Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe
Resource
win10v2004-20231215-en
General
-
Target
da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe
-
Size
101KB
-
MD5
b04235b4ae92d1767f2f7fc1d9a57c3b
-
SHA1
cf8f7b2ca9aa6997bff7667ee1fff95481ada42b
-
SHA256
da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068
-
SHA512
fb4c24bea5a31c7539a943278d5d6d76333d339580d1b3fc01d8264e3ab6cf13d68b8b915e40d2aba58abea6e728518e9831d202fc82ff9852e74f3e85ae66e6
-
SSDEEP
3072:7eftffhJCuU1GvE4pL4zv2NL6sRe5lxe:CVfhguCGvEaL4z6Re5S
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1108 Logo1_.exe 2436 da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\az-Latn-AZ\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PlaceCard\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\cy-GB\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office 15\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Deleted\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\offer_cards\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-us\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\nb-NO\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\2.1.15\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\ka-GE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sv-se\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe File created C:\Windows\Logo1_.exe da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe 1108 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1428 wrote to memory of 5036 1428 da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe 16 PID 1428 wrote to memory of 5036 1428 da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe 16 PID 1428 wrote to memory of 5036 1428 da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe 16 PID 1428 wrote to memory of 1108 1428 da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe 24 PID 1428 wrote to memory of 1108 1428 da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe 24 PID 1428 wrote to memory of 1108 1428 da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe 24 PID 1108 wrote to memory of 372 1108 Logo1_.exe 23 PID 1108 wrote to memory of 372 1108 Logo1_.exe 23 PID 1108 wrote to memory of 372 1108 Logo1_.exe 23 PID 372 wrote to memory of 1884 372 net.exe 21 PID 372 wrote to memory of 1884 372 net.exe 21 PID 372 wrote to memory of 1884 372 net.exe 21 PID 5036 wrote to memory of 2436 5036 cmd.exe 19 PID 5036 wrote to memory of 2436 5036 cmd.exe 19 PID 1108 wrote to memory of 3472 1108 Logo1_.exe 55 PID 1108 wrote to memory of 3472 1108 Logo1_.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe"C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4798.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe"C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe"3⤵
- Executes dropped EXE
PID:2436
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1108
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"1⤵PID:1884
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:372
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD552d4dc15c2ac290bd7d8f5c88ea1ef4e
SHA1a82a1d61cbb7a7a6693386e0c85c5b509c4019d6
SHA25605dbcbb2ce2995b620c7f08bfc0e2d52bfc298479611d44ec8c9c50ca030cb72
SHA5126d164e78fa73b899a6a1a2295de910e015408672253b4e71b772791af6aed0e5ab3149a17ab53f185671ea7093a891b1725c9c47befeabc5af5e585edc139a3e
-
Filesize
570KB
MD543e285bdd6e5d3eb8ff21209d770de17
SHA1b8fd2a62bc4336fe08fb219f1d7343e06524b212
SHA2566372bbcf2d57bfa4b6c49029a83c882db6fffb9a74c3838eb108372cb353c11b
SHA5127bc5bbfc14b73e874204a3517ca1a58e13031c68cfdbe047bd812ab9945f94952b4fedad292ba3b0027ea007470ba33f8157791bf6aa966d6766ca001c3fefcc
-
Filesize
481KB
MD5e4a3af2bcbb38195944f3167e6909804
SHA1063ec129648c36b23d2952e6676485859c974bcf
SHA25661975168e81cca10a851d5ab360009e25b3ce0cf11d5d357fa709a418db85354
SHA512f21e6f17e3cb82a70fb2613e2baa76695bc15113eb809178f98017578b1f6578d9da2547558790a640b811b5919d10792b81f34bc5cb7694a4e2b16f1d72d630
-
Filesize
722B
MD53c401f7d1b9c334f3ee3937d2cb70a9a
SHA1e2799545109f758ee688e31a3968c2a08d1413fa
SHA256373a21c08906831f0cc8e9fb5afb9f1ca49cb1160f2b0ad3626c29c3e4562e8d
SHA512105e916f62a455c6b8923f11f6bc6a3fafc134d3f2c05f7318c0fd1f301651647e7d2f7a08598ced93f360c16b9eec451da113ac31ecf7a0e5350e4cb15a1680
-
C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe
Filesize22KB
MD582e60cd2b97cb26585ca760aa8065bb4
SHA1b55b2e76717d806e589fcbb4a4973d51155fab8a
SHA2565752ff2c6826f8a51fade404a894e3de65abfe7ce1e03610bae9bf5b64ce50da
SHA5124cef4c9e2e2d2c2f8c2d10537071c095634345530cae162d3027958d138ca086d1bc6365cb3607b1af211e5a345a4782c6370710d0b09da66854ef163fc79e67
-
C:\Users\Admin\AppData\Local\Temp\da974231098bb1dd2ca19fc806206d27a48ac5958d42dfe70c652d4c6d0a5068.exe.exe
Filesize25KB
MD53a3e8464237a10f1d9766d4fbef34273
SHA134898cd95900746a05b2ce44674ad0dc99b1e718
SHA256b0de3fc99a468209306732387fafeb8e31c90a07c4c2edcfb371fa5988a77ae5
SHA512f297e784da87db99c912cb6e076b223cc9aa215f9acc283d274b9b3209476fe9de608b37bae23d456e94597b6a81313b711213e08e91d32d5f4d6eae77ac55f5
-
Filesize
26KB
MD53b87ff58bc104133916a7a30d3003760
SHA1b9d39736d9659661bcd169f5792cd967f0ee430a
SHA2562dea75339ef8773a1ba61b233c4d821f93a4eba1f7b1f776824acced8beec0ca
SHA51230188c4d34cfb2b0017fb6c599c06aee4dac13cb6c4de52b08ebb3ee083791079a1e47d5f94f7772a5fbfd86fef3ddae55ba5e6dca0eaf1e61ed4b87120a8b26
-
Filesize
25KB
MD599cd5017ef8957522b017952f9c79e06
SHA16717a42b3a4fc64e5c3173a5bf251b6478b1d03d
SHA256e4033bb72e013a7aca48b7e44e4df7b78ef690564d9002af8e862ad00e2cbf78
SHA512b8e6cfa0e8d004b38a087fad5f70238209d4a849d91bba17c39276e13429c218c79e031182f7b6ad9917302dc4e359a6fdb11cdbfe7c20f1993eade96947f77e
-
Filesize
9B
MD5242aeb786105d703ec823e385bc6cb2a
SHA145c2b23f1b7d645e7345db310cb2d031d1670bdd
SHA25674a26edf9895f7c6b0ecfd584a1aed3599749033a1f2388408f7f3c01eaffb4f
SHA512d5006543b2a0244a9f3962dc17d760c1ebf707f958d677cb73e3063c0e6b7e59f6a2516ff5460cde828aa6685a4cd6721274b41fd8bfdf3fabec777fc3c94006