Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe
Resource
win10v2004-20240419-en
General
-
Target
e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe
-
Size
357KB
-
MD5
9dcffc4e8bea3bfda2154c1b6d6e13ea
-
SHA1
bd4f9e5aca1f4acca9bf8a0168a87f2c4c39035b
-
SHA256
e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750
-
SHA512
c3105b90a421933a6e0249d24ab75ab14e6f8c31b94169cdfd47baa088b16e90b75e87e7ebb0b784f44cb2133e918bc89b65455cc55ff242a0f07a270249ce2b
-
SSDEEP
6144:SVfjmNqck+UDJeMCZJPWZI2pxLRjA4ZD05WGNl6yZ:s7+q0oUJPWZ5pxC41G2e
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4616 Logo1_.exe 1664 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe -
Modifies system executable filetype association 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Extensions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\identity_proxy\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Oracle\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\FileAssociation\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileType\{A324EA60-2156-11D0-826F-00A0C9044E61}\0\ = "128,4,FFFFFFFF,50450000" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A324EA60-2156-11D0-826F-00A0C9044E61}\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A324EA60-2156-11D0-826F-00A0C9044E61} e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A324EA60-2156-11D0-826F-00A0C9044E61}\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A324EA60-2156-11D0-826F-00A0C9044E61}\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileType e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A324EA60-2156-11D0-826F-00A0C9044E61}\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A324EA60-2156-11D0-826F-00A0C9044E61}\shell\View Dependencies e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileType\{A324EA60-2156-11D0-826F-00A0C9044E61} e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shell\View Dependencies\command e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A324EA60-2156-11D0-826F-00A0C9044E61}\shell\View Dependencies\ddeexec e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shell\View Dependencies\ddeexec\ = "[open(\"%1\")]" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile\shell\View Dependencies\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E13FC0~1.EXE /dde" e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe 4616 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1664 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe 1664 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2052 4952 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe 87 PID 4952 wrote to memory of 2052 4952 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe 87 PID 4952 wrote to memory of 2052 4952 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe 87 PID 4952 wrote to memory of 4616 4952 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe 88 PID 4952 wrote to memory of 4616 4952 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe 88 PID 4952 wrote to memory of 4616 4952 e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe 88 PID 4616 wrote to memory of 1576 4616 Logo1_.exe 89 PID 4616 wrote to memory of 1576 4616 Logo1_.exe 89 PID 4616 wrote to memory of 1576 4616 Logo1_.exe 89 PID 1576 wrote to memory of 2340 1576 net.exe 92 PID 1576 wrote to memory of 2340 1576 net.exe 92 PID 1576 wrote to memory of 2340 1576 net.exe 92 PID 2052 wrote to memory of 1664 2052 cmd.exe 93 PID 2052 wrote to memory of 1664 2052 cmd.exe 93 PID 2052 wrote to memory of 1664 2052 cmd.exe 93 PID 4616 wrote to memory of 3512 4616 Logo1_.exe 57 PID 4616 wrote to memory of 3512 4616 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe"C:\Users\Admin\AppData\Local\Temp\e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3CF9.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe"C:\Users\Admin\AppData\Local\Temp\e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe"4⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2340
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5e11394ce5fd6bf39ce4e5a13e8d06ce1
SHA1b3d71072efad31bc0530e2320497d9d9de776dc8
SHA2560db3e16c9fd5ab054d45f96a6ea3e17b6152fd09a736b91276b4ed97aa7d2198
SHA512b92d76885844e93679b3c0dc954515b7a4f0514475aeffa7a960ebb73fc68a2f63fa647f1e9381d736b814d752c101d5afee680340b1b6d149fce9e8afc1b734
-
Filesize
570KB
MD506cbe611a145b1ab52ba2f709aded1fb
SHA12359b55f53b107e8f94176cd64963e5dde12cf45
SHA256cf0ee09a00203d180ed1827de32e290b935181c1fcfc2ce8270fefc5d6907a13
SHA51295d70f241056b2b1f59d29dcbdc62617354cd9904b75c18a6b2e57eacafdecffb1a96e7b80ea9884150b391d92682ec0396c16ebb02af0174e1229156a930dfd
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5fbdbdde8e3ac3af496dd048db503477a
SHA1413eb54719c656e5667001d20443dd4bb4e1c979
SHA2564b798caed4e0c4f4cb9560a22aca8bc6cfd116538f39af24de697c0b821b87ba
SHA5123f01269f888daaca103edf671ea4263e3b739fa0b811337b991ec7459bd3b671973c730e90f83aa917653602ba1a481930e33c6517a6fc86fd5fbb247ccf2ba2
-
C:\Users\Admin\AppData\Local\Temp\e13fc027e6b4e67b76bb77a70da55425908bbb589aee14ee63763f084a731750.exe.exe
Filesize331KB
MD5298d2699634589bd40fa7a44806263ea
SHA1530dbb1293d5d19d45b87c56be687d536f6a63ce
SHA256bdeeea007b0c4798baffe265e0a9e2ec8e5e7a3a302ba27142cb7e8b1d7fb7c2
SHA5120ce0b0b9f35268110f7623c68eacc64488795a70e92462a1b10e2d97d7840754a82fd8f44d5ab995330b061c05b21e742c8bc64f7843c37d63cd88ba397a6c28
-
Filesize
26KB
MD50dea5c8d1652084c78d53e181c8caa76
SHA1b8ad1aa5589174953c4409aaa41cbbb807a3fe0c
SHA25662c076dbb90c93897710ee6a9548f97d3fb9e1ab2e5b0df2964a7fb32fae19a0
SHA51296267e3286cfb25e71f356f8ddabc364d45e781d8ab5f46ebf5d1e3a0e8397cd54fb4b09d10195305677151fa81cdcaecb635ba416e7467e89698bd2d7ba930e
-
Filesize
9B
MD5e7957b9f3d9556c996418169821a7993
SHA1b7028de0f91d2e50a8d5f6d23613331a2784a142
SHA25671a21a13d7822776d52d9a6146651dc9155db9f0bfbd978acf43d12dea2a8539
SHA51272bc8552047095449fa4c3c21300183acfc7b33e6ab69c11435542e2862cb9e896bbfdedaeb97ec6edac8ed68220507a302d1ed2217624c97f6e9a83c0d3a285