Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe
Resource
win10v2004-20240611-en
General
-
Target
f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe
-
Size
1.6MB
-
MD5
884c0ead1c815acf853a62b95dfbcec0
-
SHA1
1d6c935625965f1b817c427a3d3d1a6994d44220
-
SHA256
f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b
-
SHA512
145decf83b5cc35c52f5629f4b25d594544b95c2ba703ca0064a31e604864706e5db6a304784f619b92a6a83655bb447566111499833b9c5944110a1a067abcb
-
SSDEEP
49152:YKGI+vq2O0VTeBLrkhS4tYO+CRYLwzGtsv:hD+vq2O0Vg4kOOs
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3364 Logo1_.exe 612 f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Retail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notificationsUI\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\themes\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\archives\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Extensions\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe File created C:\Windows\Logo1_.exe f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe 3364 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 552 wrote to memory of 1116 552 f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe 81 PID 552 wrote to memory of 1116 552 f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe 81 PID 552 wrote to memory of 1116 552 f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe 81 PID 552 wrote to memory of 3364 552 f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe 82 PID 552 wrote to memory of 3364 552 f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe 82 PID 552 wrote to memory of 3364 552 f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe 82 PID 3364 wrote to memory of 1156 3364 Logo1_.exe 84 PID 3364 wrote to memory of 1156 3364 Logo1_.exe 84 PID 3364 wrote to memory of 1156 3364 Logo1_.exe 84 PID 1156 wrote to memory of 1900 1156 net.exe 86 PID 1156 wrote to memory of 1900 1156 net.exe 86 PID 1156 wrote to memory of 1900 1156 net.exe 86 PID 1116 wrote to memory of 612 1116 cmd.exe 87 PID 1116 wrote to memory of 612 1116 cmd.exe 87 PID 1116 wrote to memory of 612 1116 cmd.exe 87 PID 3364 wrote to memory of 3420 3364 Logo1_.exe 56 PID 3364 wrote to memory of 3420 3364 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe"C:\Users\Admin\AppData\Local\Temp\f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a349D.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe"C:\Users\Admin\AppData\Local\Temp\f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe"4⤵
- Executes dropped EXE
PID:612
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1900
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD58011b267fe09a0f278d728504004ebee
SHA1d31cdea2d988fb6311a1aa14d7475b09e292123d
SHA2567a051922d98a11c13535024ddbd6de98a596f64054925d845c96b92b0ee0bbb6
SHA5124ce17a875d3f48650e1e304607886dff288a2ff0705d1a12bd2c2bb3738cf73248b27d110dd94c9f801c14529914263422b649db8bada41f386423b3f06e5233
-
Filesize
573KB
MD52cc45aadd812f10d4b24987afd5127ec
SHA163b2a999adc0db584c63a2d8e2d28db647018542
SHA256b5d9724e2ce48ef1aeee88f7d7d56c27003282aac83718510ef9d70bbc3fd416
SHA51281b81cd547909c20b03e2b8b25a7b9fe1eefbdb52dd0a7c1c42d1c698f3ede1b152b0d71d3c6933ab901e0023d8bd983b3bf6a263ac2b9d5fa3f3073a1d53fbd
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5f1a31b2ce27caa12b0c83698d2266dbe
SHA141d0f0731185588db910853ce965e677bd2e53e5
SHA256c013780783b3c6105da7ffd4b46452fadec0336c22a310fc20a3b67778855105
SHA512a12d12be843f39c38bc6e596c08760744bf07f4a06636a592a883989ec4467b76b9ca6b859bfd997a9d6cb85e3abbac82729e71ea989df9d3ba065e740e12206
-
Filesize
722B
MD5cebb44a926989ac518aee7e39b20b01c
SHA1ec17a0f9e7fe0b091a2f36dcfa2fcf174fd1c1b4
SHA256b3176183383a7515aac3e2430ffc5da69f5735cfcdb5f75bbd8e7c4c0766a2d2
SHA51284a62b5c21cd1a9ca692ca477e245a273f5ae0eb25d7d4bde2b7655b067daedbc3cc01d21edcf2937cd6c870c7ea30879cc60cfda84ee35bf9255a460186caff
-
C:\Users\Admin\AppData\Local\Temp\f7208dcc2a1781b4f96afb35ef53832c1caddff62f4057d22e978653f66a302b.exe.exe
Filesize1.5MB
MD5b2b5b6682dd5150cb57d31db870eef3b
SHA17f44ed3f081152a3f04a477e110efa78e9ade696
SHA256c43fb747dfec79ac87b051c7ece996bdb5ecfb2b7b9c9e07f8bcc0e3dd491dff
SHA5122bd23181199659e7c719238b87502d7937d9ffc5043b04b4994a300488040dffaa886fe16468e8a8f6073aaa63a3c24c10f15f333794412d2ac965569de6f50a
-
Filesize
29KB
MD588cfadddb80942ffda91f38ea73566cd
SHA16b48836f549c73aa2951d183289d375bcf62ed86
SHA256df77ecc6b413be28d481ddb8ab55679be93772fe8e25f0b06ce7737a2d8ab5e6
SHA512a3e0cfd7f3e2f1c1c2fedf3a17d93cfbe75d159fa8a4121d70473b215e4aa2091ee5fc3f2bba6ea68179bf881b5a4e0bc4523fcbf5ba935f5349a1b9ee5977a4
-
Filesize
9B
MD54f2460b507685f7d7bfe6393f335f1c9
SHA1378d42f114b1515872e58de6662373af31ab8c7b
SHA25647a22297ce31d17b0f37251ce63cf2eb146700451caab6dd0aa710d2526c8e42
SHA51275dcca6b81ac47511b847a5c35be4bddbee425436f7bfd1347115e18b84f52a16a5c517bda0a5f5d0a1f2541aab80d764932d8018538cb112fa3b6c9977e95eb