Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe
Resource
win10v2004-20240704-en
General
-
Target
f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe
-
Size
1.3MB
-
MD5
052883fcc6a0671beb1d6e54b7ed5f53
-
SHA1
c9c0c53fe12c0cc5a805202f9b0113e805dec61e
-
SHA256
f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805
-
SHA512
3078759cf8894deb98500f85029f013a8e64aa4843cfaad62ba50d6a272fe1b614c924edbd378ae309a65b81d6f1e148662e47d7e908af8d99fb6d1e947bddad
-
SSDEEP
12288:a7+XrVWEemmRuTKKoL8CZUXuTZLGnuBEyhC3MMICFW7wMDSK8XkplRTkVjtQz6S+:a7QWgjGKoLRIMZGVcsW7ZDk07c2Vz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2044 Logo1_.exe 2168 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\node_modules\reactxp-experimental-navigation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.187.41\MicrosoftEdgeComRegisterShellARM64.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Config\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\StoreRating\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Calculator\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Toolkit\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ru-RU\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sw-KE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\data\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe File created C:\Windows\Logo1_.exe f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2168 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 2168 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 2168 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2168 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 2168 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 2168 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3200 wrote to memory of 1652 3200 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 83 PID 3200 wrote to memory of 1652 3200 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 83 PID 3200 wrote to memory of 1652 3200 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 83 PID 3200 wrote to memory of 2044 3200 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 84 PID 3200 wrote to memory of 2044 3200 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 84 PID 3200 wrote to memory of 2044 3200 f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe 84 PID 2044 wrote to memory of 4960 2044 Logo1_.exe 85 PID 2044 wrote to memory of 4960 2044 Logo1_.exe 85 PID 2044 wrote to memory of 4960 2044 Logo1_.exe 85 PID 4960 wrote to memory of 3728 4960 net.exe 88 PID 4960 wrote to memory of 3728 4960 net.exe 88 PID 4960 wrote to memory of 3728 4960 net.exe 88 PID 1652 wrote to memory of 2168 1652 cmd.exe 89 PID 1652 wrote to memory of 2168 1652 cmd.exe 89 PID 1652 wrote to memory of 2168 1652 cmd.exe 89 PID 2044 wrote to memory of 3508 2044 Logo1_.exe 56 PID 2044 wrote to memory of 3508 2044 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe"C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9710.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe"C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2168
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3728
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD549d73867fefcad9c060a0415bc83cbcf
SHA1ad437f02232b185bfd309ec3896fd021f4e3d2c5
SHA2567bd98c34a1456c9505c6cc4dbf728d1c8356e4cdc14c6fa4c73afa5ed12fae7d
SHA51280802103f330e52117ce8d467a7e7e11a232f31ce9d8b173a3676ceb0b9b0448f73dfea77258400e69382ad702cb515c11b825c974dd265be91263d12f0b8a42
-
Filesize
570KB
MD54afcc72a0eb6f173153e9ecdf2213914
SHA199500c0a9697a7d0fe4e1d43b239085ffdb1768d
SHA256ffb14b1576505355adae748a96e3398b940a9f5b9b886e92423927b96112ea9f
SHA512ace1123da1803f5bf138144dc933bacdf0930fe9c4e0449a265f7d3d6841d65f3a9a10f9ba9d135e5e6c74b4c5e9cfab4232c457970902f79e41b48e0cc21cd4
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD57c0581e2c34a99e0e6b7b63deb7540d8
SHA12ad688b178321284f2eab56ad02ef1d32e7ea46f
SHA256200d8896a4cf3d442567696ff425b2aeca8b87428173337c4f5b9022ae0d6ab0
SHA5124e65033131dd98ef1eb39d5da1c3a92b8d4c3ca083edb3db7bf9f555e57285f9f5c63bdc4d24cc5aa63312edd216ebc74c0a7f74ed38783e27998a2c013a496e
-
Filesize
722B
MD529aab70f6fa08841fc1a190395872583
SHA1f92b54bd11c60394519b516928a47354133f399e
SHA2560f21651bf8d76f44c7fd96e0cbfe6cded9911ea81dfc9bb5d94496e7c9ba9575
SHA512bacc7bafe081bff6a8057970949a41c652d8004a21fe59e4317b9e3963f5de57c8407919cec76f9ee44fd5bc0a1340c73f1315d0bc4fc185bedece26dd7a9500
-
C:\Users\Admin\AppData\Local\Temp\f0fa5ae1902569fd57466c001cfb7d90688cbb8475e0951623b9623382bea805.exe.exe
Filesize1.3MB
MD558a624edf9ecdc81c43734726e4736ad
SHA19368c84d8e11ddb41980ce625637654ec4280b33
SHA2561ec6fddc32cde589671c51b28ab2dd1fb4963965d231884c15b7b1aedf15c24c
SHA512d40f848ac84896fca6a38f50e806d9b11a7b0961fc647a6475f2ade4624cb754ac66a06199ae5ba9dc345ae85fb1eeb95955b8c22679a4cff45757fb6c4711b3
-
Filesize
26KB
MD5a2f15a56bca2a9c4410e0a063716a67a
SHA1e56e6b63e089e069a666a681328cd36a658f6ea9
SHA2562067df5a435e63d4ad6410e76ab1bb5c4324c575d58b9af9c4e8b028149c27ff
SHA512d5405bb49ab47951ccab00fb71cb6159a285b40c83b28440c1b29e711a9555416ec7f2cb6478c97131568dd89013ef41b5ed0369b9b3117044d8b70a83df44d1
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b