Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe
Resource
win10v2004-20240221-en
General
-
Target
9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe
-
Size
65KB
-
MD5
05519e4a69513066aa4ffb59c85de4f5
-
SHA1
c567d3929cce4a8a87840c59b765e49566d07609
-
SHA256
9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0
-
SHA512
c7dbfd4a2bfeb1ab297dc6805228ff92ff734ff5925aec3305a1c4749d506faa8e74e23e9f76b4ad01689a121bb2a26d388ce78ab6823729dda2fa283e7c7e30
-
SSDEEP
768:91ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLScTJelfnkDei50rW4NL6U4ccm8VzH:bfgLdQAQfcfymN3QxnkCi5AHN7QlGp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 440 Logo1_.exe 3572 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_2019.716.2313.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Microsoft.Xbox.SmartGlass.Controls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.183.29\MicrosoftEdgeUpdate.exe Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\xaml\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.183.29\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Calculator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\el-GR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\et-EE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe 440 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 636 wrote to memory of 5000 636 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe 87 PID 636 wrote to memory of 5000 636 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe 87 PID 636 wrote to memory of 5000 636 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe 87 PID 636 wrote to memory of 440 636 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe 88 PID 636 wrote to memory of 440 636 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe 88 PID 636 wrote to memory of 440 636 9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe 88 PID 440 wrote to memory of 4404 440 Logo1_.exe 90 PID 440 wrote to memory of 4404 440 Logo1_.exe 90 PID 440 wrote to memory of 4404 440 Logo1_.exe 90 PID 4404 wrote to memory of 2132 4404 net.exe 92 PID 4404 wrote to memory of 2132 4404 net.exe 92 PID 4404 wrote to memory of 2132 4404 net.exe 92 PID 5000 wrote to memory of 3572 5000 cmd.exe 93 PID 5000 wrote to memory of 3572 5000 cmd.exe 93 PID 5000 wrote to memory of 3572 5000 cmd.exe 93 PID 440 wrote to memory of 3460 440 Logo1_.exe 36 PID 440 wrote to memory of 3460 440 Logo1_.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe"C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB815.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe"C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe"4⤵
- Executes dropped EXE
PID:3572
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2132
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5fa7ae05cf35d71ba680cd6dffd53ba52
SHA162f31b701a2fa16061ee2712ad5cbc6417d916d5
SHA256b9f83f9956111e5e0776d42aa1d02b9e8b84d3dc3306b2204e53b47ed028db4d
SHA512ee9e5fcab10c628a6c3924fb49dc9cb3a7e72f8b8d9f3da93fd80716b1d5b64b94ee7b41d60940d3a061ee3fef0fa2ffcb1fe73073a7a034a0ef58fec4de619d
-
Filesize
570KB
MD562617ee8c33c17e7e5156826cd46f2b9
SHA124c2f8bbaa4ba184e7800e419c420ab6849ab64e
SHA2566cd8cd3d810f6782b31e24c5f160569fcd4300c3ffaabe3af5cba9e285aeadb6
SHA512e906ed6e83de7c3bfe148475ad552d6df5c2b678976d81227ba9e0a0afc8c52ec59590270e20dea28c900b1fe68d9e04cd7c9faeba937c06860a45b3d4e20591
-
Filesize
722B
MD5da1451fbe7679f42edbc5571bc8f9731
SHA13f3d9d1dd0f4c175f2153721888757cc813bbadb
SHA256690609a43e449e4372c3bb000c7241f073ce1040bf86c6f1597eea3876934a03
SHA512b5def8bae24b93123436b37e5c0f177fd3eb1db87621f628e39c0d2c132e5b9e73952db409b7c39b544c1cf78610296803c7c9a4be66d6fce0b062a776f52e85
-
C:\Users\Admin\AppData\Local\Temp\9637f87e99b36fddcfd1739164c7b87d1548cdb730d68c3c4a03b2ff204ee5c0.exe.exe
Filesize39KB
MD5e1ba4837d11007ae1866d0527cec1cde
SHA12e0da0891650399be9534d4fc3d4c06a3f28bb52
SHA2569eedb873d71b3c8497758d104341a540f62bd91188f3666c92308138942ed68a
SHA51244f71205f5b2358aeaa954496546913ae39c23fefa6ce28a9d0928202a5c6336ea129f0dbbc0bfb7dd2517bd98beb1fc044e8631623a1324be56c1345d2d7919
-
Filesize
26KB
MD5f878c3e002fc64fc029d371a5c5bc1d6
SHA131b5ed73fba38414f6626c786565fbb9ec698d8e
SHA2565a43b8da19ec861695c81731883cd5d0871b2bf5490b2647747bd0da8a02718c
SHA512bab67eeab6e63536803e8838d9e4f987f2258939aaac0ad0d8bca4a611a86f9855d07a49a235cd3a93831cd41a13d5e6548c79a1e15989e04d448972bed1f311
-
Filesize
9B
MD5d69146fa3f15be895e219a620fdd153b
SHA1fa21485227046ccf2d7638b4236f749862dd4b64
SHA256406651396485eef0c407fc8241aeaa805a311294cdf7abb18ca20e8540694652
SHA512b0509216c0bd6ad432374c98f3fc2f2919d9353e4bccf510b20e0cbbf8a0fdf77ccdeff786df0305f83f22865794cc675537e51de5a1478fc8431999566701c0