Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe
Resource
win10v2004-20240412-en
General
-
Target
9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe
-
Size
234KB
-
MD5
45a209b5ecf853f4b2b52eee1ed55546
-
SHA1
781b9f2df95459bacc030a5ca21c89849c59414c
-
SHA256
9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4
-
SHA512
bf4f3d92a5573f204a1526ff929f1a03548ff8dca6251ee50044c968c0a8efa0a05a7c4469c22258c4aeb19fd78702a40f3da4b293aba1236722b0560baf7a99
-
SSDEEP
3072:AftffjmNn5vCk9OyQbgu9RBwRwML7GHR05ZLZXpv4e4NlRJe/SWR8nRTtGBHM9G0:AVfjmNncTALZXpvSjeXjuGs
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3236 Logo1_.exe 2996 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x86__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sq-AL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\is-IS\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\bn-BD\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe File created C:\Windows\Logo1_.exe 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe 3236 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4316 wrote to memory of 680 4316 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe 86 PID 4316 wrote to memory of 680 4316 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe 86 PID 4316 wrote to memory of 680 4316 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe 86 PID 4316 wrote to memory of 3236 4316 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe 87 PID 4316 wrote to memory of 3236 4316 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe 87 PID 4316 wrote to memory of 3236 4316 9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe 87 PID 3236 wrote to memory of 2624 3236 Logo1_.exe 89 PID 3236 wrote to memory of 2624 3236 Logo1_.exe 89 PID 3236 wrote to memory of 2624 3236 Logo1_.exe 89 PID 2624 wrote to memory of 3156 2624 net.exe 91 PID 2624 wrote to memory of 3156 2624 net.exe 91 PID 2624 wrote to memory of 3156 2624 net.exe 91 PID 680 wrote to memory of 2996 680 cmd.exe 92 PID 680 wrote to memory of 2996 680 cmd.exe 92 PID 680 wrote to memory of 2996 680 cmd.exe 92 PID 3236 wrote to memory of 3468 3236 Logo1_.exe 56 PID 3236 wrote to memory of 3468 3236 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe"C:\Users\Admin\AppData\Local\Temp\9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6D8F.bat3⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe"C:\Users\Admin\AppData\Local\Temp\9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe"4⤵
- Executes dropped EXE
PID:2996
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3156
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD57bccc2687df85a1835e6bbcf1b5ebdd4
SHA11a925ae4a0c41080cd05c90996666142c6c02119
SHA256feca718c189c33d8766c401d21b38e8eb079893a4a98b0384f43892918d11bde
SHA51258d00e2e1d6d1c067f3dd7600f6e60efe543f431f537132bac83e35f09cf8f22d7c5db80f7ce8382714eb94cd3c7c5fd73374c03ce0a9bb62327a0cb77a2ec3a
-
Filesize
570KB
MD5c5a88e3597217a1f626e9d7f21ef017c
SHA120065f6da3ba04ad7f0d4981beec62a2a7202d06
SHA2567a785cb0ec6396135525b3a873444a18b1770489b2fc5c5abb6c07eed4ae77af
SHA512908e2a4513cc156eace5747c326b9483aee09413070e4763e224e63ee3038fd095dff884e6cd84da055abb5301c164562d6355231f15e4554fee7ab70a28e5f7
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD57c2f7df8bbd1d4846a284ea367be37df
SHA11c2d04acce23610727d9760d1b0b2137313dec48
SHA2566a9d1cb311a4bec352286b397745b0ab1f08ca479bdc2a51a82cb3a221873971
SHA5123abe3c24b9b63890eba475647a62984d490eea08b85cd2e09e43e0dd012a16b2359af08e4caf37efd3a7d4bfe526591980caf618db69d0e1631d0423abaf1e3b
-
C:\Users\Admin\AppData\Local\Temp\9ed70061b7778d1eeebec6400c752f7f5e16ed4fbf9a575e15f5072dd54c67e4.exe.exe
Filesize208KB
MD58eb74ac4beee982d1e5d1a2d7e6f934b
SHA19e9331dd31f729bd50c93d7f0e5af60d1f490a05
SHA256e946345fd1e75810afacc6694e21844eb1a7b4a8a98c2a05d9bb1ae25268985a
SHA51233807dc5817965a92a86c7dab27b668ba5cd9b7e4fdcdc9aae4e585020ad99a2406bae2b228fef3ba10ee7bc352c6bfa0187fe8c57bd489bc45bfc0061b0bdb0
-
Filesize
26KB
MD5f131c8a61871d776a2bd93bd9c68f965
SHA185a2d2377f7b90bb4387dcbbae3ad0dec87f8ada
SHA2560bfaec6d73d24f0736ee92b9deba61082f08cdba8482866361fbb57acae7c3d4
SHA512087e9f83e8a9b3c050de6e8fa4989bf614f23a515710f151b84a15f1444e1352b8ef1d7e4e2ae3bcae98bf7281c8597ed85ec9ea84da27651304577a0b7d32d7
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0