Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe
Resource
win10v2004-20231215-en
General
-
Target
d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe
-
Size
918KB
-
MD5
c7e520416ae7ee92a39190b75a2e0aa8
-
SHA1
5e022239ea66321e65b0d3c7a41702fc816bdf52
-
SHA256
d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2
-
SHA512
61a6955047484d9970efd88960cbb2a882c9974ccd3d71f9436c79fe30f7e0c5b892d51b9c16764bb936034bbf4e5f2ad31f3cce97b0e87cc5a81886661d54ed
-
SSDEEP
24576:k7uFZnJHW5GduFp8Zf0+JGtCGhdUsc3xp:k7WBJlut+JGUGhus
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3740 Logo1_.exe 4284 d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Controls\EndOfLife\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\sr-latn-cs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fr-CA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ru-RU\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Notifications\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\6.0.25\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-TW\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\es-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe File created C:\Windows\Logo1_.exe d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe 3740 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3864 wrote to memory of 4404 3864 d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe 92 PID 3864 wrote to memory of 4404 3864 d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe 92 PID 3864 wrote to memory of 4404 3864 d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe 92 PID 3864 wrote to memory of 3740 3864 d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe 95 PID 3864 wrote to memory of 3740 3864 d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe 95 PID 3864 wrote to memory of 3740 3864 d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe 95 PID 3740 wrote to memory of 1260 3740 Logo1_.exe 96 PID 3740 wrote to memory of 1260 3740 Logo1_.exe 96 PID 3740 wrote to memory of 1260 3740 Logo1_.exe 96 PID 4404 wrote to memory of 4284 4404 cmd.exe 98 PID 4404 wrote to memory of 4284 4404 cmd.exe 98 PID 4404 wrote to memory of 4284 4404 cmd.exe 98 PID 1260 wrote to memory of 2640 1260 net.exe 99 PID 1260 wrote to memory of 2640 1260 net.exe 99 PID 1260 wrote to memory of 2640 1260 net.exe 99 PID 3740 wrote to memory of 3540 3740 Logo1_.exe 64 PID 3740 wrote to memory of 3540 3740 Logo1_.exe 64
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe"C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aAC2E.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe"C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe"4⤵
- Executes dropped EXE
PID:4284
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2640
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d8dcf48f9b4ac454e3ef8ae758eed524
SHA1e0ee818544dad30115bfcf771beab678c51c86f0
SHA25644395a6da1a22b9548c535838249509ecfaacc4b0cde7e5db8e0e844a7b93a4d
SHA5124c0f8735de0e10b7230d8adf0358cf4ae7821a4f98b4c8f6e6c3f57fdd7b237ed1cc2061273f98caa888283ff4962f1859f21b9fadcd9d25ef0850e973af6651
-
Filesize
570KB
MD592a8e9c7a68c186b084aa771e3c419d4
SHA1a13484b718fd2ab399494db46db34de619fa80af
SHA256e2087d227aa42c07543098c095917dc394bac8d0cc2a5774e773fbd24faa5f77
SHA5127aab65090855b417a5b9be9d59ea8fc64b6367c715aa27f136ad5d31d32b2e833f25ee8dd4197a81780badf6d4eacfeb5736123df2e9b21e0e7e596d088bdd81
-
Filesize
722B
MD5f05ef6caebb44cfc81b10345bab30b66
SHA1c370b7a2dd3e68e2f180ebad33b192a954b48bf2
SHA256f951d337a3c1076bf7e678f16bf0a657fc5db8803d468c7a43fc5183f239f8bc
SHA5129007fee33d480df36e0abe3aece1797f00e1c0eed9059126dad17d7dba97f09683886cffe236883bf7bd7d658b87ce6744272fe7bec7d280e7eac718036467ad
-
C:\Users\Admin\AppData\Local\Temp\d798333cc1684976fc6b4a8948a93dc102f4084f85cb5c4f359cebcac80c54c2.exe.exe
Filesize892KB
MD5c1a6d28143d2a93d255c8f9212b09b3f
SHA159542152680d17d3726913c6b9269c644a3ea949
SHA256a4bfa67a001d7da06c01e5eb8dfb199793a9befd4f6af8b3aefe3bbe1c92f8d2
SHA5129ef48678b8ecff356ad3c9b2bbcf3df67fac9d31374529bc7113af23eaec9629e1ea356eb270e412321a6629b66816d3a0568a3672a9e5f861700aef46977866
-
Filesize
26KB
MD5e1890df15dc55c2cadbfdfc704d2be92
SHA1ec44ef26d8a5fce8186d3b3e4a24cdd58a5e7bc3
SHA2566792501c3c0083746dc4a1444a558151e021afa3e2ab1612ff6d4297b16618a8
SHA5122701c3c6e42d2523b485d8d1b18521e9bbda62ae2b42d7e4e59f425a1b4da6dda82fa8ac1ca419f8663e3d9eb402dff89679704cd39a681c1668499b4b0afe2b
-
Filesize
9B
MD5dee25c43c917307934bf50dd00d5b05b
SHA160a2c2bae4facebce85267e1824d9b4f088a36be
SHA25663fd9c0290bbae6042276a04417049ff5b7bfd90a95b33df666e252b80001b6d
SHA512cf67ba11732a6ed63789e272b783f66bcbddd78612e46372dc81c191dc9a07a8d264c4a397b74af8651e7d667bcea5f0c39bf4d9b074004b4bf469503df3dc6c