Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 22:52
Static task
static1
Behavioral task
behavioral1
Sample
cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe
Resource
win10v2004-20240611-en
General
-
Target
cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe
-
Size
41KB
-
MD5
50b14eec56a0583d14fc28bb8cd22617
-
SHA1
fc933f1b398d6d38b728f53faa65753f4c308e25
-
SHA256
cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e
-
SHA512
6301617157cb8b1277bf186a44a5b03cd8135a077434709da33dac171d4f0fe16c5127d32bff1af13b988eb6d815f36a6b6066d375534086979b65d8f38516b5
-
SSDEEP
768:o16GVRu1yK9fMFLKaTxsujCT7pZpYIWQ3655Kv1X/qY1MSd:63SHmLKarIpYIHqaNrFd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 372 Logo1_.exe 2776 cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.AppTk.NativeDirect3d.UAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Notifications\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\8.0.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kn-IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_~_kzf8qxf38zg5c\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app-api\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\versions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe File created C:\Windows\Logo1_.exe cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe 372 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 708 wrote to memory of 2984 708 cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe 83 PID 708 wrote to memory of 2984 708 cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe 83 PID 708 wrote to memory of 2984 708 cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe 83 PID 708 wrote to memory of 372 708 cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe 84 PID 708 wrote to memory of 372 708 cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe 84 PID 708 wrote to memory of 372 708 cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe 84 PID 372 wrote to memory of 1380 372 Logo1_.exe 86 PID 372 wrote to memory of 1380 372 Logo1_.exe 86 PID 372 wrote to memory of 1380 372 Logo1_.exe 86 PID 1380 wrote to memory of 4372 1380 net.exe 88 PID 1380 wrote to memory of 4372 1380 net.exe 88 PID 1380 wrote to memory of 4372 1380 net.exe 88 PID 2984 wrote to memory of 2776 2984 cmd.exe 89 PID 2984 wrote to memory of 2776 2984 cmd.exe 89 PID 2984 wrote to memory of 2776 2984 cmd.exe 89 PID 372 wrote to memory of 3440 372 Logo1_.exe 56 PID 372 wrote to memory of 3440 372 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe"C:\Users\Admin\AppData\Local\Temp\cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a50B0.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe"C:\Users\Admin\AppData\Local\Temp\cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe"4⤵
- Executes dropped EXE
PID:2776
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4372
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5766213568f0906c6e5c54b0192729e32
SHA1a5521d5631cee25d1887e3b48ed1701a95e1acc4
SHA2560aeb982534932cc30d4e1e205c9c8feb8d5ed1b1bbed30efef2e853fe16441d5
SHA5124396605241c7f44e7192dd6077908dc575ebd62f6b02ffd7f7eef04ee908c54777a1d2e3a4e657c1bfe5cdac4d8718bc2b1244ca3a8d85f77db4fd4a60f91bbe
-
Filesize
571KB
MD517c055fc43d16f9fe3584412dba3a94b
SHA15afe4ff7e1e1cd8b58b4fb7d6af2b4bbe5981706
SHA2564850f22db0e02a363166ff5096eeb04be5fdc0895a54c0196c2c456d629601f5
SHA51268753e853069602f5bd989ec1994e0ce7a765cc09bfe336fd777d2729f8b3234fb79ce07e3c07eba7dc5c45a65663a1c7eb61b3a3241b610ae6a6c12a89ea69a
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize637KB
MD59cba1e86016b20490fff38fb45ff4963
SHA1378720d36869d50d06e9ffeef87488fbc2a8c8f7
SHA256a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19
SHA5122f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765
-
Filesize
722B
MD52478b6c69f818340cf8c72632b1a3e94
SHA154d6bd2c707df51c42a669c22f6da557fe3e1eb3
SHA2565d61d7267954c9ad077a0f921ffec98f507ac828fa3eb550ca3effa72c33fd42
SHA5127f53d418ac586ab7fb8459c66d8c2edb69008a4c6f50f1ceeafad2427b5b4343dcf8b5472f757cc2ab2b77a7a3d8bbcf36dc0dce4a1f3675a8dfd70d145806f6
-
C:\Users\Admin\AppData\Local\Temp\cc4120d513204e06bdbf98a27708f2b29c4a21b9cd1e271d56cf0c928fa6b47e.exe.exe
Filesize14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
Filesize
27KB
MD5c1437d8f190ee9fc118320c92f5e2110
SHA18e6dba1e7e6924669a71dc343d77bf0b3d618975
SHA25658ee4de0f7c1838b8d24f47ed0611afbbf2e7026e7586b14b16291dd13df0373
SHA512af658441f05633700442badbdce0c593f410c933c59b3ad82b3ee9faabf1810e1632877b69e7f03c270fd967e57dbde952fca34cbd9cb028bfb54d23f0cf2e32
-
Filesize
9B
MD5874f697d7c26bf1b6cc8a502b53db25d
SHA1fee5430622f05615e68fd229e48f2846796c0795
SHA256d9d05459bc11d078b148543de9eb14643747fbf996790dcf04d2725361251798
SHA51251a722a09c79ef1d6c4a08b3a696b1ca7e34f0e1b0798edb7ebc6c9f596740d9d95c6f4228b9d5012b2472bab03b7998b751a4cbfb6c259229dd853c7fcebb2e