Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe
Resource
win10v2004-20231215-en
General
-
Target
ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe
-
Size
122KB
-
MD5
85c3c4132983eecc44905bfc16cd7b99
-
SHA1
bff716a66d4c69bc50d749c0668a7ec53a03bbe0
-
SHA256
ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1
-
SHA512
6b44a330a68c1717422bfa69ecb5dcbe3d71696ed9fadde36adf3665a62dfa6cae3245db9c5980b29dbca6ca0ecb671741b304d83fb447a9ff6006464c467101
-
SSDEEP
3072:vftffjmNoxCoFHzg2I0PpPNX6RLXWertCQyyNU:XVfjmNiZzhPpPNq6QyH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2072 Logo1_.exe 2220 ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\tr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\FileAssociation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_~_kzf8qxf38zg5c\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Videos\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\es-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe File created C:\Windows\Logo1_.exe ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe 2072 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4496 4672 ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe 88 PID 4672 wrote to memory of 4496 4672 ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe 88 PID 4672 wrote to memory of 4496 4672 ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe 88 PID 4672 wrote to memory of 2072 4672 ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe 89 PID 4672 wrote to memory of 2072 4672 ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe 89 PID 4672 wrote to memory of 2072 4672 ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe 89 PID 2072 wrote to memory of 3376 2072 Logo1_.exe 90 PID 2072 wrote to memory of 3376 2072 Logo1_.exe 90 PID 2072 wrote to memory of 3376 2072 Logo1_.exe 90 PID 3376 wrote to memory of 5092 3376 net.exe 93 PID 3376 wrote to memory of 5092 3376 net.exe 93 PID 3376 wrote to memory of 5092 3376 net.exe 93 PID 4496 wrote to memory of 2220 4496 cmd.exe 94 PID 4496 wrote to memory of 2220 4496 cmd.exe 94 PID 2072 wrote to memory of 3432 2072 Logo1_.exe 56 PID 2072 wrote to memory of 3432 2072 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe"C:\Users\Admin\AppData\Local\Temp\ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aC861.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe"C:\Users\Admin\AppData\Local\Temp\ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe"4⤵
- Executes dropped EXE
PID:2220
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:5092
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD584d7664b6513487e67ff6e97c25a9577
SHA1dddda4c1e13491cbc90b03c513cfa090376d1f5e
SHA256bd32c2546f43a671fe5fc5557c512c8413e6289a40438b8cb0b684de1c083c04
SHA512ac2d0e84afe85334a338d15ab7045ed2b37c3031886de1022dc41a45dbf8b243bc12f6c8430dd5cf16b185c2050dfbd68fe94598f212e228d5c680b0fbbe5eef
-
Filesize
722B
MD5d449c57cb55e4e2ed9ab4d1c92ba0507
SHA187d82c960594478f5681aa10ef12d4be31953ce4
SHA2567d0ff6ca056fceb0bbdb3d32db4a469ab557f1acd7ace45a16ac8f068966be3b
SHA512717d5a89c515827b3fbb5f618f9febf28e19a1c859445a29702e69262f349fe2f9e575c652c2a31e5763573fe0c4da315fdbd603cc33772640a6ffa9d3a38005
-
C:\Users\Admin\AppData\Local\Temp\ec9bd2843b752a5359dae58470fd8b2a7460e1c887927201f8d04f405b9892e1.exe.exe
Filesize96KB
MD54f777a9f156035ab4670da6cdcbd651c
SHA178b6f97056e6d5674bbcb94f13c4bf5527319c02
SHA25677a8efbcc5e81e9534ad80aa2836105491f015d8a7355d0ba960f8fe5df3d0c8
SHA512244dae23bcabfe4f7bcd10af02f24f88840fd91defd989cd39ad8a7ea4cb2829f9101e966a8d8ff95099269461afef587c7f8008437d8c23a91fee08acd33437
-
Filesize
26KB
MD5f16501dcd39f1333a1c9407f12f88067
SHA1f87c876feed9062f7520ab0a1cd52f112965ed8b
SHA256f33e493bfd0802bd14f44f33cd1a19ee0026d23359d6f13074715f44667cd1c1
SHA51216ac93e41ba6f14a949c0725f38b72c4f248a591615a1caab90ada577e65560fca3cec78b179f08209a8967db949784e93830937b90e1fd1018cc4663452bbe9
-
Filesize
9B
MD57f808734d303ae0442efdfce3344deee
SHA1c814ffceeaadd0b7d41254ebf9698895924d5d42
SHA2565b9baea2f17425d3edf9e446b467d55f39d41faaa8dbb351fea88b88bd20e79c
SHA512b0278d3f79e4d8101351196b056c29a03102cac7fce93ba755156b1706ae505eeac237f0febff2718603707499b9ace1dc9dde225230e11c875ab55471ef4e9c