Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe
Resource
win10v2004-20240508-en
General
-
Target
7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe
-
Size
2.8MB
-
MD5
97f05b2737c77a466b5436e813cbd1fa
-
SHA1
2a45499eddb3b183db718f80938473b7c186ece2
-
SHA256
7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2
-
SHA512
b827eb67a24f20ca33da9516521181dc6a00dc1329b2ae6a6ada83ef3ae8addc73f6876d46e87fdae7184642db1f740f5abb89f409c1e985a911afa7be2a7edb
-
SSDEEP
49152:+6gLKJuMarhVnMFwTH8/giBiBcbk4ZxZ2DqFeVMhuxcPh:zd1XdhBiiMa7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3632 Logo1_.exe 3348 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Extensions\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\110.0.5481.104\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\css\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe 3632 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1052 wrote to memory of 3088 1052 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe 83 PID 1052 wrote to memory of 3088 1052 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe 83 PID 1052 wrote to memory of 3088 1052 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe 83 PID 1052 wrote to memory of 3632 1052 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe 84 PID 1052 wrote to memory of 3632 1052 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe 84 PID 1052 wrote to memory of 3632 1052 7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe 84 PID 3632 wrote to memory of 3448 3632 Logo1_.exe 86 PID 3632 wrote to memory of 3448 3632 Logo1_.exe 86 PID 3632 wrote to memory of 3448 3632 Logo1_.exe 86 PID 3448 wrote to memory of 3016 3448 net.exe 88 PID 3448 wrote to memory of 3016 3448 net.exe 88 PID 3448 wrote to memory of 3016 3448 net.exe 88 PID 3632 wrote to memory of 3472 3632 Logo1_.exe 56 PID 3632 wrote to memory of 3472 3632 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe"C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4006.bat3⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe"C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe"4⤵
- Executes dropped EXE
PID:3348
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3016
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5b3166b305391ff0707753b23e6ea4225
SHA190f45b353714c2fa75bf6fc7d34c7b760a12fe0f
SHA256528b16af9e651ffcc368ff7d0787d4096c8aaf60bef6cb8e9e921028aefea686
SHA51251d20e8b39c654f0a16b5d3c7aed498c3faced12f2908e884febb6f780ffde5b4b5c9cb164019de87111c01c51839ac2d87605c4b35b887de90961b398a2173c
-
Filesize
573KB
MD547fd19a57b03128c736fc2ff6d20ff63
SHA171223ce5c72427e4b81f6fc443a0d6c0f8c76ae5
SHA256ce2835620f122f183d9138679b8bb14d73174fb07ba3762be7ee34c04d27b81e
SHA512d9807b74448b4d0491c9b8a838f610bc39812affa1884d5eac3eb7503a45c2a76a13e2ae942b532e784cedf8c45d22f17f4aa004b65c10f9e83e04687dd82ee6
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5c8d281da4c32df16eef470c27c8cb459
SHA100efc9f6844bfaa37c264b6452c6a7356638ab10
SHA256058c81e5a07f2c6c33cf28dff71d07ad8f179046108d945159957e891bfd9c62
SHA512e3c79e19f620068f668d4ebaa5097f1a95a30dabb8dce75f3787171dddbea9f684fc7ce8d1011a398f38084d7af96dd1ff9a02d25906aab9b13861b8363d24bb
-
Filesize
722B
MD58f93718003100b7e1e2545440b13f234
SHA1bd224734b317ba66c6c6be3c6d7fad08ab2d0c66
SHA256dfdbaebae2c7c50aba97faec7078b5bb953ce706e44931069843195e209e25b2
SHA512b482448a171df6d5fa204ca69a6910052e218d2433b61194a02562150cd39376b91b357aa159f0cc81429489538135bb9a92e4d1356bc2ecbf9f9ccde38a964f
-
C:\Users\Admin\AppData\Local\Temp\7202f3f6a3106f0ca110a548a7dac39d72aba67dd6e050626e08de92020f49e2.exe.exe
Filesize2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
29KB
MD5c1154eebf193b34d928ac7a0d4d1425b
SHA1e412ae088af8d3d6e268ae517e62dc7a7150bf2f
SHA256fd38739477bdd63484e50d2b995923ab7da929db7fa69532e3293d8406f64b54
SHA512017537aa4204c2c327024b4dc9bfa61a36a3f2b64a8898e890e83a33a83e237d2b9749e86b7517da5b265c331171e4054ea6d7cb594743b457821fac3d4f50ac
-
Filesize
9B
MD53ba8d99ae07bfe971a8f27f082803beb
SHA1dbcc6b45ae3dc7be2faab524a0fc7415146f128d
SHA256df296de0196b4b56afab78a4a7d68c1cffc9f7f91ebb05dde41f6c382dbd9af3
SHA512ace344b467ecbdf133c69fd4ead288213167a0cd991088b987083df9a9a5b49d9c1588343a81fea32a5e7e3e3d621beaca6924bbcf92471578133c9c111785b5