Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe
Resource
win10v2004-20240508-en
General
-
Target
a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe
-
Size
254KB
-
MD5
4af17c4247b91b6c84e77c5e3d826eef
-
SHA1
ecc2fdc934bb4424f2a731e2c9116fcb32f23dd6
-
SHA256
a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37
-
SHA512
513a6de3cd5173b1786f828ebee5d253189be151ff13cf36a5b5c5f59289cf2615c0f404721e1f76cf680fe02d6d4a412913e6ffbfd4d0749cba8c474ead1f82
-
SSDEEP
6144:0RuJXdgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:eitXqsTkiR7twRx+gD8PJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 848 Logo1_.exe 2908 a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ha-Latn-NG\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Notifications\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\8.0.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notificationsUI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-fr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe File created C:\Windows\Logo1_.exe a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe 848 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3196 3940 a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe 82 PID 3940 wrote to memory of 3196 3940 a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe 82 PID 3940 wrote to memory of 3196 3940 a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe 82 PID 3940 wrote to memory of 848 3940 a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe 83 PID 3940 wrote to memory of 848 3940 a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe 83 PID 3940 wrote to memory of 848 3940 a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe 83 PID 848 wrote to memory of 4916 848 Logo1_.exe 85 PID 848 wrote to memory of 4916 848 Logo1_.exe 85 PID 848 wrote to memory of 4916 848 Logo1_.exe 85 PID 4916 wrote to memory of 3456 4916 net.exe 87 PID 4916 wrote to memory of 3456 4916 net.exe 87 PID 4916 wrote to memory of 3456 4916 net.exe 87 PID 3196 wrote to memory of 2908 3196 cmd.exe 88 PID 3196 wrote to memory of 2908 3196 cmd.exe 88 PID 3196 wrote to memory of 2908 3196 cmd.exe 88 PID 848 wrote to memory of 3488 848 Logo1_.exe 56 PID 848 wrote to memory of 3488 848 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe"C:\Users\Admin\AppData\Local\Temp\a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a48B1.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe"C:\Users\Admin\AppData\Local\Temp\a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe"4⤵
- Executes dropped EXE
PID:2908
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3456
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
573KB
MD5287b36ee0c1a374be462fb5ee5ef526f
SHA1e62811463578140fd7991307f87597e1c0503a2f
SHA25623a9929f0549c0bd52a30d93ff1d63d3b1e40d18b2786e1dd7a87914fb00714c
SHA5125028cf574917fadbd07a72255f85ce79e8dd010340cfd57822b7044f81b8316507f7f53fc868465d39751bce6e58cef01781324550b13b6ea67c8d7a49d6b236
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD512d781cb550497985727ae9ce2dd228f
SHA154a535f956adeacd170d90a89334d6947a2136a3
SHA25674918337be31548b8e9df1ac3274a6169497df4013f46c9d22888a8992848841
SHA5128fbb584c962d900a7b3ca84b0d9888b78ae7aefc4e49423f06eda29f4cdd732034c8bc3499ee41a0b7a7d5c31faebe30204f37c51658f7607f9ed39f5c43ee9a
-
Filesize
722B
MD5b9ba06e29cc801dcccf2424c3a319fa2
SHA163f4fb053b87f2f427b9be21711ffc42af072a4f
SHA256cb6d3034fe48ae737a90f12115cc0dacc5269024360c3f3f0f4033719c107847
SHA5121d07aad3400aa8d291e9bc8d32568dcde47194d8d8eae7f175259e2ef9fc57a640a4ab4b7859ebb2de79b0808b132ccde8fabf543c10288c5878d80672e33fb1
-
C:\Users\Admin\AppData\Local\Temp\a6d64e4de374b69f9fd5bf705bbcdf3b047fa1629bb366cbffa118a6a547af37.exe.exe
Filesize224KB
MD5d4b257c01bbaa68d15d8368475a4e227
SHA1fafae083a882e163cfa8c77258baaab891c17df2
SHA256dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546
SHA512167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502
-
Filesize
29KB
MD5633b83b934d627240d4df007d8db86e5
SHA16a47a845daedddf78a36b056365fb3bc59b98c95
SHA256e3c185a2630c27ea8dfda2d5453557b3aca0e5ef8ed3920789aa11f8bbd17af2
SHA5126ddd34f06b178802017d4bd4b6a79d06e8eea3bad4ce2df6b9648120e7bef20c06f696080e617877f005c350dd9325c4a36818c2417e1acf18b276f9e212e711
-
Filesize
9B
MD5db64fea40b8b0f0d620ef2ecc6eadbca
SHA151736590bfbfbac961899ddcc9be998bfeabd3d5
SHA256946d3f6b9ecc2fa53895526caf79e41850ad594f22a240d93f8bb7eb286d70f8
SHA512b70e24f5930090ac0c9a584f3810d41af8de5562c6b78f6979ea97c929edc18d57bedb9af335d19307aa0db00004aa5a4e553f24ac884365d8bd899d6f3258c0