Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe
Resource
win10v2004-20240412-en
General
-
Target
e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe
-
Size
227KB
-
MD5
a67071bc1c09acf7a34a28f574e5958a
-
SHA1
81cdc3cab1eab25e74dd3b09a9465f40ad8ea2ea
-
SHA256
e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa
-
SHA512
fb9554d217e77d3e56cae22b0c3c64810c0b852dbe90dff820e24a933f578a004fc2341996959a55b87b41faf01adc26b6ec2e5da260da890c7fab05b0066adc
-
SSDEEP
6144:ERuJXbdeKzC/leySe8AIqpoHbnDns1ND9m:n/VyV8hEoHbI3A
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4852 Logo1_.exe 2284 e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\xaml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\cef\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\ModifiableWindowsApps\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\dotnet.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hi-IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe File created C:\Windows\Logo1_.exe e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe 4852 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4244 5036 e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe 85 PID 5036 wrote to memory of 4244 5036 e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe 85 PID 5036 wrote to memory of 4244 5036 e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe 85 PID 5036 wrote to memory of 4852 5036 e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe 86 PID 5036 wrote to memory of 4852 5036 e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe 86 PID 5036 wrote to memory of 4852 5036 e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe 86 PID 4852 wrote to memory of 2464 4852 Logo1_.exe 87 PID 4852 wrote to memory of 2464 4852 Logo1_.exe 87 PID 4852 wrote to memory of 2464 4852 Logo1_.exe 87 PID 2464 wrote to memory of 3844 2464 net.exe 90 PID 2464 wrote to memory of 3844 2464 net.exe 90 PID 2464 wrote to memory of 3844 2464 net.exe 90 PID 4244 wrote to memory of 2284 4244 cmd.exe 91 PID 4244 wrote to memory of 2284 4244 cmd.exe 91 PID 4244 wrote to memory of 2284 4244 cmd.exe 91 PID 4852 wrote to memory of 3416 4852 Logo1_.exe 56 PID 4852 wrote to memory of 3416 4852 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe"C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3076.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe"C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe"4⤵
- Executes dropped EXE
PID:2284
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5ddc537b7c9cd3d94433461320a2fbb60
SHA1429032645b563ee328c0effa6bd389d51db2309f
SHA2569406d981729c2786d35db72096e2f3648ffc2fec213aa6090e657f5321e18b7b
SHA51286b5ccd4d3244b16f381e7df56e72db8aa391041f3689bcd8994d535627780c907e987a6b06da4ef553a58c4b2f02176470c6980b5b7c2c6f5fcf9aa2a3e4b2c
-
Filesize
573KB
MD5035829ec15f01a14806a689e86606696
SHA1b1bec399cb8c61c88e451daefd3bfa3102e2b88d
SHA256656ae937b1f9a819f8e0544bf5c3bdfc603db67590726cdba5090e979a8938f0
SHA512e24f80633208042213da41f5186c4ae1d3a3f79ceff805651dc762a027784ffa255f159a409be1a777a865bf78844b19ead8d8eadd9d3f3dce805f327f6d5290
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD512d781cb550497985727ae9ce2dd228f
SHA154a535f956adeacd170d90a89334d6947a2136a3
SHA25674918337be31548b8e9df1ac3274a6169497df4013f46c9d22888a8992848841
SHA5128fbb584c962d900a7b3ca84b0d9888b78ae7aefc4e49423f06eda29f4cdd732034c8bc3499ee41a0b7a7d5c31faebe30204f37c51658f7607f9ed39f5c43ee9a
-
Filesize
722B
MD50301b81d82b24e20b1bab144b448ef4e
SHA146f5cb0e0bc741c432d56f10cfc5445375c149ad
SHA2569909a004c6a93a03f6271793bf27f3e864c536ffbbb45400f012a9e42f73b039
SHA5120a9d63b5c5cfcc1dcac4b3c872a974d8f5f897a509a1b998b4fc8f3985774b16c7d324c6e88dca1b21af3b684d7fc17b1b2f1b31263a11b025d4fe8ddec7b2b6
-
C:\Users\Admin\AppData\Local\Temp\e386242c5f1c803af6b989d10a6d04dc64686aa0ba3148598a02083cc95722aa.exe.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
29KB
MD5215689cb8f71685bce03d19ebf4d679c
SHA19cebc9b17a45cb1655de16f51b5ff258c6f97def
SHA256404605db3e4590400023a1d6d2046ce45457ba97e413dec0fd7c6e031c909572
SHA5124dc920d2962289f3e723130b2f243982029af87bf93acdef0af39dc15731456b100a6dd680948e581fe59c301e280482b9ab55f0cfca896810f28a717eaffc27
-
Filesize
9B
MD5a4e284afce5c2e93b509543e6064da82
SHA177a7ae3e38b05410dcf335f8abe1df4d7f0b141c
SHA256f4460d1a85b2980fa2b8d329adda0fd330f8157d7afc2d7b1bad62453ff1dfe8
SHA5128f2147ca54c96b0b05bf69a7919b5bf54b20036ba8336f6ba379c2abb0d31139a91d315130040ef1d06450dd624d8a8661396eb082407b8f7455be4d61351821