Analysis
-
max time kernel
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe
Resource
win10v2004-20240412-en
General
-
Target
65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe
-
Size
1.0MB
-
MD5
c20dfdf6ea8686b22a1ac0eb07485ee3
-
SHA1
0f64a5c54cbcaada6294b631fa2791c31a14b331
-
SHA256
65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959
-
SHA512
8e87a89a4a81829a56d3e590ac297129ee35d02edef0a7e9fd82237ffc7d8427039495f86d31fb09092782f4d71c8f360681700e47e46d657e28599488887155
-
SSDEEP
12288:e7+aG8YPiCVkBTPZrlgcVHuJtzVu+0TD1qsWQGGBK5xoOJKWoUDvvnB:e7z3KkBlLuJ0gaBK5W69oYnB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4428 Logo1_.exe 3692 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lt-LT\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\eu-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-GB\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\th-TH\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\css\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe File created C:\Windows\Logo1_.exe 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe 4428 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3904 wrote to memory of 5076 3904 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe 87 PID 3904 wrote to memory of 5076 3904 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe 87 PID 3904 wrote to memory of 5076 3904 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe 87 PID 3904 wrote to memory of 4428 3904 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe 88 PID 3904 wrote to memory of 4428 3904 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe 88 PID 3904 wrote to memory of 4428 3904 65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe 88 PID 4428 wrote to memory of 4484 4428 Logo1_.exe 90 PID 4428 wrote to memory of 4484 4428 Logo1_.exe 90 PID 4428 wrote to memory of 4484 4428 Logo1_.exe 90 PID 4484 wrote to memory of 2460 4484 net.exe 92 PID 4484 wrote to memory of 2460 4484 net.exe 92 PID 4484 wrote to memory of 2460 4484 net.exe 92 PID 5076 wrote to memory of 3692 5076 cmd.exe 93 PID 5076 wrote to memory of 3692 5076 cmd.exe 93 PID 5076 wrote to memory of 3692 5076 cmd.exe 93 PID 4428 wrote to memory of 3440 4428 Logo1_.exe 57 PID 4428 wrote to memory of 3440 4428 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe"C:\Users\Admin\AppData\Local\Temp\65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD021.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe"C:\Users\Admin\AppData\Local\Temp\65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe"4⤵
- Executes dropped EXE
PID:3692
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a01e6109fa444fefd224f13a587b5fab
SHA1c7f9c6f2d77c1588d737c42a6278e7932e7f7d0c
SHA25631a0d780a00076d39e77be95c58ed30e9a7a17f56e34682120ec9a39e9f5d0ad
SHA512813c15101e16184bc1b6bc5fcf9c6fbf682c688f8bcbb43c063e94897b768cdfa01caff064c1f1b1318c0943c09372a65d6a83f4c424bbb0b1ae82caa8366fb1
-
Filesize
570KB
MD53b3df2156dee6f4f156456fc9e3bc81f
SHA1f07c1b99d3e54f0ff8d7bf6b543aa32b19937ecd
SHA256a6c72a0784660987404f4f219dd5d64349847974772f68792259cdb2ced31784
SHA512f88d8ff5ec37342368c1ad9846b648615cf97caf9f88676be9f79a54f07d95d03b87bb5aa68d4703c897bf953e8da1c4378b28ff53e351ab0fc40353448d5c57
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD553ee62011469b286a2a1b5658c86b9bf
SHA19bdac0b23b0a965947c780c6a6b48fc7122f9ade
SHA2567125735e4e8595f1c17ff3235bc65dacabc2ec874b29ac7ba8eddd80ad10b3c0
SHA512c9c24e578da0a38048e71548fac66465bcb624e971f745bba559e8c49fd621752e718d4c983a90a97277407bb23348ca109436e1eeebef030c3b599c712ff236
-
Filesize
722B
MD59dcf21c12e4745a05bea3f6d544b46b5
SHA1d694a088af76f2e3f2bb00d629b0fb1fbcf7a2d7
SHA2560a4a649e37247bebc6a465b4754bcad8075214eb4b855631bc546f5013173914
SHA512508924f619956c5e4ba502ae743525a3bfc5afdc5234e4d361c1da3ed107cbd2e119f0b489c711368cf96bb6e003e558d9846a74d3c0e5c5f3f887f3e59d531d
-
C:\Users\Admin\AppData\Local\Temp\65afd31f1c3bbbb7f532bbb1c78e7ecd8966c0bcc914955c0a063ff8b05af959.exe.exe
Filesize1.0MB
MD5efbcf076da6ef73b7c7eac51b835c7a8
SHA11043d1d8f0b670ccc6be55ae583bdf68362020f9
SHA2562df7f13678244ea17abe03fe8775b139c1e2bd283b369b3cb94fc7e90dfe6d88
SHA5122f0834e19b2e0d78e6c382536d0e48edfe68efa94318ec3028a50007dc22441c63e6863dda5e91ba979eecbfccd2b9216811c8d79872cdaf30866e7ff6193f47
-
Filesize
26KB
MD54bd4cb148394a70db17b226cbbbb5ce3
SHA18997edbadc2fb280d37686e94e326d44f7115ed0
SHA256646e325b65e63aa02bb2d93bb3c534e041bbdf421dd4a9ae5c7e524a5ca9906f
SHA512c193a201306c32c39d5c6b391ba95c2a89c62f86a7bf786b0acc17ad4c864167e7df5fe0deb87b0160ca50f5a037935819f93740a62b81c897751173710b2925
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0