Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe
Resource
win10v2004-20240508-en
General
-
Target
9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe
-
Size
1.7MB
-
MD5
c93e87bab5e424fd7ba0edcdeb313a7e
-
SHA1
5f0964db1fb325a22f54cf71d4eaf60b7330f8a1
-
SHA256
9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0
-
SHA512
7746d784fd66bc75abcecc296d1494ac1b7467d7552bacc4564f1cd3d204df0ee235f0aa7bd53532f81367bdcf430cd105ce7aa5a9ba522b93faa04be87b1527
-
SSDEEP
49152:57u7jUvtEkqrWVMn7ED2PBB/RtNO6kkiGK+XVow9+wRk74AOixy:oEx6Ffx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4696 Logo1_.exe 2292 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\cef\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe File created C:\Windows\Logo1_.exe 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe 4696 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2556 wrote to memory of 860 2556 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe 81 PID 2556 wrote to memory of 860 2556 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe 81 PID 2556 wrote to memory of 860 2556 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe 81 PID 2556 wrote to memory of 4696 2556 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe 82 PID 2556 wrote to memory of 4696 2556 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe 82 PID 2556 wrote to memory of 4696 2556 9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe 82 PID 4696 wrote to memory of 5104 4696 Logo1_.exe 84 PID 4696 wrote to memory of 5104 4696 Logo1_.exe 84 PID 4696 wrote to memory of 5104 4696 Logo1_.exe 84 PID 5104 wrote to memory of 3376 5104 net.exe 86 PID 5104 wrote to memory of 3376 5104 net.exe 86 PID 5104 wrote to memory of 3376 5104 net.exe 86 PID 860 wrote to memory of 2292 860 cmd.exe 87 PID 860 wrote to memory of 2292 860 cmd.exe 87 PID 4696 wrote to memory of 3580 4696 Logo1_.exe 56 PID 4696 wrote to memory of 3580 4696 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe"C:\Users\Admin\AppData\Local\Temp\9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a88F6.bat3⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe"C:\Users\Admin\AppData\Local\Temp\9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe"4⤵
- Executes dropped EXE
PID:2292
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3376
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c877e15e51c049fbe03188d77d713e06
SHA1e30500169a8fc5fa7b7da7e260594621588a18a4
SHA256314c57d69a95b744d53613719119049a9f8eaf226c0c587f4747a74dc536950c
SHA512cf8f20fd61fcd0ab5eca4376106891672b3599738caed36e5c0761d27d35f75059082979daecbdd9c2f5afaa578a3e9f836497cf216c0548267071e1a44ca3bf
-
Filesize
826KB
MD58ed6d96e9e151d1b522d4ce13d151f7d
SHA1b7d2b12aa6c9f0b4c4d10689b13785aadcef71c8
SHA2567eab9b49dc862e7398934b8a7d1bb013dc88790c7d60c77643822983c5253308
SHA512b2167326bf210a59903a8fb224a42e92ccaf0099d755b93e373a1d064eddb370a4f3e53de8732b79dc6f4995010fbbc391613dd5568f86d2d31886de73d784d7
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD59ea5ee8336c91d8843dadb667096a125
SHA1afe1013ef0aa36e2973037be4debc72b9790c52d
SHA2562cc75217bd58781a5baafef4fd15a2f36c88cde99dd5ad0facea223fdf37da73
SHA5129a7426910d7c82484e41ef303a382fe2dd9e9a8d31cf21dc3b283737becec9410c8da6529fdb123238b2af14c3e90fda6ea481bcb572403cad59e29fe84e73de
-
C:\Users\Admin\AppData\Local\Temp\9eba9b4bea81a1cfe85ad6b379edebeea795fdaa9f0043acdde8846fce28ada0.exe.exe
Filesize1.7MB
MD562cf04a46fc7c20abce989f24e17b31e
SHA1c4cb7c017d0a9b067feea23e93ebb608fbbefaa9
SHA256132f31a5b069bbcb217abaea91aed68e7f69fca18c2554b0c537f8d5522ca105
SHA51244ada6ac6c24da93b94089f3004278ed10ba6e170ddf4381dde518c82d8befa73d3be8332753d44fb9e081c336551a8aff06727d9cb6776b9271f64fc299ae3e
-
Filesize
26KB
MD5f838598fddfbb3c54092e8d6bd760d6d
SHA1b322769a884a4e3505c53637f4fccfc3ed8a54be
SHA256723b596129b06374c153becb6a456b0a0a457a400dd0bb6a5749ac5b97e478b8
SHA512a74e99037419beb446cda724caf0a46399caae812fc47fdf6ee672229b27ab7856cf437ff2966d6c80d2f6751deb9022f2fdd55ed2129a4a56e8b1396fa0c7d1
-
Filesize
9B
MD52822854d33e24347f613c750df46b810
SHA1c2ea2529c032aa552d5a8301900cf27fc0f6045c
SHA25673f2f888bdeaf9427c7aa3355fbe711e6570fb5e9e48c3f64cd229198ce85ad2
SHA51221fff5d14e03a0420d9242a095c2e93ac2b7e6b9e49d12da907394ac9725bb746896721ceded88411895e9630a8ffbface168f0c02630b33300647d3d9e3326c