Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe
Resource
win10v2004-20240226-en
General
-
Target
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe
-
Size
280KB
-
MD5
64c953c92703fc28866ecd9de1a00fe5
-
SHA1
25fcff0b3961e8af1dcdf7ad9dc2cd4429570027
-
SHA256
bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc
-
SHA512
c114295d238d9848d41e6e338758bb36382569bd84a66000d9e4978b7e650ab8500d5997d27bc200de0cd401e7397fa8ea0c94e93d67a034142433aaeb4d9a7d
-
SSDEEP
6144:YVfjmN3hfgI3FStrsHkaMaVXu8Mz4xYdr1e2MHVuYLt8yf/Y7OOby:C7+9gI1CsEaMt9A2MHVuYR8yf/YBby
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1900 Logo1_.exe 5060 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\tr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Velocity\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\cef\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\it-it\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe 1900 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1456 1484 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 86 PID 1484 wrote to memory of 1456 1484 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 86 PID 1484 wrote to memory of 1456 1484 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 86 PID 1484 wrote to memory of 1900 1484 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 87 PID 1484 wrote to memory of 1900 1484 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 87 PID 1484 wrote to memory of 1900 1484 bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe 87 PID 1900 wrote to memory of 432 1900 Logo1_.exe 89 PID 1900 wrote to memory of 432 1900 Logo1_.exe 89 PID 1900 wrote to memory of 432 1900 Logo1_.exe 89 PID 432 wrote to memory of 4592 432 net.exe 91 PID 432 wrote to memory of 4592 432 net.exe 91 PID 432 wrote to memory of 4592 432 net.exe 91 PID 1456 wrote to memory of 5060 1456 cmd.exe 92 PID 1456 wrote to memory of 5060 1456 cmd.exe 92 PID 1456 wrote to memory of 5060 1456 cmd.exe 92 PID 1900 wrote to memory of 3352 1900 Logo1_.exe 44 PID 1900 wrote to memory of 3352 1900 Logo1_.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a610C.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe"4⤵
- Executes dropped EXE
PID:5060
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD558583137fb33e7f5ec8519fb3db70ec1
SHA11c182f74080ceaa988f20d4bc85c73f3905b0ac6
SHA2561c76ee7ab780061c7f4541e04964fccb0fcbd3cbb84d30040c4e3a454b5bef29
SHA512a9e73808c47bf7118fbcb7389554d74c12ce8bf94c49973105ad8cb967c8096b4fc0cf6acd79cc9c9bc37a2137971cf3196e18a5eb6f5fd8e7255b537653a6e2
-
Filesize
570KB
MD5a470383c1244dafb0b187795fa6923da
SHA156d93792e1912abf9379165b68b6fc61693d9040
SHA25612b51cdb3b909bb11c4800c730551dd06f5195afed79cf9b852b1f1e8bc2bac7
SHA512a3a47f60d404c392d200d1d61ceaf4ed94be4d7d21b36d41e9d409d991a3c5ea9be811991351e16d1c09504202dcbb6acde1675e178d2a00ad8475b45bde3c90
-
Filesize
481KB
MD51db5b390daa2d070657fbdb4f5d2cc55
SHA177e633e49df484b827080753514cc376749b0ceb
SHA256d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad
SHA51268aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617
-
Filesize
722B
MD5d979fd4fac675453c7adde12019535c3
SHA17563a09479d60933a56d0423b3decf1f77844ae1
SHA256ee6b6d58f1a59bbf54636f3ae9da708bfee7ae6fea88a019114e5de9e362597a
SHA512b9ea013fcf20b353577894d0014b011f6c682fb904a83563f07f2673684ed509f18046ff63859cbbfe0f414b60aad18067f79a0ba6b606166a2ecdf5cd39b18f
-
C:\Users\Admin\AppData\Local\Temp\bd9fdd834dc3df529b9ea1ebcdcc8715f2007b65e2636a7acd59ab343cbeeffc.exe.exe
Filesize254KB
MD5ce786255b793d4ebac5a747eeb5a533c
SHA13b1fc92b85c299a294caae8e03233e1ff8b02182
SHA2560b45fa2a1937577f8f7ec7a3ce5b551b24f8667a2acc931ef8a9ab2431e4fde2
SHA5122e1fc219178d3d10688e52f0b7ffb85c8692812c6a71ce7a4dc40d85c2b0cb6ac43486b55be773e422e904e0061e23050aadf22545773e86fd14ff14cb3fe9e2
-
Filesize
26KB
MD5b26fe27da346b21618f04de09f49dee0
SHA1184aad805734f70443da1069a04d904612374c31
SHA25697a053f33da11c280120eadc555c6c55f73ea83392b6bf0b1c853cfd104cd26a
SHA512d4130806c36d8043016d59ad0ae3d29dacd2830772ca067e776dfaf046a00f767c998e60119aab6360a677d9a1aa50498a57a0f0a23b135abbafbe1c6165bf3e
-
Filesize
9B
MD53ad36c5dd75f198f45a8fb7f0de29a8d
SHA1e07726e5226c9504d995d8bc85b4e3820ed76db6
SHA256f45cd1a6b8de9f9bd4d34cde93bd7221a0e7be28281690e646faac9a77cd77b7
SHA5128a285b5a07fe1749dcb89935e8200119c9bc3458685c2799fe743a5779655ce5c51ee303626d5afa7ec5fe504c9e93628c6782265cd6d1c0f2c631116c2e0f42