Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe
Resource
win10v2004-20240709-en
General
-
Target
07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe
-
Size
179KB
-
MD5
7be13265032926f8ff1209b4719d0a08
-
SHA1
ca52368c2868d160f757dee303d2d1a7672e3d30
-
SHA256
07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac
-
SHA512
36f8af48f8e3c4b051bdd8fa96b67398e0d94212f0023b5db0c3e47656b0dabd269c7dd1811d3a81ab0bfe5f759b0b527f907c563672bc5a5a7236bfb4134355
-
SSDEEP
3072:TkF3pWARYLJXJoYtpA/H3RpDecC+EZX70RjLTu46R0Eb:IFpWgYLjvqXRpDecw7Kj3u46db
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1028 Logo1_.exe 3448 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.Advertising\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x86__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\node_modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\EnsoUI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nb-no\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe File created C:\Windows\Logo1_.exe 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe 1028 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2684 wrote to memory of 3012 2684 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe 84 PID 2684 wrote to memory of 3012 2684 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe 84 PID 2684 wrote to memory of 3012 2684 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe 84 PID 2684 wrote to memory of 1028 2684 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe 85 PID 2684 wrote to memory of 1028 2684 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe 85 PID 2684 wrote to memory of 1028 2684 07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe 85 PID 1028 wrote to memory of 3468 1028 Logo1_.exe 86 PID 1028 wrote to memory of 3468 1028 Logo1_.exe 86 PID 1028 wrote to memory of 3468 1028 Logo1_.exe 86 PID 3468 wrote to memory of 3844 3468 net.exe 89 PID 3468 wrote to memory of 3844 3468 net.exe 89 PID 3468 wrote to memory of 3844 3468 net.exe 89 PID 3012 wrote to memory of 3448 3012 cmd.exe 90 PID 3012 wrote to memory of 3448 3012 cmd.exe 90 PID 1028 wrote to memory of 3412 1028 Logo1_.exe 56 PID 1028 wrote to memory of 3412 1028 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe"C:\Users\Admin\AppData\Local\Temp\07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aCD81.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe"C:\Users\Admin\AppData\Local\Temp\07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe"4⤵
- Executes dropped EXE
PID:3448
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5daee96e93be21c25daf9d6a002e39552
SHA127c17b2bbc4c7651260da59ece2d8cb3acecc587
SHA256b1f235e9e02ac940253a8b885ef6d554e5b7833c65d052d11f9db268a01fd302
SHA51270ffdb039105829efbd3c0f3f042fd3451a86531b54784ce6ca371342a6984a4351a9ef03c9a1b8273ebeefa27e7d559f6fc3be05458076162ef4ea8a5fc100d
-
Filesize
571KB
MD5cc50909f603d8293c48865555ce7c85d
SHA1259b57cb73add74e21eb9492e378fab72945e704
SHA2560424d824da780cbc0d2760b22fba320f8ee11a38ef345d221d8f80f9b3dfc4b0
SHA51226b7d331be29ac4ecfe7fdae26a6a95fa03cc27cabd6b36bea1ddd37594fdbaf4a264f975c6cb0b24ed410e0ad8c9c7b97a57726a0eb7ac5562077efee923aed
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize637KB
MD59cba1e86016b20490fff38fb45ff4963
SHA1378720d36869d50d06e9ffeef87488fbc2a8c8f7
SHA256a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19
SHA5122f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765
-
Filesize
722B
MD5e59f6cd656729c9f4c51362b361baa50
SHA1051ce970d05c402d26f2d6bdb8c84c09e0c197fa
SHA2561cd0b5a91c5293f1eaeeffe1e235eff52090168693bb6ecec2a6a233a592f0c6
SHA5120eb85396e1cc97c92bc1fef12e8023ce880ab20d06a7ec9591bdc809cb10bbb32d425b0abf61c9299a66e57cad57119d419a21bfeeb796f1dbb8220a46a3f0da
-
C:\Users\Admin\AppData\Local\Temp\07eb78ed553389cc7e75f2906a08c5cf745e5d70fd22607fd62d041c6c1db1ac.exe.exe
Filesize152KB
MD53440c72d695db245adb2728b6a5d9b1d
SHA11e510973687c9a0b58464aaf43048a183d825e26
SHA25637462e31a348d32c9421557f38a601a632c0bdf24d8157481ba82b45f8fef64f
SHA5125be93dca3a1f9b8e286146d43f848ef6b8bc5ef99ca5cf50839a62dd5083d915dc94ca5a30658838e2365a45a5dd522e641ee71f811202148c9db860113018e6
-
Filesize
27KB
MD5c1e93a00c76fe9038279108132881b11
SHA1db99e99d49c3ceec5aa5181573456c486696dd2a
SHA2567c29108cb820ca23779c64a8e419596bf53578df1329e8c4abde530daf8b0d5a
SHA51277c0e401c1a1782ee96c7f7f58748f898e8e7819952c81b04087c0dbc765b7e0b9591b8e17589a17ace293719a935525d79f376db53c9a82c3fc3f16dbc893b5
-
Filesize
9B
MD547dd2aeea8b548cd2ed3e9a71bf04f02
SHA1fb4ab8a2ceb995fb0ad31326ce2f2aeb9eba5987
SHA256ceadd1f3f299b6a19ca4844eee791af719de61dbec0839b68ed0f1d6cb5c5411
SHA51245843cc926c9c267f3cc967859b7537e937367ab5280f1429cc2f80d7b536131c40238cdcd5a3fc9823521bc596994e79bd3f37d3cc8db8a329f739e0793c50e