Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
Resource
win10v2004-20231222-en
General
-
Target
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe
-
Size
2.6MB
-
MD5
8b37dc8f3721f16ea530ebc711de945a
-
SHA1
3d47c97027014f7977d0839f448ba9d4bc2a1e24
-
SHA256
fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c
-
SHA512
a4ec5dcad0cbb7aa0883ee864b5dcf5472eba47208a551775db4a3d4e270d6b8afd0de3c44590c260b2b52ef667e5515eb737c1b9dac9c93bfd8c864f74eea3b
-
SSDEEP
49152:P/UmZmV7AEf88T1mn3b5GkxS9IaZ83TqUzbvgLow/KwyzGW4FIwxAvf/x/aPDTDH:0mYvf14/xQ83TiLQ5S09kh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1936 Logo1_.exe 676 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\swidtag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\en\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\MixerBranding\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe File created C:\Windows\Logo1_.exe fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe 1936 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3036 wrote to memory of 4056 3036 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 88 PID 3036 wrote to memory of 4056 3036 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 88 PID 3036 wrote to memory of 4056 3036 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 88 PID 3036 wrote to memory of 1936 3036 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 90 PID 3036 wrote to memory of 1936 3036 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 90 PID 3036 wrote to memory of 1936 3036 fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe 90 PID 1936 wrote to memory of 4976 1936 Logo1_.exe 91 PID 1936 wrote to memory of 4976 1936 Logo1_.exe 91 PID 1936 wrote to memory of 4976 1936 Logo1_.exe 91 PID 4976 wrote to memory of 2596 4976 net.exe 93 PID 4976 wrote to memory of 2596 4976 net.exe 93 PID 4976 wrote to memory of 2596 4976 net.exe 93 PID 4056 wrote to memory of 676 4056 cmd.exe 94 PID 4056 wrote to memory of 676 4056 cmd.exe 94 PID 4056 wrote to memory of 676 4056 cmd.exe 94 PID 1936 wrote to memory of 3572 1936 Logo1_.exe 15 PID 1936 wrote to memory of 3572 1936 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4853.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe"4⤵
- Executes dropped EXE
PID:676
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2596
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5770e80db366145f997b81f8040496869
SHA14d924c50b0c714b97047df34a0bd4adaf2de6a83
SHA256dccf1246394aab3657a9ebd19ebd4150b9420f438bd50e40aafbc8ac8d51ebdb
SHA512754b5ee9fdcc4614ad626ece4d684fdc2f4b20d5c20042dba268f4c7b1c913b2b707ac1903bfb85a79598975e4b6ab4eb508660a242cb9feb2196d6368a6ff8d
-
Filesize
570KB
MD51e01d1160ba6e43d35de151fd823151e
SHA1aa378c2982b0fa49a83d04e0f7bebfe1113fd4bc
SHA256a93e95c61e248218eb6cd565a920c93f42d33366e1615da351c5e4309ee9fa76
SHA512faf4fa464b333397505d0221fd5c31b4d9559f0880256f67dd52470d9add4c56386494fa0f233faace154ea022cd9f78e5a25f5335e2f62170e18edc9a09dbe7
-
Filesize
481KB
MD5d9a20f38778ddec5c48e2acde4956248
SHA1fe41d404f38c2d570cd55158524d450f5ed50da3
SHA256f39c91803fd8d891849aa7b16cd6f82fa4a3b0eaf12d6699127206f48dbf9c63
SHA512c879087690924c702a818643329c7c8c2fae5fae3d9a2c6b1c5eb608f3c899ba4bd4708cde9565e957b669c09fa8ab11ad289128bc5871dd85fe4fa90c31e4b4
-
Filesize
722B
MD54e69f01d157f7befd0bf566708b5be08
SHA12edac29ba0ee6b8180bdcd9e961b9e4abde636c4
SHA256da57ece2b203d64891321b279faa501967035cfd6af4eaa12fa681e412802d90
SHA5125d1c8810b0e3288fb3096a6397df3ed817c7da12d5748f4448d72deb1056e039e68f7a99edbf4f0e366df0251c0aafc234489f358cf93a303d17a3fca215a1a9
-
C:\Users\Admin\AppData\Local\Temp\fe1bb6a08679e1b678832ac8605a72d28a756747980fc0fecc5d1f19592ff57c.exe.exe
Filesize2.6MB
MD54a358dcc5f694c5b6ef1c864340e2b36
SHA1a3953dbb397a1f8f6eabc74d6bc7e3c02b05c2ba
SHA256856c881883dce3d2bb16eb63d29c5d73a648d9bc7981b4224d550d50bc2526a9
SHA512947c1b9570a8d3ff846a275226b883ad3766b25cc11afbe7d338e5c04089c814d2711f292ab8d1e373e50e2b583489695c9b89479fb5379220438d9efcc92620
-
Filesize
26KB
MD58758044db9fce67ea2ad542f86e69e57
SHA160cc4d25ea4e17f676e8ac8be10b9dfe2f7ed67d
SHA2560c91b552dc6db19b6711e32cb8c9c604b60dc9d674be06cccb6adf08b4dbd82d
SHA512411737be53feaef0829190b6610c729b925949bcc0b4a65063ab393acb1a92c577093e6377a373704ce54d27a593f2faddc23c80c660638f7c304a93f1972c93
-
Filesize
9B
MD5593130a35dad97776f4a5d8af38d4ec6
SHA1d3673081d997fe2057dd0e2ce152af5369692767
SHA256479ae218866e5c40d1a0e41c1e380e6c9be107e86bc4e465be1d87f77e5741e5
SHA512083d63f2813ea37e914a8764a32fd2953ed74c25690696007a82f4e55ada3fcaca8c362762fb114b101840c801a522aaac2ba958a8a66e3fb86e08ccaf5e73c3