Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe
Resource
win10v2004-20240412-en
General
-
Target
d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe
-
Size
136KB
-
MD5
16e115ed25248d44b556d48ddc3ec6a9
-
SHA1
ac809ac0aaaec7a1b9c7d263f416d4bed2ba7ce8
-
SHA256
d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8
-
SHA512
c641c31d43e0ce5edcecb4becec6b6a340d9000d1dcac3926255cff1128e84f02371e90e345fa1b2f27daad9269dc47807711869a9c51fe84d049cb62ac55886
-
SSDEEP
3072:qftffjmNUEcXdw/M+0vkLOj0udo5rzahM9:qVfjmN+6JOYuy5Hac
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2232 Logo1_.exe 3488 d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\pstn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\cef\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\jscripts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Retail\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe File created C:\Windows\Logo1_.exe d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe 2232 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4712 wrote to memory of 5036 4712 d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe 89 PID 4712 wrote to memory of 5036 4712 d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe 89 PID 4712 wrote to memory of 5036 4712 d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe 89 PID 4712 wrote to memory of 2232 4712 d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe 90 PID 4712 wrote to memory of 2232 4712 d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe 90 PID 4712 wrote to memory of 2232 4712 d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe 90 PID 2232 wrote to memory of 1820 2232 Logo1_.exe 92 PID 2232 wrote to memory of 1820 2232 Logo1_.exe 92 PID 2232 wrote to memory of 1820 2232 Logo1_.exe 92 PID 1820 wrote to memory of 4704 1820 net.exe 94 PID 1820 wrote to memory of 4704 1820 net.exe 94 PID 1820 wrote to memory of 4704 1820 net.exe 94 PID 2232 wrote to memory of 3524 2232 Logo1_.exe 56 PID 2232 wrote to memory of 3524 2232 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe"C:\Users\Admin\AppData\Local\Temp\d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8A1F.bat3⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe"C:\Users\Admin\AppData\Local\Temp\d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe"4⤵
- Executes dropped EXE
PID:3488
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5fd6f44e4d35ec0931c86649241affe60
SHA1995851d93e2138e4cb281df82f1be5eb43b04939
SHA256eab6dde23c060009c5901cc57d777dcecc377653488629ea297d1ddc26242fa2
SHA5129e3f0b5f0cf04b744faf6c3bb6c1a479e5df30775da848c35a039b4979896148dc27c6f8d5991e9249e70dfa3606e5d9ac8656b7f0b36ea0cc185ae28102dc1b
-
Filesize
570KB
MD55870c7ad39b2d47db7dd90e5b74bc0f0
SHA150f91730d25fe6a9859a8bebd6807cc6b75e181a
SHA25632515c921fa8aed02733200b7495053e4908f668c96ef3d4f8ecc01da404c2b0
SHA512febc15e9fce7bf08f36ee9694360407b57a35f7ac3601dc862f63342002e79291c22c3100a7c9b86425dcfe02aa29b5ce15948994a1f16cb2f679aab3ecdb805
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD51e14541c4f52809fdf4d47de6827f383
SHA1453b1fc7852fe2ec534701ee16b39cdedd1a0350
SHA256c0e32f7fe4c6b5399eeff25fb754e071de313c73dbfcf0ae14b3ab2de7e4a64b
SHA512acbdc034181a1e9f39c44c9b2184e0dd622d1b24a0f67f795bc4a1c520025b76fac26548743180d69996cdea3e37fd0d7620ceafe27bc2932097bd4b41b4977b
-
C:\Users\Admin\AppData\Local\Temp\d718eb0687e73c66315de1d69ddcd0ed84d132f8dfa71ede1abf5cc0d09d14a8.exe.exe
Filesize110KB
MD5269f0a767c1d8ac7480795a94e0e2b79
SHA1041006a33fff863a72f46b6637abbf05f81bbac1
SHA25617772f59c1f0a0b5c6131c64e68efed8eaf99cba9c2b8b39133ae5481bb90395
SHA512546554125e278c6c1ba931811526bfeac286d6bc2374b56b31140f82f47c309a5bfb938f747693334712b3f241ed98e79184a103440e78ef89efff7efac8df31
-
Filesize
26KB
MD588815581c4f3a29e86b20cc64958ad6b
SHA1609bee0d923ce95ad593cd3e93102d99cf799189
SHA2566b8d6e9d746565f48680b3d6b5a06759d0ae3d8cf57b3791e6dbdb1f24d07bf9
SHA51216b69c9be1ea2d13a63f11f34dae1bf761f7f035cb5f1c8211ee16f522c08b0ba2bc9856dfab22bfcb5cb7ae6682ed94253c65e281951581d59d6ac9fd987f38
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0