Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe
Resource
win10v2004-20240508-en
General
-
Target
bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe
-
Size
98KB
-
MD5
a8d2f109200c5cf23b5cf8af89b1afb1
-
SHA1
8d8a95477cd6de3e1c3ec0d3c524638a2d49206d
-
SHA256
bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981
-
SHA512
975eeabaeb6b12e8289d3f597d67f53dbc64d2455885c3d8e0ba8d2daa23eaf86399119decd2de797cf9ecca7b55a0ef2686c4be397ac9871b3bb9d71298b699
-
SSDEEP
3072:iftffjmNGZc+rcBwCCgtSDADeak7dJHB/AdIf:yVfjmNI1j8SsQLH5Aaf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1368 Logo1_.exe 1148 bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SlowMotionEditor\Views\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-GB\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ro-RO\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Content\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\eu-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe File created C:\Windows\Logo1_.exe bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2848 2864 bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe 84 PID 2864 wrote to memory of 2848 2864 bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe 84 PID 2864 wrote to memory of 2848 2864 bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe 84 PID 2864 wrote to memory of 1368 2864 bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe 85 PID 2864 wrote to memory of 1368 2864 bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe 85 PID 2864 wrote to memory of 1368 2864 bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe 85 PID 1368 wrote to memory of 1328 1368 Logo1_.exe 86 PID 1368 wrote to memory of 1328 1368 Logo1_.exe 86 PID 1368 wrote to memory of 1328 1368 Logo1_.exe 86 PID 1328 wrote to memory of 1132 1328 net.exe 88 PID 1328 wrote to memory of 1132 1328 net.exe 88 PID 1328 wrote to memory of 1132 1328 net.exe 88 PID 2848 wrote to memory of 1148 2848 cmd.exe 90 PID 2848 wrote to memory of 1148 2848 cmd.exe 90 PID 2848 wrote to memory of 1148 2848 cmd.exe 90 PID 1368 wrote to memory of 3424 1368 Logo1_.exe 56 PID 1368 wrote to memory of 3424 1368 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe"C:\Users\Admin\AppData\Local\Temp\bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5014.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe"C:\Users\Admin\AppData\Local\Temp\bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe"4⤵
- Executes dropped EXE
PID:1148
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1132
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c79a16659c86cef3342d2f1ff2f25ff4
SHA1ebc7bfba76e98fc995876c446fe54485b4fbcc1a
SHA256a4bed974dcea68139338bfdfbcd7ea77f6ba7bc058a6f0c7c7a9b1afa6efa484
SHA5123493b5a956acc7e0fad96215b601c6ba6f44f57e1dcac8542ebb0fb087b1f258dbd17abffedbed9cfb193f18c0af9b9809984a9c177214798c6bd3c7c4205621
-
Filesize
570KB
MD5f289ea1d0f5969c5c7e2c0b134bd3862
SHA1c9659a4451313434fb1903033038dc32b2eb944e
SHA2564fdb13f0a8261393b06493f725dbff89e853962b2adcfb8dfc7faf17f5f38d65
SHA512d443339932d097332b6e7608433441b5940b7f8180858c6c425875c701380aa59776f8d8db2ab72b417376cf5b7c3e7d9166e9c5c3ceaa948cd74b14d1f86a0d
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5ede9f22194a0118814b26dd08056dd45
SHA16862db81abc668371539e9b243120f27659990a2
SHA256913ecf2c909eecba2e68827df01ad1f3d8b5b1d75837f89ed6e55db698a68326
SHA512ac49ac32b5a063934a9c2debd49d7236c9e3edd18670463c344238c634194df5ef12be437774f3cb09c35da0bb76304faa9b9da5f2d7a9d81d166033da08ec2f
-
C:\Users\Admin\AppData\Local\Temp\bf179a55cad583ac6887427794145aaee3c41a26b0d90cee13688f52ac76a981.exe.exe
Filesize72KB
MD58de1084b805b2128076ea32b9b3b2c90
SHA1c7d8795c0e83232fb3222feaa343c0f91039ba92
SHA256c766f215f595d3e34b8fd47aba828e349e9f7f49a6d819667a00b74bef827689
SHA5121f67b1149bf17d5abbf312f16745e7114aa8759b79fd2ca1d773627d9399a49bd75b4786110199d73ba517d59aca898ac1a9cebcb14246c0f9bf26a88193a06d
-
Filesize
26KB
MD5c5882fc9ee8d623bfeb775d0a804082a
SHA11aeee98f122da7f26965c09ec7c5b35666de85e8
SHA256d02841d9030e9af98709cf55ae1de201402d0646e479093e59fc93916c67ced3
SHA512242d58868f9e30c927ac74e68840b80a99cb8963fdd7be7d6203a1dc3874d01aa9a4361827df990f3a3714d771a37422249ca2562ebbb1ac20300eeae5b508e2
-
Filesize
9B
MD57619ead719f9163af9f64f79eeff7c36
SHA17b956c82fba1f4a0ea8b09ca2e39d89159e21b75
SHA256da9af76d7e3938d1bd300436de0d394ef0453f260a69c94905084222eb3fbb45
SHA51229dd3ef54766931036c2f0d755bb3fc89619e548c95658577930a5a748ac2b2855a9e5ee5601697ebbac8a7d435abd4c9e9e2255b0e455e267e0d95358fa86df