Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe
Resource
win10v2004-20240704-en
General
-
Target
d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe
-
Size
189KB
-
MD5
726630029c949f5fcab0c96fa45d7971
-
SHA1
a4c35f19a43940bc7da3f23be1e6377caa0a34b4
-
SHA256
d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4
-
SHA512
1594b0f2ea380c529a1dfef9e7cfa5d4a4332288fee28c6781931fd20b20b082f1efb73a70c8f261f90716b73337592f399edc394db599503d1930dd5c535b4e
-
SSDEEP
3072:p3kuJVLvstYgr0rKBXQDqDLA7h+qfHLXrYUvZ5lDjKwnmrS:yuJKyyLA7gqHLbYUvcw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 60 Logo1_.exe 4068 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre-1.8\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_2019.716.2313.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\uk-UA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app-api\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\da-dk\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe File created C:\Windows\Logo1_.exe d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4068 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 432 wrote to memory of 2900 432 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe 81 PID 432 wrote to memory of 2900 432 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe 81 PID 432 wrote to memory of 2900 432 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe 81 PID 432 wrote to memory of 60 432 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe 82 PID 432 wrote to memory of 60 432 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe 82 PID 432 wrote to memory of 60 432 d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe 82 PID 60 wrote to memory of 752 60 Logo1_.exe 85 PID 60 wrote to memory of 752 60 Logo1_.exe 85 PID 60 wrote to memory of 752 60 Logo1_.exe 85 PID 752 wrote to memory of 392 752 net.exe 87 PID 752 wrote to memory of 392 752 net.exe 87 PID 752 wrote to memory of 392 752 net.exe 87 PID 2900 wrote to memory of 4068 2900 cmd.exe 88 PID 2900 wrote to memory of 4068 2900 cmd.exe 88 PID 2900 wrote to memory of 4068 2900 cmd.exe 88 PID 60 wrote to memory of 3556 60 Logo1_.exe 56 PID 60 wrote to memory of 3556 60 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe"C:\Users\Admin\AppData\Local\Temp\d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a72DE.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe"C:\Users\Admin\AppData\Local\Temp\d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4068
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:392
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD58efc189ef409d8fc9b50ecd9b5ac8eeb
SHA1698cf1463a88a901d5fb092a826b483dba5da96c
SHA2567fbb24dc8ac6a35893df0c9e0a152aea520f1c2a366e725b7cf91a4820b3f92a
SHA512b0a2cb442dd494480cebd656a60a9f64764d10448c8912302a5abef35dffd43b4209620d90c46cba202a9cdfd033010b55f9fc24b3d07466fe6f8a912c00efe2
-
Filesize
384KB
MD5011c58655cce7d7bbbe9a233b3caed34
SHA133b56f9896f0044204a11e8b1c389eee45f2416d
SHA25649ed4a83e67b9d7f5bd57087688dba1c0d658832f516455b3213739978e9fc69
SHA51224057085f902ab3d65e60a89fed4937c717ee1ce2565002006638bcb63a1cb08ac3db32579cd211d082b7acd4949af5275501aabf9d72a9607e535df0a2304bc
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD58e20cd4ac13828acae9e458cea8e8c56
SHA1794cb8e8b5519214c4d4c89e9d5ff0967e224d72
SHA256ed2019032918ac1a2a246a501166a13f7f2bda2f2ca354ad2db584c41c774e5c
SHA512e5e6d2147fb76a7c11e738fbfacbe0b189862cdb35b7de75c82b4ed5784b90953cfda3d1052fceecf3f76a9f873b7ed052c70a4847669b7657bfce522ff907d4
-
Filesize
722B
MD5749d325447032934b1adccd8a6566e81
SHA123e6144eeb859540521a6c5b20c8004e6d17ef36
SHA256d6fe44a486bf6ada4bf91dbe10457c3b177d1c4d1a98ad4c382701504779eaeb
SHA512fb06bca8b1a8a33c1187a7ae82721cfce9623b1b05593010105e3d5c0200c922748da87df6e73026dcdf829c9a9c2f9ef162b15049b2413661b9071fc0e53663
-
C:\Users\Admin\AppData\Local\Temp\d64ec18b2b044c690b88010aa18cbf5c7d0fac3842c13d87fb35d7f7773a3fd4.exe.exe
Filesize160KB
MD57d9201c6666fab8edbb2af3e4ca4ee47
SHA1b6122bccb8aba048598c4aa8c52e53e65a9c3c66
SHA25675b3552c152c03bde2fc97d67a0c8fb015c424c0c76e29f9014e3ecc6d202ebf
SHA512e4f45fa94bf7ebacb6d9e7acebacf8c4211119159fd2c38dba27c3a9887f9259b62302f4e0c08c9ce71bd5c5d2c94ed4c1ac0ede4ff9da212fb638f900ec0baa
-
Filesize
29KB
MD551635d48424440d252fdfcde10d87426
SHA1926e15c42bdc1522844412c904f45ea47e788bb7
SHA256faaf266ad8bf9a599e0fead8ddaf21c909ccfcc48daccc2349375b323364f156
SHA51219f6db5d3f4ac35ad77ff06df3d15b33590cd65d9791620de95f97cf5cff7ec4860d99bef22e3c583111185455028ce712ed58f53dbec56897b48d88bdb2508d
-
Filesize
8B
MD5ee8c783242e20d39ed0878caba7b4548
SHA11556ec263d4ec9c198a44ea2ecc3c4141ef4509b
SHA25683855d38f6399f8cd40257a5d87a328d41c21e0e50ad4c91de11897e03ad4532
SHA512427491089ca5aecb5f365d6adf2e5c9d18a7acf93d471a425364dc504f581f29908df9abfa0fb721e768004737d6c250804dbf27b3c9e4b87532052810318f2a