Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe
Resource
win10v2004-20231215-en
General
-
Target
1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe
-
Size
957KB
-
MD5
39c429cd98ca9863321e64fb61feaa3f
-
SHA1
6d4d409f5426da36b1a4f9c47352939c782e16e7
-
SHA256
1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e
-
SHA512
e91b49e26c9cd52fc6ef277358480c280ce28b1ca5e3f5a111b70c179043a4a2565f8f85c87357867b4ca7ace32cc9ebb53218209e7130112357176c78a34e33
-
SSDEEP
12288:Bp7RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:BpEBpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1620 Logo1_.exe 4756 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\pt-BR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ms-MY\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\dictation\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\pt-BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ar-SA\View3d\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe File created C:\Windows\Logo1_.exe 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe 1620 Logo1_.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4756 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe Token: 35 4756 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 400 wrote to memory of 2768 400 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe 85 PID 400 wrote to memory of 2768 400 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe 85 PID 400 wrote to memory of 2768 400 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe 85 PID 400 wrote to memory of 1620 400 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe 86 PID 400 wrote to memory of 1620 400 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe 86 PID 400 wrote to memory of 1620 400 1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe 86 PID 1620 wrote to memory of 4448 1620 Logo1_.exe 87 PID 1620 wrote to memory of 4448 1620 Logo1_.exe 87 PID 1620 wrote to memory of 4448 1620 Logo1_.exe 87 PID 4448 wrote to memory of 4460 4448 net.exe 90 PID 4448 wrote to memory of 4460 4448 net.exe 90 PID 4448 wrote to memory of 4460 4448 net.exe 90 PID 2768 wrote to memory of 4756 2768 cmd.exe 91 PID 2768 wrote to memory of 4756 2768 cmd.exe 91 PID 1620 wrote to memory of 3408 1620 Logo1_.exe 56 PID 1620 wrote to memory of 3408 1620 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe"C:\Users\Admin\AppData\Local\Temp\1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3FE7.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe"C:\Users\Admin\AppData\Local\Temp\1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5884491f20ab9c19ff6a85edc42b37fdd
SHA17da4e52b211caa947498bdfc2fcfe7b56ad7940f
SHA256efc0f29730656326febece0fefe652573822eea84510d777fa8b83fc94b68e5b
SHA512a985f98008efaa59e861e8f23d19720ebbff976b58be58f6b7276c3c2deba58d544a8517fd7601cb30ed8064006e1c6ae8e832171515db6cba9687af2437b474
-
Filesize
571KB
MD5df1c2a2e35565dc99808bfd8914cf63e
SHA133b789cea1697b9d760213276437f3c582d5137a
SHA25692bb844e001e41e9f54740340196e442ed9566694e2bd6da53ab4e91c2b05672
SHA512be207c28ab4f8145357589a8306bc484d15aa421465f6a28e923dc3049b0ebe0c3eae173d4bc59a179f16b388005f43d4864992e0fe9c40e12398d284964d5ac
-
Filesize
482KB
MD5ef2faa6fbcf12b63da1cf3e9283ad1cf
SHA12032ddc0f6ed9560583f70a279ca858b1e746409
SHA2562c7657fe57ec426599ef848815689264720ffed5a0f9a5d33d07cafabeb43bf3
SHA51246b169f4142d45197207d0015119145c12eb01150c6b742c5f3792b01d2e23bda9e25e181144f4b9963eefcff7ccb9d37fad4d27b044753325ceeaea330fa00b
-
Filesize
722B
MD5ed34bade28e83eb96965783c86c4b85b
SHA19df3187f22a85039ea000ff29417027b310719ce
SHA25609784b6fbba162cddf8babd56a0729a507abc0967e98cfb2784f6cf577b94720
SHA5122fc3f1ec7259dd6c710c18e2e186ee60f93fcda8075ba51b3386df0dc6bb1d481aa3b4cd567bca8c4eb673cd171c81c6be7151282751b81f534837dd4844652a
-
C:\Users\Admin\AppData\Local\Temp\1f7af504348ab6f5df7f32f183a67bec10c1cf2ec6fe9dddb7df76eb97c2ab9e.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
27KB
MD5a11c098e88fbd8e1071d87ba5b252080
SHA1b9731f888d390d7e53a4e36ca91de322c74a624a
SHA256ab5a703ea2abedf0285e3945bfb2d152daf3830070bcf23c6c8b0f76b7993e0f
SHA51291903cdef6d361f7ee3015f82ab32798b080e0d418fba35f439ff9d3a245ce333953c1891c7cf0eb6172e62f503a5a54027802d40e943e6dc06ab310d44fc0ec
-
Filesize
9B
MD595b3e5fe04e8423c49a7f69a5d13771f
SHA1615b63fb8bf07dbb0565ffd492067309645064c9
SHA2561663db9b496c87701f6c8f6721e92994ffdd747f949ab1070fd844c4d63fb916
SHA512d9a0d342e84c32d4c0aee97be7b9a102963d1aeab7edd87b080548f7dd144d851c558e6706bec441534d8e188938655c2b551e358d342309677511404a34ce81