exe 96 PID 3600 wrote to memory of 1164 3600 cmd.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe"C:\Users\Admin\AppData\Local\Temp\5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA9EC.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe"C:\Users\Admin\AppData\Local\Temp\5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe"4⤵
- Executes dropped EXE
PID:1164
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4208
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d4eb69952bdefdeeeb62b61d98b450fc
SHA1906cd329656f45c57c81f2de1614fd9ce7ace777
SHA256a8567b36add750b3d72e00b0123121a0352ee830af2e54563b56d13633a9551c
SHA51268dd1d8ef0b47e0c5bcd78b80b3e4606d1e3479d331c417e2ef7d7cf2d8d2c528bf758edaec306610966ab7a201d007e7a304a8812a1bb3a930a953a35a295a5
-
Filesize
570KB
MD515a01d41cfa2be8f6361821e37b09cf8
SHA1b104aa402a5ada78c88da49aed88439660fade1e
SHA256d753050137a73056a24d5eb54b8d9374dccdf4f817196927ed050985d433409f
SHA5128cde516de864b780daa7a0a697d9a315020c59eea6bec1e0e9235d2ac4c1c7d2c700792dd72dc89b53432ba1ca8b9c2716c5376f22430ed4c4e598bb09f31741
-
Filesize
722B
MD57aca281a45244519404bc6905bbdce02
SHA15e22d0a1ab1b1a732317b2a5b7adcc7eb9bcf8cf
SHA2568eb089471eb7d5e54eeb365ce2ddacf5f3e7b4d5355ac386c59c10d90a9dce7c
SHA5124bfc1b52c5229e3ebf307b26d65fdf15b7a6072fea65d8ca6a39f64d88822d7f486776931f32436bc5763f9a6e0d1dd57b109d009519ed8469f556fce487b731
-
C:\Users\Admin\AppData\Local\Temp\5ba6eb5d73e8928771f77e4a0453efddda3cc088f01cb5b1b65a5480edb41742.exe.exe
Filesize214KB
MD5f34895c892772b1b653221a7cd0f8edc
SHA12ee60227fdce7127a8473c3d9f4a4d0b8b405749
SHA256eab8273e7137f29f17702530aa5654dbf151054febd083c48d0dba70c1621de6
SHA5129fa8e9ae928ae1c4162542259a6e395bf77227cdd0c0f6a38f46eae3e6562c1a8300fbe22411923a206dc096dc90c0a4d7411d9101991c13cf281783560c3956
-
Filesize
26KB
MD5e67637261e90adbe15b65425844fb7cc
SHA15f89461c62efae1aad2b44e4358a56b23e0e5c26
SHA256e0666433cf25a66f296d7471ce0b76e1caba434a9cc489a774b907d302ac17a6
SHA51205c75baf794d0053692cdb57601bb7c9dc1c604c4d25d3b9f965f1c0e62b5dd4cda805f8b55075e21da1e41a225edf0c1a58ac527afd55c0558f4a6d64bdafac
-
Filesize
10B
MD57ffaa74dcf5b57082a43c17464e10782
SHA1c6cf002ebb82e54cb14553d044f6c61463b369a6
SHA256b3bfda52765f0ec02320ef68e5fca5e0d4bb61e1ec6f062430a5711a41c1be65
SHA51235ef0f681e44781b5dc20e179918be9dad7be2029093f9537cfe30bff888bc875ad32e6bbb59294dc36779829bab7aa6ebfac9e93c6a1ef5e4e7ddde85bb6de8