Analysis
-
max time kernel
150s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
Resource
win10v2004-20240426-en
General
-
Target
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe
-
Size
9.8MB
-
MD5
ac14f6389b30d5f8f6e3acd47092eacb
-
SHA1
e7b7ec612e57d02147a42f53ff2700c231612d3a
-
SHA256
a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1
-
SHA512
af46bc2ce1a82f2279aff3fc719f5918579bc0b315650d42f20492d5e978650179b716aa3b09e5e155dc5db13f5dfeb6734f8237894adf620efab22f2dfcaf9f
-
SSDEEP
98304:edQ1FMcEk1UmK4ynHw8QF5gKQFUUK3Zm4boQyfqgDBk3p96zbrYLHj0yn0KN/zy4:KuN1UmlYHw8s5YWUYboQ+B0/0KN/zy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4328 Logo1_.exe 3780 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\Content\Shaders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.AppTk.NativeDirect3d.UAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\uz-Latn-UZ\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ca-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe 4328 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2720 wrote to memory of 5904 2720 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 83 PID 2720 wrote to memory of 5904 2720 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 83 PID 2720 wrote to memory of 5904 2720 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 83 PID 2720 wrote to memory of 4328 2720 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 84 PID 2720 wrote to memory of 4328 2720 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 84 PID 2720 wrote to memory of 4328 2720 a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe 84 PID 4328 wrote to memory of 1640 4328 Logo1_.exe 85 PID 4328 wrote to memory of 1640 4328 Logo1_.exe 85 PID 4328 wrote to memory of 1640 4328 Logo1_.exe 85 PID 1640 wrote to memory of 448 1640 net.exe 88 PID 1640 wrote to memory of 448 1640 net.exe 88 PID 1640 wrote to memory of 448 1640 net.exe 88 PID 5904 wrote to memory of 3780 5904 cmd.exe 89 PID 5904 wrote to memory of 3780 5904 cmd.exe 89 PID 5904 wrote to memory of 3780 5904 cmd.exe 89 PID 4328 wrote to memory of 3492 4328 Logo1_.exe 56 PID 4328 wrote to memory of 3492 4328 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3B44.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe"4⤵
- Executes dropped EXE
PID:3780
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:448
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5f47bd89838b4a02cde7d647675c85ce7
SHA1dbb732a83dc463475d840a3644e1307624285137
SHA256c97ecc622176cfe7438bd921d847509cb1863433f81df8a5c2119ca5f43dc1d8
SHA512f95c53762a3788d93a55c2edef1380b7a85d832d0077eb6b2b7432d08a0990050c58d3f9f425030cbfce4b1b97cc86dc3bfef78dbfc876bb1f4fa19419e63300
-
Filesize
573KB
MD56af5660cba761f22c69a9e41ecff5942
SHA1ee5528d7e12a55d0c84456a47cf087018cfdba9a
SHA25643270265064f39c9d8fe0bcb93369d852587ee7d874ce8fac5a71a775f4b3689
SHA512d52431ee2c0c114ddc934d747bc2c4a59ab0b1ce061973ccc6414c892576669b5acc0179936fb95386751dde6164c478aa08f79728660e137f05b3c9c495d7e4
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5ff7ce6c4ffc92d1beca4883dfcfde0af
SHA14a52e320cd88765f13e2799a4980a12f788c98a4
SHA2565a4e150d03f1cfadccd40a407a3ae8ec5ffbb5d28ea95dca136d67cac24fd8b5
SHA51299056bcbb382e545304a33002a6cfbb7a57df663feca5a3842bf077d1126931ba78d5e04a93cbd72a7c6d9eb09005750e5cff1030d8586e26838e7634d7ad583
-
Filesize
722B
MD5e5b0c22ae610bb801d62d0c4f06327c3
SHA1c0e042750b5b5702cc6249b8490a68ff126d45f4
SHA25616ec0b5b064159e501ade0cbd29dd07276e38ba9f26665a0590de10fb74f34c3
SHA512db7ffcdd680c06c904daf67dee903ded3ff29525345b23c6b9e8293966be82d6b9c91df8dc065d954907ef8dd3dec701878548711fc5149d9661aa25242d0844
-
C:\Users\Admin\AppData\Local\Temp\a13222b0ce409143f11c5e89a2ba3296899bfbf7f36b7074e40eb8a7038fcbd1.exe.exe
Filesize9.8MB
MD5cae528636bf78cd4c35a455a120a540d
SHA1cf3238393814b1764a866d14e76b0d63152aae67
SHA2568c5c9105cf270597a16f8b0b78bd6158d68910598617f01118f80768a36bd79e
SHA5128e3faeccf3b4942ac877f77c14ef1686e9fc90cf01972a86e2607c044bda5c0bd660fe4848bebe42b52edc259a03400dc611f4ea59a0fd01ada618d2857da745
-
Filesize
29KB
MD53f5e7c4706e29143aea9c7ce1c0402e9
SHA16fa71c0ae1ea0701d9d7e0caabc266a0c33df54d
SHA2562026a2e28503076f0c685503fff901cbe7120170ade846ad76be13362afe770c
SHA5120199af2ac24604e012003e72cf5bad24a1949a92d2028f39a2400cb109c367f70e1a9779d48b982c70a5f90a542b598fae694360c9caf1b0eec21dd0ed625deb
-
Filesize
9B
MD57e956ef5a6a8d81e557bd13665d22b60
SHA17f7b593a466647d21bf3d554bf1cd4cdead3dee5
SHA25667b987784bfbcfae36a56382dc0e3e7b6254efdccb5cebe31739a398a39c3590
SHA512bf7a5439f4ccca6aa98e658aceb05ea68fc7ce646461f356b57b9edd318c1b0ddea2e8513dd062d750bd67ed810233782d478baa9217e40ad53ab82d43350d63