Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe
Resource
win10v2004-20240611-en
General
-
Target
d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe
-
Size
3.0MB
-
MD5
7068ca7ab0b08a45be3189616a0981ab
-
SHA1
13790b2b37df8542892db4838c1e8820cee9130a
-
SHA256
d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e
-
SHA512
0fd2ebe99e3c2d817aa7783751a9ff2d45746c74fcb20ab884526315fa72ded74d039213c1ca0ca79eaf431eaf11788361ffa950ce25e9236bba6a53eb1df704
-
SSDEEP
49152:dOnKV1GmNiJNiBkvEzs/7PDiYBJqgnv46z7153rfdc:dwDYijiS/7PDiYBJxJ5dc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4320 Logo1_.exe 532 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\BrowserCore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\capture\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-TW\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe File created C:\Windows\Logo1_.exe d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe 4320 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 532 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4048 wrote to memory of 3208 4048 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe 83 PID 4048 wrote to memory of 3208 4048 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe 83 PID 4048 wrote to memory of 3208 4048 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe 83 PID 4048 wrote to memory of 4320 4048 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe 84 PID 4048 wrote to memory of 4320 4048 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe 84 PID 4048 wrote to memory of 4320 4048 d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe 84 PID 4320 wrote to memory of 804 4320 Logo1_.exe 86 PID 4320 wrote to memory of 804 4320 Logo1_.exe 86 PID 4320 wrote to memory of 804 4320 Logo1_.exe 86 PID 804 wrote to memory of 464 804 net.exe 88 PID 804 wrote to memory of 464 804 net.exe 88 PID 804 wrote to memory of 464 804 net.exe 88 PID 3208 wrote to memory of 532 3208 cmd.exe 89 PID 3208 wrote to memory of 532 3208 cmd.exe 89 PID 3208 wrote to memory of 532 3208 cmd.exe 89 PID 4320 wrote to memory of 3440 4320 Logo1_.exe 56 PID 4320 wrote to memory of 3440 4320 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe"C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4EEB.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe"C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:532
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:464
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5cf823f44216d1c695cbb388843937b5f
SHA12ea48a151e1699e9ce9ba9681e635ce14d4da085
SHA256bb6669dfa86ddab20f435009522d8df6e2e503b641bb65b116338e337c4c3104
SHA5126a1afb35ec967f03db55636f1e01e699b8d1fdc62dade946978ec26013ba0a44a8d4ebc0d8723dc028c62674fa3db344588ab6bf83ecf65b47545e351debfb47
-
Filesize
573KB
MD521a9549f407a7dc96f644daf54bc504e
SHA1e133a3bda7ab4fc0221fca763618ff5e75c1b5f4
SHA2567d7e3cfe82185ca0741b40cab082fc2d17049f09f7b1c99203f63e11ff0363a6
SHA512cd8c78879aa64fa66c38cb7b46b7dfc74cb276d50871d46e5e69fdeeeebd6ccb35ceed770182be68e461609e8946bdca2d468b360dbe4b8d7b486bf148a0bec6
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD58e20cd4ac13828acae9e458cea8e8c56
SHA1794cb8e8b5519214c4d4c89e9d5ff0967e224d72
SHA256ed2019032918ac1a2a246a501166a13f7f2bda2f2ca354ad2db584c41c774e5c
SHA512e5e6d2147fb76a7c11e738fbfacbe0b189862cdb35b7de75c82b4ed5784b90953cfda3d1052fceecf3f76a9f873b7ed052c70a4847669b7657bfce522ff907d4
-
Filesize
722B
MD57c9e2566fea727f4ff5082e5cf2d6683
SHA1d5bdfa74e53ef72525819de4bdc05ed9efa3842b
SHA25665be82e6bf3a9c13e22d4b31a11e8ae0ace0bee43798b03628f2b18b64fe3df8
SHA5120f44fe9de70e66a9c8d0843ecac2b7e1e8dd9b114c97339ff303d7e6c0a25e42b13dad43265d828f15bdf74566f0b161254f7a84c12e7ac5326a3a3926772a7c
-
C:\Users\Admin\AppData\Local\Temp\d7ff01923f66f0c2480391761e3e885c640df41c5d9935fbdad128471709d11e.exe.exe
Filesize2.9MB
MD50b034269c98948c378cc41caeeec2691
SHA1d6adfd8ceb33dcd1bf415900aafe889e29450699
SHA2563e41b62ca8b78f95edef4d238ad411db8be8358af531ba373dfd76e2f1ace6fd
SHA5122d0747353c6a46616854ca4a5e4f256138f531c0173710881f58cad40a01a57416331ce0c49b35923dc16889059e86c5fcefdf6264f1ff32c0c149f92e5d50a2
-
Filesize
29KB
MD5263fdf92db7400b1cdf4ebc4961adef4
SHA103f3c20d4e557bd7c1af8d3e49a61021f0bfc578
SHA2560ae70243c1675a43383ede422438a0748689cdf8a0311c2b5ca55be987e3edc7
SHA512c38d1e57b58250d888f9a7d251f2b57dd1be88f28cf77defad34d2cde00dd57763f46408ae2bd8790af5be752f3cdf00fe788122f851c8559b69c175670e5624
-
Filesize
8B
MD56890820ebb29213eaf25c92e56fd41ee
SHA1b926083cf18461657f09f2a4af604f8fafa4ae29
SHA256ddb532e0e9d9e9a382d9f92ef1e5e26eba608b5f3335f1b711d99044240af3f9
SHA5125ebefef8f75ecb9fce8854606cb41402dabf66347ddbbd1075f5b94a5794fc4ca240c615eee930a6eedfd117e011afd8772aba2db2c83df0f376c84e8f512cda