Analysis
-
max time kernel
159s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe
Resource
win10v2004-20240412-en
General
-
Target
10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe
-
Size
227KB
-
MD5
b9bdb0594a49677e64ac5a5beec8348e
-
SHA1
0f84350b9ba434b249c833257520deeff77466ea
-
SHA256
10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6
-
SHA512
b04a9afa85fc735c7dfecd2dd6471b440b9b5315546fc50163ff5d45e558c7e011cd5d4979676ae31fa17d7b8452990469c307c7faf7020a4713eac5eec09918
-
SSDEEP
6144:NluJZdeKzC/leySe8AIqpoHbnDns1ND9m:Nq/VyV8hEoHbI3A
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1896 Logo1_.exe 4584 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Images\Ratings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square71x71\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\123.0.2420.81\EBWebView\x86\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\is-IS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe File created C:\Windows\Logo1_.exe 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe 1896 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3248 wrote to memory of 748 3248 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe 93 PID 3248 wrote to memory of 748 3248 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe 93 PID 3248 wrote to memory of 748 3248 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe 93 PID 3248 wrote to memory of 1896 3248 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe 94 PID 3248 wrote to memory of 1896 3248 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe 94 PID 3248 wrote to memory of 1896 3248 10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe 94 PID 1896 wrote to memory of 2708 1896 Logo1_.exe 95 PID 1896 wrote to memory of 2708 1896 Logo1_.exe 95 PID 1896 wrote to memory of 2708 1896 Logo1_.exe 95 PID 2708 wrote to memory of 1512 2708 net.exe 97 PID 2708 wrote to memory of 1512 2708 net.exe 97 PID 2708 wrote to memory of 1512 2708 net.exe 97 PID 748 wrote to memory of 4584 748 cmd.exe 100 PID 748 wrote to memory of 4584 748 cmd.exe 100 PID 748 wrote to memory of 4584 748 cmd.exe 100 PID 1896 wrote to memory of 3460 1896 Logo1_.exe 56 PID 1896 wrote to memory of 3460 1896 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe"C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a36BB.bat3⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe"C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe"4⤵
- Executes dropped EXE
PID:4584
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD525b3ed073c6eb1f6870a091ab2e74028
SHA188ccb5573cabbed60b90585efe8d7d61225c0664
SHA256baef82ba5027d379641cf98bebdad91fe9cdc384d00b544d5a3c557ef485f60e
SHA5129e971f1c2ed4965a97d567bfb95ae5a3af7abbc523870407a245c82ea69d2c5eae9e5e02a186175a3c9e931ef05e10bbbab3ec8c67185cf3dc1515c07fdc7846
-
Filesize
573KB
MD5d78fcecca1dcd24a423af225a8b57483
SHA1c77beeedd841ea7f544867b699c8dd06c3ebddaa
SHA256593d4e6f4a1d3746ee72feba5a62ef00630bae475538544d1bb1f3dd9f766ec9
SHA512758b0dc5e3f44974452ad3dffd637324db288e35065a9e48ccff00e1f08b818ce8053b21fcb8c23537707d0b241dcf4642d5b369a3d3230bc802443ab9bd6e5b
-
Filesize
722B
MD5b0029172c7b0666ebf6b47f3a156234b
SHA185f359f37612f716d4e14928cec497397ab67492
SHA25645a7e01c5e2fadfa1a2cc08f83cf17c576093dbaac21e0ac98e23ec2ee62a637
SHA512e48be2e9919226a2e111c6ce7d5f5936a7c0bdff38a12b6b6d05e3db31acf7b96291553819ad874aca3e044cca8135312120bdb62bf52eaa8527559b973c2d98
-
C:\Users\Admin\AppData\Local\Temp\10b2ba1c0c5507c769e754ea5f8f7739630a084c64c50d6b64da3ddae290ffa6.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
29KB
MD59dd7227008c46cd63564dffada9010ec
SHA1d516f5c9c6702e61e84b76427ad695d4ac2d9cf4
SHA256409db129c788ac0c2c2ecb56cbf002433a6cb62dfd5aec765bd5bfbe4404cefe
SHA512cbe65777df4b8af38792d726bb3b3709126930b5b46540dcb3cae6d433be6cd843ec51f3302fd2cfdd5690b9549c444d4ed992089695d13ab51221091877d649
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0