Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe
Resource
win10v2004-20240709-en
General
-
Target
60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe
-
Size
43KB
-
MD5
2f56bd734e06ba569d3093b30a51b90e
-
SHA1
849fe23bea8354687c50f3317f9d59b18cd749eb
-
SHA256
60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8
-
SHA512
2ec221aa0dca232c3539885de9937066feed886e41334558764c3d3af302faece3a5917cf892b352f6baee1d117e1a701f76e8094db8122ed6ac883dee12afe8
-
SSDEEP
768:wBE1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLxHUzj0x8k7rI:wsfgLdQAQfcfymNtHUXm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4680 Logo1_.exe 1968 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.AppTk.NativeDirect3d.UAP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\script\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-TW\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ko-KR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hi-IN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe File created C:\Windows\Logo1_.exe 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3704 1888 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe 83 PID 1888 wrote to memory of 3704 1888 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe 83 PID 1888 wrote to memory of 3704 1888 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe 83 PID 1888 wrote to memory of 4680 1888 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe 84 PID 1888 wrote to memory of 4680 1888 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe 84 PID 1888 wrote to memory of 4680 1888 60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe 84 PID 4680 wrote to memory of 4812 4680 Logo1_.exe 85 PID 4680 wrote to memory of 4812 4680 Logo1_.exe 85 PID 4680 wrote to memory of 4812 4680 Logo1_.exe 85 PID 4812 wrote to memory of 4060 4812 net.exe 88 PID 4812 wrote to memory of 4060 4812 net.exe 88 PID 4812 wrote to memory of 4060 4812 net.exe 88 PID 3704 wrote to memory of 1968 3704 cmd.exe 89 PID 3704 wrote to memory of 1968 3704 cmd.exe 89 PID 3704 wrote to memory of 1968 3704 cmd.exe 89 PID 4680 wrote to memory of 3544 4680 Logo1_.exe 56 PID 4680 wrote to memory of 3544 4680 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe"C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB045.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe"C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe"4⤵
- Executes dropped EXE
PID:1968
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4060
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD533242da55fea3ceb1dcaca8a58f8fbb4
SHA1efee3e801189490f52d72f9623b701b04e2578c6
SHA25632e1720f825b6be8f4d3cceeea1ff36b5acd37179eb80f03040ac2a341e9f7bf
SHA512426fa2ba1fc5eefaafc0e5423d8a39a296c85c35afe986f08667e207d64e60305e204045621448e1e261b0967e198f3457df7b71cd15653a9e25bced966bd779
-
Filesize
570KB
MD56c26236b1a2636c758aa036640ae98e5
SHA161674b2332d46af1e2df2198a01af59b23208be8
SHA2565d9a860e7ceb753e8e26fd9a5ff9da16ac89fdfdc4e08871cf1cfff56d4f5fea
SHA5121562c5821150e2e5b85c164ff99424ea7fa955799f546c460cea7bc2aeb39cfec60a5c98faf0f1a8954d75f8549d931804f803c75c04d0162d29078ad1227783
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD59d61b847006f176c408f6afe4924c9f9
SHA14be40f645fb7b429774879ca2d92030b3a5e9443
SHA25690f247035d97d4ca273fe1654b30e2e9e67dcc6130ebe90f54fa745af818becf
SHA512bc1d85afac0446552159f3a4d086bf8afcce1e284c925d252ab1100cbdf893a86bab143149f66bb2d62fb798b0a4a598e31599781aadb0e39544e322b3554bae
-
C:\Users\Admin\AppData\Local\Temp\60f71dc8849c22cded06a66e20a3ff604b80b7ba00d785c25c7974044f4c21a8.exe.exe
Filesize17KB
MD5ea0253515fa5314836099da4dc784208
SHA117296d8de2e0770d9baaf4bec3a586ea23e6582c
SHA2567d61a36c3aee18ca4e4ce39bb46475a360120b85b7f8327ea1e3f04fc570e263
SHA5122cff5f0c5d987e9fc01c999d21808767b866cbe78ec3afe7d2271ace1285d216147a33006e3acf3d2178d239cd3d92234755da4714129a3e6df24fc0d28f7837
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
9B
MD5c343746e2231a418d71c1903b6fcee6b
SHA1ce3877cf0c6cd56b2ee7ced8ce1c4f7cdbbb25a3
SHA256b3a272fd1b385fe9784ae0975b22ae384a87e5a27b31860304e9f109d3d423c9
SHA512dda5b55b3fc369b480d7b82d04cf4ed4b96e5ba241d087bddbbf22a8d0173dda10f25b7bee88c289fad759f7aa2534ec55120d6b97f632b948c234cdc7471aa6