Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe
Resource
win10v2004-20240426-en
General
-
Target
7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe
-
Size
82KB
-
MD5
e58efea183cdaaa34ce17681d2718dc4
-
SHA1
93b3be577a51e66cc06365a8544a8ca544e064aa
-
SHA256
7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787
-
SHA512
b06e26ae12fd8562afdf8357baa98d5b1593b8526d9184498d0bf244451454076b937020e957ef92252d7991a9ba9c08bdd7d129c03fc01961d75696720410c0
-
SSDEEP
1536:gfgLdQAQfcfymNHjcrdfPeFV1fjbqnjgRYXJq1SmB7JxU:gftffjmNHjcrdE7fjOI1SSw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4504 Logo1_.exe 2508 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Configuration\Schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\af-ZA\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\uk-UA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\Controls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe File created C:\Windows\Logo1_.exe 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe 4504 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 6100 wrote to memory of 3468 6100 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe 82 PID 6100 wrote to memory of 3468 6100 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe 82 PID 6100 wrote to memory of 3468 6100 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe 82 PID 6100 wrote to memory of 4504 6100 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe 83 PID 6100 wrote to memory of 4504 6100 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe 83 PID 6100 wrote to memory of 4504 6100 7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe 83 PID 4504 wrote to memory of 3808 4504 Logo1_.exe 84 PID 4504 wrote to memory of 3808 4504 Logo1_.exe 84 PID 4504 wrote to memory of 3808 4504 Logo1_.exe 84 PID 3808 wrote to memory of 2656 3808 net.exe 87 PID 3808 wrote to memory of 2656 3808 net.exe 87 PID 3808 wrote to memory of 2656 3808 net.exe 87 PID 3468 wrote to memory of 2508 3468 cmd.exe 88 PID 3468 wrote to memory of 2508 3468 cmd.exe 88 PID 3468 wrote to memory of 2508 3468 cmd.exe 88 PID 4504 wrote to memory of 3500 4504 Logo1_.exe 55 PID 4504 wrote to memory of 3500 4504 Logo1_.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe"C:\Users\Admin\AppData\Local\Temp\7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:6100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a2FAB.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe"C:\Users\Admin\AppData\Local\Temp\7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe"4⤵
- Executes dropped EXE
PID:2508
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2656
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5cc1433855d3007b8e23db2928fab3e8b
SHA1b5bfab4aa8291161fb06da630817341d93cccd6a
SHA256322e7846f65b2bf5b6a1df6d589c7a90d04407fa996fd1aa6af7f231f332356e
SHA5126fc0f2b100380d8d8c3ace949c9804bdebef60353c803ed8b38b381c8533d598fc91f14cdfd24c30cc0a349e5549b9d34bc585758d6fcfa055242bb2c4d2b3b1
-
Filesize
885KB
MD547eff006922a8f63b1d804b7bb6aa9d9
SHA12e1cb28dd6db483b35e009c7c5b22cb18c0f6692
SHA2563cde8e2789723d519f7a8e0d58aeae3d52bda987f59417745df181a78fbe8e33
SHA512b99ae712f6c82493acc60e5d9d668623c538c74ad574c700180fca4e372473e51aec80d6d5ec7e5e8190f1fae00b39fcf1e13f40f4f5f804d42acb06872308df
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD542e12f45fdb336e356238d9a3511cc36
SHA190416e7344d33424f4bc47630dba743f5e0f457a
SHA25628fef896a1b56ba192b646c0a0074163d483c124727bc7bca970f8c6ebae6eca
SHA512e2d99fe2600da84395aba8f48213053b772aa039d3f8d02290d037a815ad75828a2b3e24ec2cc63f2642846bad534f06ba15012a4677cb5b79abab9e4cdfeb9f
-
C:\Users\Admin\AppData\Local\Temp\7e5d4378ee4f0ca9b51606e1fdc49308a5d966d4e56503bd5aa271c92b4eb787.exe.exe
Filesize55KB
MD50c012649a1318b556959f741a40144bc
SHA1e4c41494a7fdaf4bc1e3bed097fbfcfddff44994
SHA2561672056a1802d470325e54de9e40b4ef50ae74767950cf37a5536b6c605fbddd
SHA512d89641ab83774547bf93873e679366a9395a28b94f372236029bcccb9a046e65f5093ecfa6f872cbcf58e970945993797283d08d8a6f4b2834256a289397f412
-
Filesize
26KB
MD58c1c53a89dbd4ed410752c8373d31d4d
SHA1fffbcec8de5833946ef316bd404bac3f431a8200
SHA25680f1db329507dc01cc19447634fd21e12779dcdf37e32c9b6d0e35fc2ff80f82
SHA5124b42cd180f301a85d667bd02114ef4e3440df85241061e405fe4c7a481a8e90d675392e4597e505e176acecd1046aef8c8bf831092f4ab8f0d38836488cf0af9
-
Filesize
8B
MD51b16d2dbd4281ce4e4e5729c608dcb0b
SHA1851e624080ba5598edb808d4b30fe2d74999ce18
SHA256c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549
SHA512cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59