Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe
Resource
win10v2004-20240508-en
General
-
Target
c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe
-
Size
515KB
-
MD5
20e02be51c1ff69bb57d36541f46ca37
-
SHA1
06e01e0fb8b5a9e0c2b29e771b8eff52f3b5046a
-
SHA256
c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82
-
SHA512
4ecac9ff8c608bb77c9dd2fe864b26c5dfb2d4ba6868dd1250e0c37ea77d9d3ed4c1102bed599c7dbb1a75ebcac70bada5b99f314bdc67515265fab003dc200e
-
SSDEEP
6144:5uJeVK6qoJmiqV3Iv0dQwxOWMYty+Nm6lxpvc5ihULkfIExFaHxXCD1wBJQcYbVC:JVKGW00SgOWMY5NmIvc5KfxHaFJB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4484 Logo1_.exe 4708 c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kab\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\libs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.187.37\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\include\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\EBWebView\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\ResiliencyLinks\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.187.37\MicrosoftEdgeUpdateBroker.exe Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fa-IR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\copilot_provider_msix\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe File created C:\Windows\Logo1_.exe c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe 4484 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4456 3240 c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe 90 PID 3240 wrote to memory of 4456 3240 c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe 90 PID 3240 wrote to memory of 4456 3240 c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe 90 PID 3240 wrote to memory of 4484 3240 c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe 91 PID 3240 wrote to memory of 4484 3240 c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe 91 PID 3240 wrote to memory of 4484 3240 c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe 91 PID 4484 wrote to memory of 4980 4484 Logo1_.exe 93 PID 4484 wrote to memory of 4980 4484 Logo1_.exe 93 PID 4484 wrote to memory of 4980 4484 Logo1_.exe 93 PID 4980 wrote to memory of 2552 4980 net.exe 95 PID 4980 wrote to memory of 2552 4980 net.exe 95 PID 4980 wrote to memory of 2552 4980 net.exe 95 PID 4456 wrote to memory of 4708 4456 cmd.exe 96 PID 4456 wrote to memory of 4708 4456 cmd.exe 96 PID 4456 wrote to memory of 4708 4456 cmd.exe 96 PID 4484 wrote to memory of 3524 4484 Logo1_.exe 56 PID 4484 wrote to memory of 3524 4484 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe"C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE6D6.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe"C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe"4⤵
- Executes dropped EXE
PID:4708
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2552
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4424 /prefetch:81⤵PID:3084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD515fc4128f757c2330dffa91f5545b44e
SHA11be43151179b1727f754a129c6222b0936bef468
SHA2562d909fc004a3492877512429c5d08df6161f63353bbb557a64b50d0e21bb2a49
SHA512b0a666b25a5e938561d792aa969b4f007aafef8063d731c36fa02f57d2df0065f10e8d0827488c8dc6e3243c6b749bc64ed73b8a64ccad471362f3cfd16dddc2
-
Filesize
573KB
MD576f559d129c4a8a436eb4a818b604c95
SHA115336c874b83bfff0293888cd50582e31de77ada
SHA256d3d57c3c00392b40e291978f67e1929ba19567c3fe846a7bd2f1849fb8b4c43e
SHA51237d931ef112428bf3f5e7d035129f826e0d9685c41616dfcb4be6527a47aeb4d9c543efbdfe5a7f9b9ac0df708d6755b554203c5ae98ef7857891289c7d05fc5
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5f727e821e2918b7d1a807a953accbce7
SHA105ca4e9031a99a76be39f38d9330b2b907d9769b
SHA256a6b2c3ece60b03faa52851b97f62d9aac709fb175aa4ff4dbc097f4c6c0ac3ef
SHA5123b27c3a93b1e14cfec4e968bff43fd2590b7e6ce69a3228ce02fe7dc936988547f2ae771406983e9b348224a5227ce274fbfd3e1a3024c8f4c68a4dacc450e39
-
Filesize
722B
MD59222504d0515c2626da2283d8c0e9040
SHA146a51b4448cccb6c9330d369a0e07060b2f3aed1
SHA25683feaaab2624930b5e27b2c02e973cc2f4824880bc0cccf4b141fd4bee3a3a5b
SHA5128f436f2c59acfe4084e49d277a16e5da57571f1fc3fa1987df494475a8b7f1db38734688d08013bb91e037369bde0d96d2d7e2e24623b161ae3b6320ebe6b5cd
-
C:\Users\Admin\AppData\Local\Temp\c8d0a50a2fe566f6e52f19e702165e00c2408d6eaefc3092d0e4adefec737c82.exe.exe
Filesize486KB
MD50319d23a5b85b2fd83da101229a0784b
SHA1876ef2ab9d62f80ed7c691715123f9ebe4e07e6e
SHA2564ee9a5f339076ea65fb17a15a2bcd6a1c21bbd7db7b8fbd7a8ee178c8a3551ae
SHA512c58f23c7cb888e2a6d535b6f11200dd6b0f668b24aa22dea8fe80bf0c0d26ea054c41b7422fc80bd2c7c76783f55c2ca9f874eaa4560f08a805bfddcd639d72a
-
Filesize
29KB
MD5cbb85133030f0d4412d80c949bbaf411
SHA157898b4c8d29336bb66a7e0db0d612e97777d5e8
SHA2562e1e7e6847838b8a544662092e1293c560f5339dd60b2c863465a5e2f2e026d7
SHA512d58bcc296ee8b679bdb0506d91dd64e676d24a09a9bf7f23cff1b618af1569ae4efbd8a920e1fd07eb289df8edc09488fb24cff15312c721d110f2ccd31515e6
-
Filesize
9B
MD5fa1e1ef0fdda97877a13339b28fa95e5
SHA17e2cffca41118e7b2d62963bd940630b15b85653
SHA256968b715c081472526487d60da8968e9b3bde2dac103f69beb3f6abe6ef7bc191
SHA5123d55913a97aa89a7201342705640c1d031d19ad8aca4939219067f84e3fe118f47b4e388f490f69f605683d3854425c3de188f731886405474ae8e3d42c86f4f