Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe
Resource
win10v2004-20240226-en
General
-
Target
3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe
-
Size
2.0MB
-
MD5
47478a27fbb45a109a358c1dfd1bb59f
-
SHA1
2cfbae82c43efc2bcba9a66b22d189f9b755ba18
-
SHA256
3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21
-
SHA512
fe160bd04947c413f923f0f9a8beb7f6bcd126e20901b894747ba02c5cdbd73b0f3201a0e834d03582a9a89d58e141fb3b755445226e839995fc6aca64e0e85a
-
SSDEEP
49152:I7mHzIIKgCFo8CLNJV0Xz1BR7odXC7dovTjM+XKgfvoYMAPd8:BHzInDFo8CLNJVwz1BJo3bjMNkAYJPd8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2480 Logo1_.exe 3588 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{A6BE8446-37D6-48C4-B9D2-938299E1D673}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\css\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_2019.716.2316.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe File created C:\Windows\Logo1_.exe 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1792 3588 WerFault.exe 94 4648 3588 WerFault.exe 94 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe 2480 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 216 wrote to memory of 2068 216 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe 88 PID 216 wrote to memory of 2068 216 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe 88 PID 216 wrote to memory of 2068 216 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe 88 PID 216 wrote to memory of 2480 216 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe 89 PID 216 wrote to memory of 2480 216 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe 89 PID 216 wrote to memory of 2480 216 3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe 89 PID 2480 wrote to memory of 2180 2480 Logo1_.exe 90 PID 2480 wrote to memory of 2180 2480 Logo1_.exe 90 PID 2480 wrote to memory of 2180 2480 Logo1_.exe 90 PID 2180 wrote to memory of 2884 2180 net.exe 92 PID 2180 wrote to memory of 2884 2180 net.exe 92 PID 2180 wrote to memory of 2884 2180 net.exe 92 PID 2068 wrote to memory of 3588 2068 cmd.exe 94 PID 2068 wrote to memory of 3588 2068 cmd.exe 94 PID 2068 wrote to memory of 3588 2068 cmd.exe 94 PID 2480 wrote to memory of 3440 2480 Logo1_.exe 57 PID 2480 wrote to memory of 3440 2480 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe"C:\Users\Admin\AppData\Local\Temp\3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5A84.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe"C:\Users\Admin\AppData\Local\Temp\3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe"4⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 2965⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 3165⤵
- Program crash
PID:4648
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2884
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3588 -ip 35881⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3588 -ip 35881⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5168681c876bdc301911ce24b47935282
SHA1a8913de7eee059f1c465c56282ec2ef7a2abcc09
SHA25641c1720cd5458ab7a50f91ab38e9a13bea2941eb09b9a248809f9fc4369976f9
SHA5127fbb29dce92283c2d9a70f2915c6ce53c4e0668d33e0c4099d557c5ad345c186917e9459f05eb6b4b901f9bbf707f671e50f980991b39856d05d33b18aedcdcd
-
Filesize
570KB
MD5aaaacb40bb946f7af415308aa56072d5
SHA1353a6de43fa05089bb281dd76dacabf37a4a97b2
SHA256ef5f717e92cb21dc5cbdf61b55b685d1476d50cec0966a13383d7fb64ccfc8e3
SHA512f013c4e925a285132d27c4d4d720b62d068bdf4d034d601ac66c2bb92b1a5d329ec7390a745761b2620dad33502128ee41efb47f8fcc629418a1975307596251
-
Filesize
481KB
MD51db5b390daa2d070657fbdb4f5d2cc55
SHA177e633e49df484b827080753514cc376749b0ceb
SHA256d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad
SHA51268aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617
-
Filesize
722B
MD5cfcff5aa01562ad21a9e41147b937af9
SHA1c0408ee301ad06646cd8135aa9b60adca429ad45
SHA256679219b388085e99c59cc5160e58706b8f10c108d64a29f3ad86c231b1cb76d2
SHA5127aede8093226e3cb7ed34fa63d99997f95d36c7eea43af27d331714f82426a4077a303c57dc83c3bdbbcb3bbd72bf0f3d3e39521e9c8371d3aee80afe83e4770
-
C:\Users\Admin\AppData\Local\Temp\3636100f980c09f821910719cf94d022abe0404de4007f89f91dab6099b69a21.exe.exe
Filesize1.9MB
MD5eb2dc25edf2cea3a7f605ba3a4930a34
SHA1466e949cb40ff07c53f1944f336f9eac95009b75
SHA25619c917b73e9e46a3c83822eef73a35657b185128bb4f40f23902561acc2358ef
SHA5122447a9e686d2b9591c6ba5fa57de81ecd35def46a6dc970bcb790bb5e0fcad2fc04aac557ade4f515fc6c6d74deaf1bf214e06a1109419fac23c6ee7c517ea58
-
Filesize
26KB
MD59c931e087c97a0d30e9ee37113c55e69
SHA17c116b995922457b33cdd7df52c6597ff3783a0b
SHA256ac707b6501854b39b421092a2b641d279abb66ae9b5312f8f1d6c6c9185dd164
SHA512fb7dca91f8cefa0ace5943009efe1ed6d54732e64279d689d8d8b96445cc372989b033595f5727bc06edd8607020d99063f4a2ff268d7c1c38ea9dbbb3e30fd6
-
Filesize
9B
MD5b2c5a70d0c0f7486eb7bcd691664669b
SHA10be0eb4afb44c300b16181ffb981db5d2e6563e8
SHA2563369ac2d9926df9466c914d7bafae58764696319b1584f9f83202267db0f8799
SHA5125d9ec62e9872989b928f4372fe35a4fec4ab6ae308a2d0191b487cfa1bdca276bb5ac54c7d3ba59d081128dcfb40252e40089e03ca4600ee428714a322628d14