Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe
Resource
win10v2004-20240611-en
General
-
Target
cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe
-
Size
959KB
-
MD5
5d2d3f8ac618ff5e41745aa8493c8cf4
-
SHA1
7b47ba7124b23f4012a94cc11e5c7b712dd85b6f
-
SHA256
cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2
-
SHA512
2fb22c6556fd74e37ddfc49971625b46e2ad33c5857b9ded9ad74d817cac96630a6b2a1b0d4ab5ad29c1ff20da5e46a0f9c600e5c18ddc5dad0b0d3c3852f013
-
SSDEEP
12288:kRKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:JBpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1040 Logo1_.exe 3568 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\default_apps\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Speech\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ru-RU\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\th-TH\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe File created C:\Windows\Logo1_.exe cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe 1040 Logo1_.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3568 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe Token: 35 3568 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4808 4332 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe 82 PID 4332 wrote to memory of 4808 4332 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe 82 PID 4332 wrote to memory of 4808 4332 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe 82 PID 4332 wrote to memory of 1040 4332 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe 83 PID 4332 wrote to memory of 1040 4332 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe 83 PID 4332 wrote to memory of 1040 4332 cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe 83 PID 1040 wrote to memory of 1292 1040 Logo1_.exe 84 PID 1040 wrote to memory of 1292 1040 Logo1_.exe 84 PID 1040 wrote to memory of 1292 1040 Logo1_.exe 84 PID 1292 wrote to memory of 1620 1292 net.exe 86 PID 1292 wrote to memory of 1620 1292 net.exe 86 PID 1292 wrote to memory of 1620 1292 net.exe 86 PID 4808 wrote to memory of 3568 4808 cmd.exe 88 PID 4808 wrote to memory of 3568 4808 cmd.exe 88 PID 1040 wrote to memory of 3460 1040 Logo1_.exe 56 PID 1040 wrote to memory of 3460 1040 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe"C:\Users\Admin\AppData\Local\Temp\cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a35C5.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe"C:\Users\Admin\AppData\Local\Temp\cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD51c6550eaee43182bf9e35c8b58e53ea1
SHA1dcc4f985c8317236e6c80f955711ac9610e65b01
SHA2565cbb1c5a14d9efec6356239f432c3771815ec861034153a4a01ddd64197362e9
SHA512e2022d7d803dc67b79e245a83d011352c295f9c43b7b4fb382c8d68cbc2a729345789d08b4c91e4239a523518c53ec6a28514cd9033cdf7008083d4f329ce9f3
-
Filesize
256KB
MD5b39776fba4b71497a74e8ff7d52e5b7b
SHA126cc92bc381c17fcd4ade9fa264c1f5ca96e2702
SHA256079a96b833a83632872292eabeff8a8348fc89e9ad037f4944c783aec66b14cd
SHA512d339e8d68165c7a0ec7cf5a5f7b5cc8d48db0fc83f43e9f1cdaa558ae2a9077f022aca2e3cc479b69919b7a6df18387eb70de8fccb9196dcefc5f03df1c6c57d
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5101120e6cf9fd094f14d80bad4a6dc48
SHA1ee0021a8c05d9e8e70cdc35162a4b9d7d8a7bda5
SHA2569594d63c4d42c1cda0de3f76c6d74d28a2fa2e0e489c59e94ce82f9b2d235ed5
SHA5121b94af438081fe5d1501f5636c53405e5b0d3849b7cd4764711e62b3628ca93638e78d5097d9d81d396303ce5ceae8851ddad15cf856507a2d7796f124f49995
-
Filesize
722B
MD505eff7ac38020b74f719e00e6f304ad5
SHA1ed305869798b20f59ffd0b7297105648115b3378
SHA25670d095be9821f66225e69844b351fc8d9abc2772875fa6855db39d1700294f70
SHA5129d2ae4d72dc4581fd6a6ce4e974a5277671e4becbca5b31b237ecbd3504ac48ee2b32d9154740ed54929160d94c3276952ccfd814a54ad2969c4edca4c8e1085
-
C:\Users\Admin\AppData\Local\Temp\cc9799e73e7d7378868610ead47bd9fcc8e0b7b2114fa972128f49df70c864e2.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
29KB
MD53e905af44525ae41bac2cd0c768ff3fd
SHA15541cb5ea4e36123be9d93a63c6374ca532c3b36
SHA25612ac2567f5a9c10e10d4ae42305278d2a342629a943109978ae14dc90ce8fef3
SHA512e8c203087dfbdb6648ac683622940a2507735a723bc13c450ed3130704537116dc9a762a732c1daaa4d880439ce2c29b1987181a1007ff665892865194e21d93
-
Filesize
9B
MD5f0a92d08416cb87dc153ea387c708411
SHA137c1e98506bdb3d5ea2e7fcb62bb91c9bf5b4fb1
SHA256478ccf01e44e5bd446e37007b199568a73c0452e34ce917945fd820710107464
SHA5121dd7d96307c01abb2985ed1d39617787563174f5b90df9786106259ea12a08bdf39662c440bdc4b3ac4f6bb499a4aaf058ed18e06ef72be5f82f01b7150ec9a5