Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe
Resource
win10v2004-20240426-en
General
-
Target
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe
-
Size
448KB
-
MD5
1a5cb516d1067544c27b5437c759de90
-
SHA1
2b01ae5852cdfb04c36ccba771c0d03cbd384a7d
-
SHA256
c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c
-
SHA512
e385bb3395fc484d8dc86748b8ac721c2b6fd32cac7d23d8f58cb4186482fc3660e4d934a32d24922de120dd34641141d17c819b3554d0e04f63c328d77da52e
-
SSDEEP
6144:IVfjmNeI7O1dVeLjP1HMCnVGtwqkIDRRuuuRLaopCUXdEpfBm2/T3JQu0I:y7+e8OTVsjdBnYmGiVpD2fR/T3yI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1424 Logo1_.exe 3296 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Sigma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-standard\theme-light\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\gl-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedgewebview2.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kn-IN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square310x310\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-150_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sv-SE\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\te-IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe File created C:\Windows\Logo1_.exe c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe 1424 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4356 wrote to memory of 2708 4356 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 83 PID 4356 wrote to memory of 2708 4356 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 83 PID 4356 wrote to memory of 2708 4356 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 83 PID 4356 wrote to memory of 1424 4356 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 85 PID 4356 wrote to memory of 1424 4356 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 85 PID 4356 wrote to memory of 1424 4356 c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe 85 PID 1424 wrote to memory of 880 1424 Logo1_.exe 86 PID 1424 wrote to memory of 880 1424 Logo1_.exe 86 PID 1424 wrote to memory of 880 1424 Logo1_.exe 86 PID 880 wrote to memory of 1528 880 net.exe 88 PID 880 wrote to memory of 1528 880 net.exe 88 PID 880 wrote to memory of 1528 880 net.exe 88 PID 2708 wrote to memory of 3296 2708 cmd.exe 89 PID 2708 wrote to memory of 3296 2708 cmd.exe 89 PID 2708 wrote to memory of 3296 2708 cmd.exe 89 PID 1424 wrote to memory of 3424 1424 Logo1_.exe 57 PID 1424 wrote to memory of 3424 1424 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a326A.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe"4⤵
- Executes dropped EXE
PID:3296
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1528
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD529671a4fad613b8d982b993243965a37
SHA1a8f2f053b0b90ef9ee901a21f423c995bc21c736
SHA25682bd4e119f80b12ee895179ca25b7a5c0d835c9a66f574e8cfcd31a79776c168
SHA512f4485f95e3981c2ea8513ffe56916ba656c8bda9af452b5de1606c74d6b96dd0564af6b7251255f012654fadbac06bf03387bc7efe4e4b4de0e8d6736d5d5a49
-
Filesize
570KB
MD5ae5a0ac788b989fefe6aa89f158e23c3
SHA114f780a526ccb490507a9a615e1b1405ade220a4
SHA256e822de91af998dbeac088695e216f8bb0445bc929f4f69ecd086d237d16035dc
SHA512168305f2a4aa1b12a1ecb8895ed682f74cd4d086a16860f055ea4c1dce80f2ba3f94ae21cf975d85421e0732adbd0b7d0276c66276a5d601f98ae014a550b6a7
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5f6df4fb27cd080f6df19374aec9ec093
SHA1172b8f9f3b8860614404983d9f7bafde9fcbe540
SHA2563748939ed21126630780d79d191ea33f9c7360a54dcba01c7f632da2a32db5b7
SHA5129406ea444a2d8f638a9f84cec8c401f9423014357a48c9d13ba5a47322886b85aa7c4f4210461a5247c411558148c7eb35ee012ac24e2ea08027f82da2d0a66a
-
C:\Users\Admin\AppData\Local\Temp\c24130e1c57cbd6fceac9dd12f7d6be7dcacfcea9c507a26f7774ebb7b1e2f0c.exe.exe
Filesize422KB
MD5787867fe9d0b7eb804c120667c046f79
SHA1be17b9fd53527f6069ed4cfc7431f3ef3eb2a742
SHA25686b4bc327ad0e3bd5ee4fd927cdbee65ffccd75e84d8678f7802d54aa2cf8574
SHA512ee3f9594eb6fa03da41baa9f178177edf2eb4cfb60ffd11d26302dd0c07411680394b23837f08d97b10f39ffbb0ea1f3aa5909b6eabece083b49f943b8deb5bb
-
Filesize
26KB
MD549ed3e230aa53cf4655435949f8f50c9
SHA1d2a2f332fdadd62f660b214bb00eab359a641315
SHA256245a55e61c46ff6f144b44322f1cde9d6ca794cbc9649dfdaa4116862563af83
SHA51253c9d6b09f0d224983beff3d3988b007f6446f8309fe7bf21207b60c49064d0d41734712e59186203ca2bcd8ae3d12eefb613c4cac0e13a1ed0e2c44f3d6983f
-
Filesize
9B
MD5917c6bf65db2dfa12e70e5aa6a061a01
SHA1bd0d9f217fd74efd784ad4a1b41f330b36e64edf
SHA2568ad43ce062fe590809844ebdf64f2eb0f7d32357c89baac5640ff132dfcfdd19
SHA51221a71205a9abfafcf7fef2a1697ae78a6fe14591bef85f86137d5355b5d40e1b8ca810e351256e0dc2973677e9b4452014126d3e5e81b0c3f1fcbd1a087481cb