Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe
Resource
win10v2004-20231215-en
General
-
Target
57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe
-
Size
2.3MB
-
MD5
3dc9ff73a15fdbb7e82ee3b7701460fb
-
SHA1
575b04b09be3a58d1ee9338ee7c0180a8680695c
-
SHA256
57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4
-
SHA512
739aedae88e0ffa6df1f6c4b4922d2c3bfa034434f1ca0dec44699065e0ede9610d34ac34f54a52429784a3816ea2492c8a2332acdcddaec2815273784ade5de
-
SSDEEP
24576:O7wYYoB/QR2WPAFNpszLFxJ9MqeIlyPVvup2gO7lT5Msy7z1QgOyKKsd8Jbt06uk:O7wK21BLY3lKsSzWdy/JbhMJJt9wQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4936 Logo1_.exe 4036 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\CoreEngine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square150x150\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\et-EE\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe File created C:\Windows\Logo1_.exe 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe 4936 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4412 wrote to memory of 3224 4412 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe 84 PID 4412 wrote to memory of 3224 4412 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe 84 PID 4412 wrote to memory of 3224 4412 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe 84 PID 4412 wrote to memory of 4936 4412 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe 85 PID 4412 wrote to memory of 4936 4412 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe 85 PID 4412 wrote to memory of 4936 4412 57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe 85 PID 4936 wrote to memory of 2156 4936 Logo1_.exe 86 PID 4936 wrote to memory of 2156 4936 Logo1_.exe 86 PID 4936 wrote to memory of 2156 4936 Logo1_.exe 86 PID 2156 wrote to memory of 3512 2156 net.exe 89 PID 2156 wrote to memory of 3512 2156 net.exe 89 PID 2156 wrote to memory of 3512 2156 net.exe 89 PID 3224 wrote to memory of 4036 3224 cmd.exe 90 PID 3224 wrote to memory of 4036 3224 cmd.exe 90 PID 3224 wrote to memory of 4036 3224 cmd.exe 90 PID 4936 wrote to memory of 3572 4936 Logo1_.exe 40 PID 4936 wrote to memory of 3572 4936 Logo1_.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe"C:\Users\Admin\AppData\Local\Temp\57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a881C.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe"C:\Users\Admin\AppData\Local\Temp\57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe"4⤵
- Executes dropped EXE
PID:4036
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD56a01463c2a198fa554a464b29ab26d46
SHA1be0585bed6196d4516fbdb94ffebe968bdd47a88
SHA256f7ce6c0f3e4730d663e769b43a8e12f45e700467f97c6f10a3bd15afd90f3505
SHA512bdd7bd3069877b600a34b7cc5dcbb012ddb17793bfdc1817918e53bc35e166af727fce184a8dedf90f324eb22b6b6a4737e1ab1c273a398d5b7c84de8a7719d6
-
Filesize
570KB
MD59192a33b5f97df2fea7505a69b2861d4
SHA12db29ce6c3e929cbdae6850a7f15d6131214ef75
SHA25650a81e56ce96af82cfce1a0a031518f9a1bfdf98fda22aea26b6ea2f95673d77
SHA51263195fe5da56943b583f339c45be7a1d4f7daed40ce13bd73231791707bc131dfb021b294dba90d3b23bbf753024d228a95554753b80aaa8773623eb98917d30
-
Filesize
722B
MD532794d9375dfacde4a92bb15531472ec
SHA18400935b71f02896a12e7d2cba3133f5061f5dd3
SHA256ad43ab63ae31b835c4b180f86e3395f2a52a220f25de2a6771a3db0ca6a672ab
SHA5124a18dfdc25ea78281b2c854486a2ba49a106620cf4e1fd25f0c3accec20017b40c1b3b9130a572a854d427fa99b5c0734d0d4120f98b4c59fe559bc1d41f83ff
-
C:\Users\Admin\AppData\Local\Temp\57190afea6f5a7dadadb71e53fdb52ed414f0349cb0c336e7c140902b9e922e4.exe.exe
Filesize2.3MB
MD57639c8a7d15680777f15e9180224e0ba
SHA14b4aa749ac518d5ed656f907385ebb72f698bcad
SHA256f0cdeb69bd51faba35a1821c5715ed0d72beb6ab3b08eb42a3838be1d8f39d70
SHA5124b4d21f6902da15ae2806f567dbe7ffe2911822567cb4f8c8541bc2436f0e429a8821c5188393317d49195a7951401674988d658040c5203ac5e7b13d731f8f9
-
Filesize
26KB
MD525a486dcf2bd3b8f9e7cd7e801079f62
SHA160ba05537abab426c5d051d04bf5fd501d070914
SHA25613addb45c988b23137e51c404bc5416ac149374f13eb7bcf21f2e93b8545267d
SHA51214343a57186230975ad5699f5947179d4829e89e91dd527ad283acd630aa6817c13b4eb7a5f8084ea6b776dd561d008370129188d4eb0a5252b1bfa8746ea718
-
Filesize
9B
MD5b347a774e254ac3f0d6aaea35544ac50
SHA17f332d15a7648f7a698b3068a428811361f4e9ab
SHA2561ebd1b85bb264260df3d9fb0a2062b29199c7b6137dcc98486874c1d257c73cd
SHA512ce8615c90c8794f0aefeb0c6ce5da126732695e6be36b5e625f3a073d55c6f8cd88ca465b07e2c0e87355b5baad887a3f0b26c4eb262484a83d35565e72ba138