Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe
Resource
win10v2004-20240226-en
General
-
Target
a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe
-
Size
122KB
-
MD5
e292335dfe1304bc4ab6caeef0234409
-
SHA1
156a37f9c299a5c3dac7ee2074a30043303e8d98
-
SHA256
a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f
-
SHA512
4d3c00a77a73de473386b6d3ead7163c68f4a82dcc4e0409e4d6ca035334f0702d23bc20d20c9ce35db66f2b3f03403a0c81eb2cf38633c1d28f7e09c8ca58cc
-
SSDEEP
3072:1ftffjmNSoFHzg2I0PpPNX6RLXWertCQyyNU:1VfjmNvZzhPpPNq6QyH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4660 Logo1_.exe 220 a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\is-IS\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\kk-KZ\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\en-us\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.185.17\MicrosoftEdgeUpdateSetup_X86_1.3.185.17.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\ko\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\ThankYou\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ar-SA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe File created C:\Windows\Logo1_.exe a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1868 2972 a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe 89 PID 2972 wrote to memory of 1868 2972 a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe 89 PID 2972 wrote to memory of 1868 2972 a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe 89 PID 2972 wrote to memory of 4660 2972 a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe 90 PID 2972 wrote to memory of 4660 2972 a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe 90 PID 2972 wrote to memory of 4660 2972 a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe 90 PID 4660 wrote to memory of 2160 4660 Logo1_.exe 91 PID 4660 wrote to memory of 2160 4660 Logo1_.exe 91 PID 4660 wrote to memory of 2160 4660 Logo1_.exe 91 PID 2160 wrote to memory of 1600 2160 net.exe 94 PID 2160 wrote to memory of 1600 2160 net.exe 94 PID 2160 wrote to memory of 1600 2160 net.exe 94 PID 1868 wrote to memory of 220 1868 cmd.exe 95 PID 1868 wrote to memory of 220 1868 cmd.exe 95 PID 4660 wrote to memory of 3376 4660 Logo1_.exe 58 PID 4660 wrote to memory of 3376 4660 Logo1_.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe"C:\Users\Admin\AppData\Local\Temp\a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a42E5.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe"C:\Users\Admin\AppData\Local\Temp\a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe"4⤵
- Executes dropped EXE
PID:220
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1600
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD59b93e29b22e6f04690e432f03f2dfa2e
SHA147f1cee9f961506ccebd6044febbb88ca2430597
SHA256c8aeb785387be37a4430fc2cf99f162eb573b2df50026b64fcf1ddd3c6a8014c
SHA51283212d8c1097387007b15ff8e486af84db6ccd16a6623a9d873fce187d3a74d0d0aeff810e08084047e8022f7ed48b3112e7be7ba6a0f8fda0f499932feeaf7f
-
Filesize
570KB
MD588123c00c7cb2b0782b09805d65ab0e3
SHA162154151738b66ca06c73a27a25302d676218c2d
SHA256255584efa79f855a1dd7e85748825bf09bc1e9050a19c9fa3fee31f1ddc6eb4d
SHA512238d89a4220d754da809e937959695203753d3d7b42f73cee956c969a974b63948a43cbd0a16ef18547435e2059c5f6b01fdb1c852f4be62ec15d16d3a3b7b58
-
Filesize
481KB
MD51db5b390daa2d070657fbdb4f5d2cc55
SHA177e633e49df484b827080753514cc376749b0ceb
SHA256d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad
SHA51268aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617
-
Filesize
722B
MD53de826ac95510632af9ba26916302cfd
SHA1d0928cec1c7746816689da1666d384ff42d7d795
SHA256b0ec611967efd15521230ed37cd25b7d6c1fe5722113b6d3c3c3a85a8948d2cb
SHA5127caa57420f615b7516b646a0e1e9fed183f0ce31f80d53d1027bbf61033558d1b857dd4ca78323831d5b6086f10be8122679565788bab2d688353dfde4a3531b
-
C:\Users\Admin\AppData\Local\Temp\a5d107a3864311e800805d8598e893d9d27b663fffbac9d24cdd35036cf5661f.exe.exe
Filesize96KB
MD54f777a9f156035ab4670da6cdcbd651c
SHA178b6f97056e6d5674bbcb94f13c4bf5527319c02
SHA25677a8efbcc5e81e9534ad80aa2836105491f015d8a7355d0ba960f8fe5df3d0c8
SHA512244dae23bcabfe4f7bcd10af02f24f88840fd91defd989cd39ad8a7ea4cb2829f9101e966a8d8ff95099269461afef587c7f8008437d8c23a91fee08acd33437
-
Filesize
26KB
MD511bac14958e375a9b26e1adae9f76043
SHA199f19224054d3dc26f20ace9c701e2c70d440d40
SHA256eac627202d1b0142c98178cd516ac002c927846e714d0bd4fde46e62ef295a35
SHA512a93847b47caf2ae4ae1cd27b1a8a3592f88d9d48d1bc0667e5b8d9a20ff8b6f3b80c42f11af5d77a53ae891327e1c55b88e5989565c4eb15dc39df6cb0932b67
-
Filesize
8B
MD5658d36413fa4de67d2edb254a0383bbf
SHA1bd660e7319a5040c3af6edca0911a4ab4bdc33df
SHA2560118c20e2d539544ae8e73767b080d41f4ff57be18407222143ebea26d6affa2
SHA512f368a5a7d963fec63b9d599a1da34ae9eea37261f8c4d267d73624f5a36a0402f1f780317e094b240de3980a0a144929ea2076a23b134267cb0209b3172e1b7b