Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe
Resource
win10v2004-20240226-en
General
-
Target
3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe
-
Size
44KB
-
MD5
5bdeac27a008158522a1e2fec3b9cb34
-
SHA1
592269cbcecf5cf8e0ae540b7786d5a918fb379c
-
SHA256
3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097
-
SHA512
62d4b55e19f820371fb87f0e5f463cfacf73f7cb6965b33fe5547222ad258d4f72f9dafd466b62d2020a2a8bbbac35f6426047accd9671399050c9502e3f028e
-
SSDEEP
768:eX1ODKAaDMG8H92RwZNQSw+IlJIJJREIOAEeF12ZqpSIdUcvwQ9Uf2hW:ufgLdQAQfhJIJ0IO61KqpnxZUfX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4656 Logo1_.exe 3024 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\et-EE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\gl-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\PhotosApp\Assets\ThirdPartyNotices\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x86__8wekyb3d8bbwe\Microsoft.UI.Xaml\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe File created C:\Windows\Logo1_.exe 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings OpenWith.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe 4656 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3356 OpenWith.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1468 wrote to memory of 4608 1468 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe 88 PID 1468 wrote to memory of 4608 1468 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe 88 PID 1468 wrote to memory of 4608 1468 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe 88 PID 1468 wrote to memory of 4656 1468 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe 89 PID 1468 wrote to memory of 4656 1468 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe 89 PID 1468 wrote to memory of 4656 1468 3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe 89 PID 4656 wrote to memory of 2544 4656 Logo1_.exe 90 PID 4656 wrote to memory of 2544 4656 Logo1_.exe 90 PID 4656 wrote to memory of 2544 4656 Logo1_.exe 90 PID 2544 wrote to memory of 4276 2544 net.exe 93 PID 2544 wrote to memory of 4276 2544 net.exe 93 PID 2544 wrote to memory of 4276 2544 net.exe 93 PID 4608 wrote to memory of 3024 4608 cmd.exe 94 PID 4608 wrote to memory of 3024 4608 cmd.exe 94 PID 4608 wrote to memory of 3024 4608 cmd.exe 94 PID 4656 wrote to memory of 3488 4656 Logo1_.exe 57 PID 4656 wrote to memory of 3488 4656 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe"C:\Users\Admin\AppData\Local\Temp\3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6707.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe"C:\Users\Admin\AppData\Local\Temp\3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe"4⤵
- Executes dropped EXE
PID:3024
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4276
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD520157578c082f76ace74dbbd1118432e
SHA1456923120de4eb2d9efa48aacf8d09bf08e0308d
SHA256b143d8fe8a3e199453eac9ccc15de01e26882e9e1da8021b6ee045dbe0290468
SHA5120916ccac8ca22868cd900a1bf62cafe6522cfe40649fcedfeec650badde7ed6cfc6949509209d85d46da67f616dddfe58ae6e5e209dcf5de9956157825b66a98
-
Filesize
570KB
MD53d447cacf3d8c6a3027cee02fd87184f
SHA1c47ffb6f1eba8edc0440854f0b04e9ce2b0aeb51
SHA256c47f9a406779bde2b708abd3661622a866b8779debe32f7c756e565ee03d7264
SHA51201c17dd34d8cd7063505a5f8a992291bee549942539ee67e5705fe9023617f040c9224f337ff06ce020b5159332befac610e9dea930581c3dd07680525dc07a0
-
Filesize
722B
MD58e82d03bd39c41d099b23d509b51ff4f
SHA1cc558fc97979c78f3e6fced561d9942bd5957fd4
SHA256ecfe6d75a4e3f32fbbad4ceaf594dbd8696a681b0a6cf3f85f78c6a572808a56
SHA512c9be368950bf39bd73611f90cb500938eee54942f32a099af81147664b6e1f5c182c837139f07e3ad2385ad4001505385b8b7d898b07e7e17aaf026fc1dc9a15
-
C:\Users\Admin\AppData\Local\Temp\3af4017e49292c9b821fd4eb01d4872d953c9867e9c941676097df4790420097.exe.exe
Filesize18KB
MD5f344d9d7bfe9968c258ceb0bcc91a386
SHA1ec85058a634313725b308f883af6f8ba0c729b4b
SHA2561b65136281048ad44c8a51a8332799f800347e05fb3a21f5e3305dcce1d72d4e
SHA51286c74994b75ab0bc2f3c9cb38bc1b3bb51db5c6df2eba783b30f9b7f9a5c54b84f8a9c3bdb6ef6e0c64edeabfddfb0204570a147348406d8a3e30c661dc5822f
-
Filesize
26KB
MD527474799bcd86ee6bc4dfdb0fabe45c3
SHA1d2203d7dedafcaf3d1ddd21a51b92c15b1ad67b5
SHA256237fe393824ae9f88eaf70c5e760de08384ed3c221769f499c2caef1aeb86290
SHA512d84c4bd3709c00c83ee0466af993ae18a215c982395f6e2d11945e6a79eeff6c56192410a36427751bbfe58021cc7390fd28344efb5b47d4c7c719ff3a02b464
-
Filesize
8B
MD5658d36413fa4de67d2edb254a0383bbf
SHA1bd660e7319a5040c3af6edca0911a4ab4bdc33df
SHA2560118c20e2d539544ae8e73767b080d41f4ff57be18407222143ebea26d6affa2
SHA512f368a5a7d963fec63b9d599a1da34ae9eea37261f8c4d267d73624f5a36a0402f1f780317e094b240de3980a0a144929ea2076a23b134267cb0209b3172e1b7b