Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe
Resource
win10v2004-20240226-en
General
-
Target
cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe
-
Size
487KB
-
MD5
ad8007511bd20d7f503dfeaffbe919fd
-
SHA1
e31688bc97e8d158bd0da8f04b21e4dc9efd926b
-
SHA256
cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce
-
SHA512
fd8b7e31fc679756ae14d881feefa28297b3709e8b963bb6d31b8f6faab21364580ffc7c78a0764527ec3c8e05777b4db4a24ed11ff1bb1cbc9ede0d3965c306
-
SSDEEP
6144:ZXuJoz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV4:R1gL5pRTcAkS/3hzN8qE43fm78V
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4184 Logo1_.exe 4764 cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_2020.1906.55.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe File created C:\Windows\Logo1_.exe cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe 4184 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2208 3568 cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe 89 PID 3568 wrote to memory of 2208 3568 cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe 89 PID 3568 wrote to memory of 2208 3568 cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe 89 PID 3568 wrote to memory of 4184 3568 cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe 90 PID 3568 wrote to memory of 4184 3568 cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe 90 PID 3568 wrote to memory of 4184 3568 cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe 90 PID 4184 wrote to memory of 4600 4184 Logo1_.exe 91 PID 4184 wrote to memory of 4600 4184 Logo1_.exe 91 PID 4184 wrote to memory of 4600 4184 Logo1_.exe 91 PID 4600 wrote to memory of 1892 4600 net.exe 93 PID 4600 wrote to memory of 1892 4600 net.exe 93 PID 4600 wrote to memory of 1892 4600 net.exe 93 PID 2208 wrote to memory of 4764 2208 cmd.exe 95 PID 2208 wrote to memory of 4764 2208 cmd.exe 95 PID 4184 wrote to memory of 3376 4184 Logo1_.exe 56 PID 4184 wrote to memory of 3376 4184 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe"C:\Users\Admin\AppData\Local\Temp\cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a323B.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe"C:\Users\Admin\AppData\Local\Temp\cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe"4⤵
- Executes dropped EXE
PID:4764
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1892
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD53a9e3f48dfa3fe9fdb994723a23d73bc
SHA19aecc76a820839a16913e78318d430e794319949
SHA2566c13925b5bdd985d2e04af1933a1d76feb7192de4637de9a709564705fc9dd81
SHA512a3651033d18e0aef67eb990d068756dafb716e5d5d1ce9608fffbce57ae29e25caf3d61f18ec241bbb28e69c89be51dd0b3ed44d5255db37b59c09f2ab65829b
-
Filesize
573KB
MD59731c7e9e2cd3b065d66ce49c1db4048
SHA1cab3904588f07f9d978c8fe218348dbffb5df90d
SHA2569b58d4a51608648c8301250655eb75b2bf8f159b5509bf1fa8629c681f30bc17
SHA512016e009b695553a70871615e74814fce347222c83016de04108a8b0f0fe8ee338788d230388ef3f18a773613bc1931c1c679cbfba04c395d01910ebed50b2e7a
-
Filesize
484KB
MD545268e665a2d4307baca16b4a08dcbf5
SHA12c9c0408fb4cef19db38fe4049422f34f38d7d0a
SHA256145b05019248756bb55c20f5665f47f66f36a17b7a26d76fa59e522c9706b5d6
SHA512c4204f5eeb30c16eecba0d4f6ff51e081d16375b28c2801f7e33a84ae0a9ad139a20bc951a0a53c715740cb8c966c36c782ec3724942bda0328580c7ff598cad
-
Filesize
722B
MD5afc40fc13375dc744cb24be8ca7c3dbd
SHA1d8b0e35edda911989f35a3cd9f9117b32eb33247
SHA256955848981a0fb694d5fba00af6e0c491513decbc842b40e3883bae8e35fa6c16
SHA512cd1a1725cd3cf083ce578fd1ed2d709bd650c4a2c2ea6dbd4e65416704427ae4fb959bf31e64afeded413464397dcd1773a0a4cd8ef3d90f9f98f43d0e3dc950
-
C:\Users\Admin\AppData\Local\Temp\cee964296a3441cda07893b772b68d15d6e22f5649fa2de45a7753aca27628ce.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
29KB
MD572204b3896b27e0e4b58190ba1ed8195
SHA1762d4a960b35d2c8a7f458f109291948175799b8
SHA25634aa074b53f45173252aa8c2b82c3eda84f8dc4c447fcafc9fe580f71badddc6
SHA512cbabd2d4bf84a4f5a167d6d31011f0fece755f3cce318ec18f3c85bedd658f22c806eeb89234515fc814e1c24a4bbf60c58a0b0931e820b22133b3d240540cb7
-
Filesize
9B
MD554b7af1605eeb1f5569c4b61bc719660
SHA136ae9b4051c72b86fc5bad5d175acf9e9ed12076
SHA2569b92406bdee720b5f88c329b99690d3721c7f917aa57c3febac6efcb7e938a2b
SHA51283b77ba22dde00916a9be4d1e12d9ff8584c6e53c192107edca49ac6608fc82718a7d902e4143c2968e92cf53853d5b7a94f8b6d6a7c5d29c4add5ea04ae1704