Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe
Resource
win10v2004-20240508-en
General
-
Target
eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe
-
Size
1.1MB
-
MD5
f03584450015133516824820e3c6e7ad
-
SHA1
40960caad75372d77ff373bf614e90fea82329c3
-
SHA256
eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905
-
SHA512
1596addfae513ce8e404d32e5845c7ff8ec2ab34ffd22383999405c30603010fe8df108c2959c2f0187888d74e0b0a5c44650023d5a23f40de629c500a4c86f8
-
SSDEEP
12288:+7+2RdaQNYEYh4L5UaB1a1bxyOG6KA5bxjvzSdbaJfhBHAwjcwUDmxrPoaXQ:+7dDYh4L5HBOEOGLqrzSdutPcIlPHXQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2536 Logo1_.exe 1388 eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-MX\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Speech\en-GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_CA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\et-EE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\uk-ua\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe File created C:\Windows\Logo1_.exe eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe 2536 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1844 wrote to memory of 3352 1844 eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe 81 PID 1844 wrote to memory of 3352 1844 eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe 81 PID 1844 wrote to memory of 3352 1844 eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe 81 PID 1844 wrote to memory of 2536 1844 eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe 82 PID 1844 wrote to memory of 2536 1844 eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe 82 PID 1844 wrote to memory of 2536 1844 eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe 82 PID 2536 wrote to memory of 4532 2536 Logo1_.exe 84 PID 2536 wrote to memory of 4532 2536 Logo1_.exe 84 PID 2536 wrote to memory of 4532 2536 Logo1_.exe 84 PID 4532 wrote to memory of 4220 4532 net.exe 86 PID 4532 wrote to memory of 4220 4532 net.exe 86 PID 4532 wrote to memory of 4220 4532 net.exe 86 PID 2536 wrote to memory of 3528 2536 Logo1_.exe 56 PID 2536 wrote to memory of 3528 2536 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe"C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7242.bat3⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe"C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe"4⤵
- Executes dropped EXE
PID:1388
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4220
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5017b5ff3fe0c3468438be2ec74cebc30
SHA16c3d43933b458fc53062a5d51b8d9570be6d3e2d
SHA256f23e73059d7cbbe7cc9f6a50932f5aa26d25feaf6e1a32c35cd01fa49183a619
SHA512cb317a0becd259af4982ae63e97a1205c250a9cf09b47fbb0460eb2bcbe93421014f49f72c33b51dcd7517034be9b95b09ab7c0312cd79bf5b41b4fd8df6ac77
-
Filesize
570KB
MD5662ac2ff73a0428213e4fb19ccd5fec3
SHA1bec0ee8e1d7bd1496959d9ef9f043eac07611379
SHA25647f518a26a7052c0d89c3e33c9480ad79557c0aec94b65d6ae6d346234118966
SHA5127b9086833001c5aac552606736d85fc60697c37a13ad606479b1c4de9c12082799de6285c1a6f994dc9b79fc57416c5dddc858d0c54aed4e44bde9c02e825ef1
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD553ee62011469b286a2a1b5658c86b9bf
SHA19bdac0b23b0a965947c780c6a6b48fc7122f9ade
SHA2567125735e4e8595f1c17ff3235bc65dacabc2ec874b29ac7ba8eddd80ad10b3c0
SHA512c9c24e578da0a38048e71548fac66465bcb624e971f745bba559e8c49fd621752e718d4c983a90a97277407bb23348ca109436e1eeebef030c3b599c712ff236
-
Filesize
722B
MD5b52e3a4187c4c4fb9bd9b4ad6555c19a
SHA15039ceef91f9a9b6057202cafd32a7df003b1927
SHA256e94ee5af4b4e8edf80b77409e6d3df1b71719bd0d73fa5ada46fdf8ca79051e3
SHA5120c64809cf43abdecdc31a1889020c42c32547e53c7046f505dd7e3c6ae56fb6fd81287234e307e61cc47db9352194ba39e55df3ba7f691b702cc38d1a2ecfebe
-
C:\Users\Admin\AppData\Local\Temp\eb2911f727d2165d108d9538cdd9faf9f8b12c19fbbb5f634a856b1089156905.exe.exe
Filesize1.0MB
MD540839a6bbd02735818ae0fa7133d1e73
SHA1ea396b178afbe9e266aae0cdddc48bb7922fdd43
SHA25659c6b341306ab7dea4f59787407c41201c7aae2a44100544092f82cb59f90f2c
SHA5124b0c4c9e194859da15738fef29d41a33f1ab84ae072a0cb5df01d168afc00ceacdfee803938318ae8b61051cca886fc18c151a3baf339a0fad773e32c4791649
-
Filesize
26KB
MD5d375bd04f866e1b3276ba3b9779966ad
SHA11da9855e29a5384522563e0c4bdac786712d8b12
SHA256a540c3c24ac2e3e353f3e0376889b61d7c11c926b29c8f0b8c768aea37daf7be
SHA51278aa0651eeebb8475328fb7090ef3bdc8984ea22c888365727fd7c09533d59873599fc172d291fbadc55e04034fa62e7be405cd501df063105b0c03d7638de10
-
Filesize
9B
MD54b66be111b497cdd28c15afccbbd2620
SHA143ffb36014883f201e76464ded7ec69f2973d43b
SHA256483e991549f8cb58e18e7a79a14cf6065e121f897e73b6f4edff227432a733dc
SHA51232fddfbca04f67fdb0e865862e6f29b06cd079ddba416d801ceedcba8ed88b8dda77663fc8bd5bdd0224f722cd337c9d58edfc2e97e4fab73fa56f6f6198bb21