Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe
Resource
win10v2004-20240709-en
General
-
Target
35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe
-
Size
69KB
-
MD5
137638684e2668cd13acc772fc1ccef3
-
SHA1
899ee1f1649758eb929a0dbf09bcfecd0b7515f3
-
SHA256
35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530
-
SHA512
2b0fa720db07f1f36796eb0cfd3a3e6643bc38312297b59ddbf8ec38305adf712b47ef1fe2d082b46cc3aeedc6f221923b43e7d0f5ac00d4f3e08280832667bc
-
SSDEEP
768:pI16GVRu1yK9fMnJG2V9dHS8FKPh5Rda4FYa5gXtxISlzAyLDbDryViaPm7cg:pa3SHuJV9NY5jaJa2DISl8yLh57cg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 60 Logo1_.exe 4408 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jsaddins\en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\bg-BG\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.1813.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe File created C:\Windows\Logo1_.exe 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe 60 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4408 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 224 wrote to memory of 824 224 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe 86 PID 224 wrote to memory of 824 224 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe 86 PID 224 wrote to memory of 824 224 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe 86 PID 224 wrote to memory of 60 224 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe 87 PID 224 wrote to memory of 60 224 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe 87 PID 224 wrote to memory of 60 224 35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe 87 PID 60 wrote to memory of 2272 60 Logo1_.exe 89 PID 60 wrote to memory of 2272 60 Logo1_.exe 89 PID 60 wrote to memory of 2272 60 Logo1_.exe 89 PID 2272 wrote to memory of 2344 2272 net.exe 91 PID 2272 wrote to memory of 2344 2272 net.exe 91 PID 2272 wrote to memory of 2344 2272 net.exe 91 PID 824 wrote to memory of 4408 824 cmd.exe 92 PID 824 wrote to memory of 4408 824 cmd.exe 92 PID 824 wrote to memory of 4408 824 cmd.exe 92 PID 60 wrote to memory of 3508 60 Logo1_.exe 56 PID 60 wrote to memory of 3508 60 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9CEC.bat3⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2344
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5e612d8861208897ec8efe5ae3b9132be
SHA17e2828de5b36bfdfff267b9b93262c886d92865b
SHA2561cfad6863df695c729a12f1a71730a4c43ee4e53dc7264edee71d1dc0f3d2dcd
SHA512753f6c7c586f2900e5511e7295bb1cce2b1efceb7d1ea1b54c5f223213c3f50747a5328cf252fd2dd76e9bd01b64435cd53a7902197af5dd8d46c26f6dcc3769
-
Filesize
573KB
MD54ab2311c3efa42588cdac149bf585df3
SHA1c3295d54c91dd9d24aca6d025f87066aa0387a82
SHA256c6ae378cc908d08479562ae277d2faaf261b3b96dfa29e358db4fef9584fe9ae
SHA5120b6df2a692566798c0b953a3308f1e52c0d3ff45726ea6c7aaeadf2342321358559f04f1610202ce1e62168c215d28611c4229db07dc532689468acc97614283
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD54baecb97e22493a7726fa776cd11e9b6
SHA1af2dad28d17ec1220505a475f669bf2663893e0d
SHA256eed9c9a08f13ef7be401e0ce827001aa9849769b16dce74012e3bc6925c4fa5b
SHA51275b604ac8a896dcd06f87b35acd06eb0350b5f624cf325bb7ec1e388491f00c7e79c735a4b37468b1c46f20f34c257406f156ba5490196107b8b5a67364cdb84
-
Filesize
722B
MD56e88fd068ec39ce4927d75940c8e6bc6
SHA17a26b3d21cca1525639b3c9728d860d962f29d04
SHA256ae5ec2815bef1eb1620d566af4a6724fb495eedc8918f0f608b28c8a04d6e293
SHA512797b83049e5033ea52c06eb82c3460daeff3deacc15eeb4014e6e987ac48bb2bd992843f855072b577fcb9fd04671e982b66b18d698da0d8a9fb86d49cc5b3e1
-
C:\Users\Admin\AppData\Local\Temp\35aa03fd732362496469eed0fc61295b2960a0f5e8fcacc0a34345ab764fc530.exe.exe
Filesize40KB
MD59c7a7c0374eda967af0d911a6de29329
SHA126ed41010559c7959a7b1eaf89e89b71b38a6968
SHA256673a2c249387a223fed06d9bd779faeab4145c27ed2b1628ef08579f956fa59b
SHA512f4d54e562ce436487e98e96b3904f0a8ae9838c6631b4c9542691445964e03cac023ab38e2da60e1a504bc74701dda18c13733f1da888a6210be1bb80b6be6ad
-
Filesize
29KB
MD59cd1b22ca5305c5cc480f0f2753b057b
SHA1e39379b4793cce690ac333aa3ed5da75c213d20c
SHA256363a187f7123111d576a91894824b5d5a9b840066a3825755f7f24431e30d7d5
SHA51244bb942f2fd96984416cc05bbf3c2abfa2dcfe0960a38db6f3ca3d0eb9728fd306341be525dc405d9cd315eae29bd81d3f49729b29afba0d2cf1406e5fce9eb1
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b