Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe
Resource
win10v2004-20240508-en
General
-
Target
e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe
-
Size
865KB
-
MD5
17688b1b4d2abb1d917ec2df13c28b8a
-
SHA1
6435b68bb4c61e62c2e404c07ab45724a0b09d7a
-
SHA256
e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3
-
SHA512
26516a9a2e94fd0308dd4d5aaea27f9e33a81d37a2338dc916e96e8779671a0c342e9ff1b91d822b6578750b59e2094df8320fa45e0aa9023802ef9e271d0e84
-
SSDEEP
12288:67+YmGcUyqmUPibSSEfkH9XEQzMQKGywbouS3/dZyek0YEmG4wLGcjj:673c/qmxSSv96QKGywU/dZHk0wwl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3588 Logo1_.exe 436 e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MLModels\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-standard\theme-dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-Toolkit\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sv-SE\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\beeps\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-gb\locimages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Temp\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe File created C:\Windows\Logo1_.exe e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe 3588 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1020 wrote to memory of 3652 1020 e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe 82 PID 1020 wrote to memory of 3652 1020 e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe 82 PID 1020 wrote to memory of 3652 1020 e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe 82 PID 1020 wrote to memory of 3588 1020 e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe 83 PID 1020 wrote to memory of 3588 1020 e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe 83 PID 1020 wrote to memory of 3588 1020 e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe 83 PID 3588 wrote to memory of 5036 3588 Logo1_.exe 84 PID 3588 wrote to memory of 5036 3588 Logo1_.exe 84 PID 3588 wrote to memory of 5036 3588 Logo1_.exe 84 PID 5036 wrote to memory of 4084 5036 net.exe 86 PID 5036 wrote to memory of 4084 5036 net.exe 86 PID 5036 wrote to memory of 4084 5036 net.exe 86 PID 3652 wrote to memory of 436 3652 cmd.exe 88 PID 3652 wrote to memory of 436 3652 cmd.exe 88 PID 3652 wrote to memory of 436 3652 cmd.exe 88 PID 3588 wrote to memory of 3572 3588 Logo1_.exe 56 PID 3588 wrote to memory of 3572 3588 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe"C:\Users\Admin\AppData\Local\Temp\e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4C4B.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe"C:\Users\Admin\AppData\Local\Temp\e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe"4⤵
- Executes dropped EXE
PID:436
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4084
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD572b99dfcd0b23e9094aee6f7a1def0f8
SHA136885e24c7e36ebdfaa4724bf4f96c90da988d75
SHA25609044ca2f83a6dbff35ab754a6b6f11932cce35455b70e84640d5492d6c0dcad
SHA5126aa1bba5e77e14104fe45d26d490e00ff797370b6055ba7907cfb26c126b13d0529513f9af5ebb2f36c7ad3a68f1b598694d0272abbc0aae28b44ed52fe2bf20
-
Filesize
570KB
MD52209b0b37ab08bfdec7b161a893241eb
SHA14726b88f6bd0a54a34bd1e84d194ef5beb725a8b
SHA256b616a0a8d7e878ca1569bc609839a20580f830280d96390bdd244baee2222968
SHA512f6433d5e872b8461dc8d3101a6c381d2d42ff0aed9b9e07e86713b9cdb2e6720773b1008b6ec9721e992c40910ac655836bf3fd78d8c3c618ec1343c80ee40be
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD585a5baa11f9c59db988c30919a9aab00
SHA131d41bf8294062df6fbeed746dd811dbcb4436b4
SHA256a5ee75a3d5e0337ff3f2ecf55af3856500f46fbec0e8a61e2dadb27db3fb2bd7
SHA512358def958269c40c5f3289248f5df31682f5391df9322eacb982c02c15fb73934356fbd00637195490f5980ff692204479a9ac9a1f206017680fc42a6454710a
-
C:\Users\Admin\AppData\Local\Temp\e367e4cd755fd5114ee3075bd36a27066aba2f26d2215958d4505ff598d822a3.exe.exe
Filesize839KB
MD52dc20ebaee6c5cccaa6c2fa0d5cc86e2
SHA1f6ecf624b1e1145840081f70af616cfb2af7280d
SHA2569dec1aaeb3d1981272a3a82100ebb8857e06e31ff48c0caed87731eec916a4ff
SHA51226a32d1cbf0a6e84fc2986718ee439b45feb99eba7917dff70efca1da5b2808d82db20dc30b2108e3350ba238e9974609894b762119eb7645c2295049b8fe3ea
-
Filesize
26KB
MD51ade1164062b044615db79509a3b07af
SHA1f0f6e65c86c3e6777b190e6069345d4f1983fa06
SHA2564c639c610499b684fa989953950dbca7bafd3ddd275d028265448902d058094a
SHA5124b033a0c7df0ebb12b44c8ad0fdb24d6ffa6cc122a31ef442cdc8275640dbcc43ff1ab35464aad790231fbfb43b5968891abbed9ee2f2eda9ce815bbca57bfd0
-
Filesize
9B
MD5a470ca2426c102d035971b2e504d921b
SHA11720ef61e5c8e2ad6da9992a78940228fc81d615
SHA25613721d3153b316d1b54c64b67de19ae5147cb78e332448e6b800f6d510c269f5
SHA512c12907d26eac47d219aaa47b11d243738b0e698f898f9f2bd199652bc094197227ce12bc5fc96f5da25f1fd7b5904fe71ee3792105b05ac13a135d89aa1c1831