Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe
Resource
win10v2004-20240226-en
General
-
Target
83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe
-
Size
1.7MB
-
MD5
0f5ca4b031a05d416da01c470a9304d7
-
SHA1
f0fe6350a86914dfcf708513dc09f7b3210d66d3
-
SHA256
83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631
-
SHA512
af941f15ac7abe7cd73d6a37f9f8b8930026b4ffc2e378a1d4e9fc478eace777f7d39cb634371b4428140cf381c6fd1e7a3ce7177bcbceb664d8d044502e393b
-
SSDEEP
24576:nOObVw4TaN1wd+ukCba4oXtgLhU3wEdmh58g:nOOh3aN4+uLbegmtGH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4660 Logo1_.exe 1088 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-gb\jsaddins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.17\MicrosoftEdgeUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Content\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Light\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_2019.716.2316.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe File created C:\Windows\Logo1_.exe 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe 4660 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3484 wrote to memory of 1436 3484 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe 91 PID 3484 wrote to memory of 1436 3484 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe 91 PID 3484 wrote to memory of 1436 3484 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe 91 PID 3484 wrote to memory of 4660 3484 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe 93 PID 3484 wrote to memory of 4660 3484 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe 93 PID 3484 wrote to memory of 4660 3484 83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe 93 PID 4660 wrote to memory of 2872 4660 Logo1_.exe 94 PID 4660 wrote to memory of 2872 4660 Logo1_.exe 94 PID 4660 wrote to memory of 2872 4660 Logo1_.exe 94 PID 1436 wrote to memory of 1088 1436 cmd.exe 96 PID 1436 wrote to memory of 1088 1436 cmd.exe 96 PID 2872 wrote to memory of 1580 2872 net.exe 98 PID 2872 wrote to memory of 1580 2872 net.exe 98 PID 2872 wrote to memory of 1580 2872 net.exe 98 PID 4660 wrote to memory of 3332 4660 Logo1_.exe 56 PID 4660 wrote to memory of 3332 4660 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe"C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aEA1.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe"C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe"4⤵
- Executes dropped EXE
PID:1088
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1580
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4232 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5da3a4d0479cb34cd1dbd864b9fe7afa8
SHA1c819c28d044275ad62ee2bbf9cad9cdcf13ae537
SHA256402ca106b4801356a8a0c2ba9abcf8a323b3193c68c82066cbdf50ce6c71be4d
SHA512a0dae98bf119c57fb548475f3a7d52e68f952876f0420bb2fabda483565c7fe8e24368eb7a458932b207f66fdafc3e0f65599ae9dcb9a7b4756cc7558682b18c
-
Filesize
573KB
MD5c234fbedd69bda7f01772e5e0c88312f
SHA1d016ab4a3a07bd9d50bbf2ecec1440230549acfb
SHA256f2b7ee7688871677bbc519f133538d67cb5dcb9f3e9442b2ea52130a1e6b3d9e
SHA512b0d9aaf029d6aa1b443961a72423c24af9457e0cc0cd20bf2e853c05bebf345731950c70a68c5151d6563f6aa78c72dbdf1dd3dc8d953f7101bc1a06d67e6bca
-
Filesize
721B
MD59d170cbc25b8dca4a0f28cec471f7eb5
SHA1cf8395272be8330a4af6ac100b8597433c0d24c8
SHA2560e7ab58e9a64ff69d567f21abd548796f4699cc95b20551cce1cc9ab3eed22f8
SHA5126be9360504fb8b7395ef1b89b6e288010acd736e66bc4c59aa3251f0e9a329e7d774e8492a1fdc00583b30f19aafbc274ea8b73efc1088cbe8a688ccc4dec9e0
-
C:\Users\Admin\AppData\Local\Temp\83bdfcb417706c5c261af509b93188dd96ebdfcc41078bc4e6d0f55128720631.exe.exe
Filesize1.7MB
MD5d36d79b8f55d32021c2ca5669ff5a552
SHA16cb6cbe0fe75f3b52c716ca2cef77fff8da2274e
SHA256904b7660f3cb9fb85ebf8787fb2e1f81c2b5591b0a21eb5cb6dca18a54dc657e
SHA512965a4e621b18dc22c7fd31e27e65b2c36a7f90832db8e3f4e0752da89b1489616c095bf72f72aa17dbb198c79b66b1e9c252dcc8f389aecd3da293e4e471a353
-
Filesize
29KB
MD59bcc3e645527978b32c6d1984175f69d
SHA1d9dce23336396ddbfb4e54c207d755e9b8104b92
SHA2563b15b041a301264dac387cd799e223d8d55f3652573aa7048a7bf4c01b5308e1
SHA512a88275729c3768ca2ee9a9373bc5c97f1e70c5488de73ce1c46d5589978180608d44d87fa9e142b5f977d543cdd4130fb4fad1a4088bd65c39d448af1dbb5c6b
-
Filesize
9B
MD5c1decdd7d6df1d9437bb5f2bc5fe1486
SHA1d71402dc8d37a148651cb5017219322267c7b922
SHA256bd6d31806e5ebc86100e3c7ed2cf5348757149082d775fa986d41e8554ce8089
SHA512ebbaed70f5d858508011ec3f251e16aa09c861b3d6dcc62ed28f293b37dfda2434b0e36f898bc62fca3107ee6356c77e5662a76085f191a63913013837cc0f07