Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe
Resource
win10v2004-20240704-en
General
-
Target
dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe
-
Size
2.1MB
-
MD5
14bdd80a78d22e859f3beabfdfec953f
-
SHA1
c2db58a2f591e676c6675cc660980dbd4f6eb3e9
-
SHA256
dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766
-
SHA512
9757601bd8aeef1debf85556c98c5e28b6104c446393d0c51a6c35407df2ad6970d6a7568644a8159e4bb245a6c91dcb4dafa8e20e1900ca228a17ff6c8c829e
-
SSDEEP
49152:YOoP/iZtI3UL5tj1XUNgASK4CTfVf1WZ62U//of6VwcNc+0eW3hz/1bmgZO:7oGY/orcUnu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2860 Logo1_.exe 224 dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_94843\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoEditor.Common\Resources\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{14FEA263-4012-4197-B537-102BAA8CB016}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\ja\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe 2860 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3640 wrote to memory of 1556 3640 dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe 83 PID 3640 wrote to memory of 1556 3640 dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe 83 PID 3640 wrote to memory of 1556 3640 dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe 83 PID 3640 wrote to memory of 2860 3640 dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe 84 PID 3640 wrote to memory of 2860 3640 dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe 84 PID 3640 wrote to memory of 2860 3640 dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe 84 PID 2860 wrote to memory of 1532 2860 Logo1_.exe 86 PID 2860 wrote to memory of 1532 2860 Logo1_.exe 86 PID 2860 wrote to memory of 1532 2860 Logo1_.exe 86 PID 1532 wrote to memory of 4156 1532 net.exe 88 PID 1532 wrote to memory of 4156 1532 net.exe 88 PID 1532 wrote to memory of 4156 1532 net.exe 88 PID 1556 wrote to memory of 224 1556 cmd.exe 89 PID 1556 wrote to memory of 224 1556 cmd.exe 89 PID 1556 wrote to memory of 224 1556 cmd.exe 89 PID 2860 wrote to memory of 3468 2860 Logo1_.exe 56 PID 2860 wrote to memory of 3468 2860 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe"C:\Users\Admin\AppData\Local\Temp\dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a99BF.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe"C:\Users\Admin\AppData\Local\Temp\dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe"4⤵
- Executes dropped EXE
PID:224
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4156
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bc108c29e92cf4fae14d6db05637a1c0
SHA1c4803b03d1849e50a937ed4d183269528a0deec7
SHA256ecef36a3738bc05dafc98acfed4c57dc324b804898dc4dea594f785e583916af
SHA5121ae7f5ae357865bcb6461333b3592cb52ba2d5d253ac8ee11bc7599cba2aa11b45ef656faa985640118e19939f818bcb0bee92f70f23766c397a99dcb737f6d9
-
Filesize
570KB
MD523a1caa43e0960aecb83463d477b199c
SHA1a6a021598af2157287313c97d75735a23919ce92
SHA256f16a2e78177b07235ca63177a82d2ec12b8254a2b9be1a776be03c7a581ab7dd
SHA5125bc3972b79af464ef6efc390347f28907347604dea5190e0d4761505f647b7ac0b9e03b385c5f34e33b5665b0be48eb8e238b7e319e513dcd90dc9237958a7e2
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD5d82ffc872aed7c85cf936dcdcc2e6372
SHA150ca56cb4a429ce1532afaa2732f61833fc2b54f
SHA256a487733710d946abff1a93a23ae6bbafd6c0800bc78e4d5e3cac36e2a14ddace
SHA5120b0031418275c6be01f7757111058cd5bd3e5f4862e0631e2e28c5e7ffbb271446abdc2a88a7953ae55112799bc4a051becc2b14491e0d1760e336498665cc8b
-
Filesize
722B
MD50fc29e368949cc6c663c8ec3d22e4760
SHA1167f3e88a2e088de496fe0c33357a7b767d51517
SHA2563797ae580784c2d0b2007e08cf2cee4b3e85d4cc1b052508c37bc42210f69d50
SHA5121789e52b0f9328ce42de58113aa9938752698045a4bf792b0d5d9389cd5beb100373fe1af29bec63e8b85d4f93ce09632b6a90162cae0cd3cc30501a63c810c5
-
C:\Users\Admin\AppData\Local\Temp\dfb7b44bb0d17ea8e1041fd012fc5c89a6d1d7c10fe7a7805c0134a07e7b6766.exe.exe
Filesize2.0MB
MD54b588fa7bdaa08909d3dc972eaf57f99
SHA1abf382f8cf34117b8ceffbd855bcddc3f13ab5bc
SHA256a0b3cc4b54ca1f7c488984ad15953874bee19698fd235db8478a907777ba7953
SHA512957ed4c030266a9447ff74eb0769bb586468117a6df84db619bc98d50c5fc873899c1c4bbca03ccd0532f4a50d7dde33a27164ee4e300cc58bea86b8e38a84a4
-
Filesize
26KB
MD506479588faccf09230d80eeff6a0f558
SHA1142ac2edd0c11583d9780872a945adf460384adb
SHA2560d7f3fa5542d49ea4691ab0a3bc7ff8be10cbdecbe33d0fb74714b8f821c783a
SHA512fb2b014d1f41a0a2e107571bc943ecee25d1e1c3797be189c191a64093bd5e7e80c1ed5df1f9fa76130c3f8ddf312e02bbdf7cd5a68ee409a5f6c7cd9b4b23e1
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b