Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 21:39
Static task
static1
Behavioral task
behavioral1
Sample
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
Resource
win10v2004-20240508-en
General
-
Target
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
-
Size
484KB
-
MD5
88977142bdfb752a1cb0a518e7ecffdf
-
SHA1
5bab0edb5850e0dfd4980fbd0cc732535e69cc1b
-
SHA256
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277
-
SHA512
6e651f6f647972b06a9960a9fedc6ef4d5d819170aca85a89791d11366ad7d7982c1e3426b38fc9cd7c6da4675ab1890c6035072b666c1c9bf483e4eaa1112fd
-
SSDEEP
6144:lVfjmNIz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:D7+G1gL5pRTcAkS/3hzN8qE43fm78V
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4448 Logo1_.exe 552 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-Toolkit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_~_kzf8qxf38zg5c\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Speech\en-GB\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\include\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\beeps\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe File created C:\Windows\Logo1_.exe fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe 4448 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3492 wrote to memory of 872 3492 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 90 PID 3492 wrote to memory of 872 3492 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 90 PID 3492 wrote to memory of 872 3492 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 90 PID 3492 wrote to memory of 4448 3492 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 91 PID 3492 wrote to memory of 4448 3492 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 91 PID 3492 wrote to memory of 4448 3492 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 91 PID 4448 wrote to memory of 944 4448 Logo1_.exe 92 PID 4448 wrote to memory of 944 4448 Logo1_.exe 92 PID 4448 wrote to memory of 944 4448 Logo1_.exe 92 PID 944 wrote to memory of 2356 944 net.exe 95 PID 944 wrote to memory of 2356 944 net.exe 95 PID 944 wrote to memory of 2356 944 net.exe 95 PID 872 wrote to memory of 552 872 cmd.exe 96 PID 872 wrote to memory of 552 872 cmd.exe 96 PID 4448 wrote to memory of 3424 4448 Logo1_.exe 56 PID 4448 wrote to memory of 3424 4448 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE3B9.bat3⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"4⤵
- Executes dropped EXE
PID:552
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2356
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1304,i,18168883380598738769,14202261231630113808,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:81⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD52cbf0e13c88dcc4a4f21740219dfc1e5
SHA1c00dbe095e29b77221963148de962312fa51f178
SHA25634af897488657539915345a48106d1dec508abbb3d7867e97d1f59440fe98184
SHA5128929533a3787dc7e2958b6d2a08a2de069e5732cef2187b87c1d7437798091dccf47f7f9d7bdf7ab68c92d97f578d2c24dc5276136a20446d22d1b32085e83a6
-
Filesize
570KB
MD59ea11d57cb1e0cbb174a3b8c4eccf28e
SHA1da7e2faa165c7f060da6d5e6e9f75f448c17e119
SHA256cf0b52099500cd740da5ac40f69242f5fa6ca7d8ebe8729d0987541d068763d5
SHA5123ecefc4d632ac556536d1bc1fddff1a48b1bae6f6b81fe0d35ff399a23d753ba3994b316a0a8a33e4ff5febcf9002a1014a5b0cd2c548c9882a8d3cbf872fe65
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD57c0581e2c34a99e0e6b7b63deb7540d8
SHA12ad688b178321284f2eab56ad02ef1d32e7ea46f
SHA256200d8896a4cf3d442567696ff425b2aeca8b87428173337c4f5b9022ae0d6ab0
SHA5124e65033131dd98ef1eb39d5da1c3a92b8d4c3ca083edb3db7bf9f555e57285f9f5c63bdc4d24cc5aa63312edd216ebc74c0a7f74ed38783e27998a2c013a496e
-
Filesize
722B
MD5f7e0413d818d7960a2484d1f08640df4
SHA1482785a21525ea81510eee5a4709f4cf927b4b07
SHA256391690e588810f5b410ff2cff06e06530886ec861b89e19a9dd716a5dd62d998
SHA512b7b3d8f451da7d4c5dc072695d6118fdca28865d2c4d5f020e217f00e7c9ff86fc77f5e9fc767d429d4b8fc6c28456097dc15078371caef6ee1c0e2a913579a2
-
C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
26KB
MD56bb917e54f07b1f77de86ee02cc2fdca
SHA133c02d2bdacdad19592f68bc30375f798facb53b
SHA256a5076f4ef41e1596ea6b5c37d19ad811af1ac9c659a3a6dc1599bb1b4dbaff80
SHA5121358692ff3b0b2f419bd0fe528294bdba5eee70985ac1aa73a6635b7a30bc471500945d0d82ba1854c087e3097a16e9cebc8ddb7fa4fda3d5fd5a4dfe95ff6b0
-
Filesize
9B
MD5304501c003da3bc5756aa53a757c30cc
SHA194dfcea0ef17f89b3a60a85a07edb4c00170cc1c
SHA2569f4b03cbd52378f329bfc7088f8242bbc1a0a2754bc2f8a40e3b74e0dedecd6e
SHA51278cd3c2cb4cb66e41d8947e1231256c2043d71c77f97e92915e938a6c1d9a8c003512027d98bc71bf582875d269e5fbe6e134f57b25f5f79fe16f9a412387dc8