Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe
Resource
win10v2004-20240226-en
General
-
Target
62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe
-
Size
102KB
-
MD5
09c837ceca7ccafa51bae89286c39589
-
SHA1
685cbe4fbc9d8c12cc5c91dab3efbb967484ba3d
-
SHA256
62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a
-
SHA512
5b66fab1a83a8ab656f778bcf7dc4a1bcbd598de7ec5ce4839467772a2fef7622dc375aaabb503b205e47fb35e9abf7a98d459af4e5bbda09338093200f24094
-
SSDEEP
1536:IzyEjBfgLdQAQfcfymNf5ddKPVRo7SbceOwMIN3uz+XzyEjAJgV3n2CL:3WftffjmNf+OSnGIN3uz+++3D
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 580 Logo1_.exe 2456 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kk-KZ\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-CN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jsaddins\en-us\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe File created C:\Windows\Logo1_.exe 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe 580 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2456 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4512 4496 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe 88 PID 4496 wrote to memory of 4512 4496 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe 88 PID 4496 wrote to memory of 4512 4496 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe 88 PID 4496 wrote to memory of 580 4496 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe 89 PID 4496 wrote to memory of 580 4496 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe 89 PID 4496 wrote to memory of 580 4496 62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe 89 PID 580 wrote to memory of 2220 580 Logo1_.exe 90 PID 580 wrote to memory of 2220 580 Logo1_.exe 90 PID 580 wrote to memory of 2220 580 Logo1_.exe 90 PID 2220 wrote to memory of 4728 2220 net.exe 93 PID 2220 wrote to memory of 4728 2220 net.exe 93 PID 2220 wrote to memory of 4728 2220 net.exe 93 PID 4512 wrote to memory of 2456 4512 cmd.exe 94 PID 4512 wrote to memory of 2456 4512 cmd.exe 94 PID 4512 wrote to memory of 2456 4512 cmd.exe 94 PID 580 wrote to memory of 3352 580 Logo1_.exe 57 PID 580 wrote to memory of 3352 580 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe"C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5FC3.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe"C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4728
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a6efd71aa3b8b5733480eecc85a9e1dc
SHA1ccfe95b3ff7f234e6a34b7924a825c2a78423513
SHA256249be1c0499608a858b492c634b8d7d964b649846a9c25bcc95d4f5be1ad4cc3
SHA512cfc506131361a353f4564015773ba9574f5a2f05603e1fb8409eec838f8b141a7c40bc89395758de4848ee99ba495a5c7e9d9ee1f5e57b1816c1d9cfd37a1d47
-
Filesize
570KB
MD50eb87a7e251ec1a90d772b0a0535098d
SHA114a0afcdcfe0843088f3d227dba4d824293839e1
SHA256b9ee14226ae84dbfd6081b3453647b3cfaf88a15f933e8fa63a08520ae7466e8
SHA5123b1f7de49eee34413c6c96ae15f23bd73b0e04272cbe32d3ab0d6ce66e9dd7a52241c90f51687095b8c34d918cb6b0cea372ab38a7afee8df36c64b1c15999e8
-
Filesize
722B
MD52a1f484fb03ec7ac92e8f54baeea7458
SHA13f0a7a6e30dcafc7a836972ccc02c74ead00ae94
SHA256339adebc069ec097a97e3aeda8251da6cea50895c64ed2b50b527ed29f6c3c53
SHA51277eab88ad5fecf0267c9efffc9c6ca9a6c073ecbcc84b3106b0e202b76ee522f60f6cd78ae0945c8fc1e9e2c2dd45991978a58391911bb17e9fa1f391482046e
-
C:\Users\Admin\AppData\Local\Temp\62d664f315e9d6272142b54a7e1979e26837dad2038d6501c00029cb564bfb5a.exe.exe
Filesize76KB
MD5091d33fa9ef01c4b9eabf79eb43fc863
SHA193ce4e8222366f280caca14fdc2a53a8d9be33b8
SHA2562a84bd7ea030f3e0470ecaacfba7dac49101001bf2f2d1060f3b87bfb0720bcd
SHA512d7f425572fa8d7f34dc9b7e4eed2d46f402c578a9d6345b861686b5dc36a199881f61e8b0a64580293e7092469cb27cf9bb7ffd96fa32d3b1a4ad80b7ee03366
-
Filesize
26KB
MD5fd4695e08721cc6675c933713f265822
SHA1ebff89bafa84a8382277d3f03d3bda495540cc5d
SHA2566a79200a29104f247d9734e6c7993ed5883cb5f7ba55353c1ddc242d323be622
SHA512fc3b76725189835a975dad6d8ffc9e86966500f315d7de6e3b4b6da647b5d253671102b0ddabd5eec65fbf3f11adbda567e5ac0c06ace65bbaf20e29e228fefc
-
Filesize
9B
MD5ac7ef6d7fcd23c228941057dc1a38427
SHA1aec0bc6ea51cea8edb23dd9ea7be81f113f42493
SHA256fd687092833ff2ed530a5ba6d4cebe3c1e5f6c318da1610320743cc7e073a740
SHA5126cf8518e3448d5f19775ac462fab31aac662f0386ed2aeae85b2b5591ee3092f25527beb74592f1c1e4a20f6488277b429c9f46e783937c4bb9f7439ffb6c4f3