Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe
Resource
win10v2004-20240426-en
General
-
Target
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe
-
Size
419KB
-
MD5
ae07471ce4038f0ee5493bbee70a791b
-
SHA1
f49b164e4d57174001a8fde8f552eec5b10957f8
-
SHA256
afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8
-
SHA512
09a65329350cf9f21fe0e4eff436a7c3f254e391b1c44763ebf95d5073cf75b01e8ca23425d9437a08fe6f2391dcbdc8602214f0358fef84b4e84d0d25aa277e
-
SSDEEP
12288:+7+NnW3gaHC2zUM2WJoROZVXk8hbodzbTw8x0Cx+:+7AWx5k8hb0HTw+x
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1808 Logo1_.exe 4000 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\fxr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lv-LV\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\CoreEngine\Data\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\he-il\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe File created C:\Windows\Logo1_.exe afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3700 wrote to memory of 2652 3700 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 81 PID 3700 wrote to memory of 2652 3700 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 81 PID 3700 wrote to memory of 2652 3700 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 81 PID 3700 wrote to memory of 1808 3700 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 82 PID 3700 wrote to memory of 1808 3700 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 82 PID 3700 wrote to memory of 1808 3700 afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe 82 PID 1808 wrote to memory of 2184 1808 Logo1_.exe 83 PID 1808 wrote to memory of 2184 1808 Logo1_.exe 83 PID 1808 wrote to memory of 2184 1808 Logo1_.exe 83 PID 2184 wrote to memory of 968 2184 net.exe 86 PID 2184 wrote to memory of 968 2184 net.exe 86 PID 2184 wrote to memory of 968 2184 net.exe 86 PID 2652 wrote to memory of 4000 2652 cmd.exe 87 PID 2652 wrote to memory of 4000 2652 cmd.exe 87 PID 1808 wrote to memory of 3404 1808 Logo1_.exe 56 PID 1808 wrote to memory of 3404 1808 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a2599.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe"4⤵
- Executes dropped EXE
PID:4000
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:968
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD554c5bafca47fd98082775cde150baca5
SHA1d690d232c9fe3c96c08b0c6f09f33247dbbfa24d
SHA25602a54f80ef13a162345855375dcbf2ad3d5fcbe40fbc39faa41442490b4e95dc
SHA512114df1cb4f212c607d6219ff576357231a7b7b5cb710a269de4dd8d6dca47ccf6962d6412e72c7cad255a41a0bab266d8bfc91cf4051574a29eb8d26993b916b
-
Filesize
570KB
MD5a0f10dd4fca7cba1e1c14cf8f06eaafa
SHA16551d6efe33694aa7eb53be0f74f7dcd8f8818df
SHA256d673a3aebc3722e2f8cbaf65f21a7d0909f6950b3c49bbfe944fa49c85acc181
SHA51293a5a3fcd450706c28f351390378ca3aed95697986788f2503b3798a7a865e72434bb0ea07c9973a91acdbc42a7fefd27a8adc3db69f4b738727c43100253f4a
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5c4e309fe1b5e8f3ca4b8827ff924355d
SHA10f95c4c72d72a0c312c183f89dce89117b1374a4
SHA2562b94b3c56843cf37c13473844dfabf1ae3c771d7d9a80ffdc4ba6b0d6ca31635
SHA5129b81d77b76fc41b71e8157439b8f70141698a39cb90f8e7841aac1b8d32f0516ebc28ea1f57076a930455582a8951e0707e9bc7bf98192791a2a2037a2256bb4
-
C:\Users\Admin\AppData\Local\Temp\afccb8fdcb2f0344a71a8dfd8389ba8babadab42ac662b4908f5eb11c2158ad8.exe.exe
Filesize392KB
MD5ec3fd88c7b552c1e380b4819a6dbacf2
SHA1d1213f26e8fd6975a975b52e2677dc02a4a4d85e
SHA25614b33d10bb9ac0081d66137295ca0653665cc7299d5508bb08e7494e8ce5ab0a
SHA512edcd243df3429652c052c9a0d7dd57ee141d5743d2bf8f7d5bd0c6c9a27d40da6da39d6da2582837268276a2ed4133a37b84d998ecbc6a61bbe15b09148ee798
-
Filesize
26KB
MD5a0a0986d9acf60095b1f86eeb6c1e0bd
SHA1e90f018d99d4af17f0c3df0203db71c45d7a20d1
SHA256adade822b1c385b01ba5d19dfd6d3140a0951df0c572802cfbe34c4c5157203b
SHA5129ae080c368e1d1809a251bbf71efbcfc6678f67c55c8a230afc8fbbde82283e9b44411923cf4f76a79c07d99f6507e85d441e6b99a84fd8c8da134447e3caa85
-
Filesize
8B
MD59bf5ad0e8bbf0ba1630c244358e5c6dd
SHA125918532222a7063195beeb76980b6ec9e59e19a
SHA256551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f
SHA5127fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3