Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe
Resource
win10v2004-20240709-en
General
-
Target
3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe
-
Size
66KB
-
MD5
cd3489676b080a379cec3bf6858db36d
-
SHA1
18dcb017c7742e3fb57c19c8aeb534fe8c972287
-
SHA256
3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9
-
SHA512
ef5aaf8845fc05fd1a307d60751acffd75e4b05cb1ea1dd7900563f73169509e10f04af55f5f97251cfad20400eb1d23ab7cc93359685342258aeed895ed9348
-
SSDEEP
1536:p133SHuJV9NBriw+d9bHrkT5gUHz7FxtJ:p13kuJVLBrBkfkT5xHzD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5088 Logo1_.exe 4208 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\node_modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\stickers\word_art\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am_ET\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\CoreEngine\Data\BrushProfile\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_CA\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.1813.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\MixerBranding\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe File created C:\Windows\Logo1_.exe 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe 5088 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1600 1248 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe 84 PID 1248 wrote to memory of 1600 1248 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe 84 PID 1248 wrote to memory of 1600 1248 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe 84 PID 1248 wrote to memory of 5088 1248 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe 85 PID 1248 wrote to memory of 5088 1248 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe 85 PID 1248 wrote to memory of 5088 1248 3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe 85 PID 5088 wrote to memory of 1988 5088 Logo1_.exe 87 PID 5088 wrote to memory of 1988 5088 Logo1_.exe 87 PID 5088 wrote to memory of 1988 5088 Logo1_.exe 87 PID 1988 wrote to memory of 208 1988 net.exe 89 PID 1988 wrote to memory of 208 1988 net.exe 89 PID 1988 wrote to memory of 208 1988 net.exe 89 PID 1600 wrote to memory of 4208 1600 cmd.exe 90 PID 1600 wrote to memory of 4208 1600 cmd.exe 90 PID 5088 wrote to memory of 3500 5088 Logo1_.exe 56 PID 5088 wrote to memory of 3500 5088 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe"C:\Users\Admin\AppData\Local\Temp\3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA894.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe"C:\Users\Admin\AppData\Local\Temp\3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe"4⤵
- Executes dropped EXE
PID:4208
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:208
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD563456ffdbc855be46cc9e8e226f9d50f
SHA1b1753d670867fa0df69200b7b7a9458bc6c3f655
SHA256d20d3c0b9d09cbce790525e9f8f1c5216edbe25ea481ef832fa9e26ec7ccd1eb
SHA51269f98232745dd8241082925de6b11fefa9ea4b7d8c8011911a1fbf7de52070b502ce156333089005dd3ac90aca5a6f596a7423ee672cca9afb8ae7604a4646c0
-
Filesize
573KB
MD552ed43afa07ae10a1ac6822ee3ca2c7d
SHA19e024747ea74f2ea73ac4cb56f0d26bc5152fa9b
SHA256c57a8878a2458598ff8ebb9177e7651b070efee68ef2e42698cbeb69f1d5e585
SHA512cd049c3007f3ea04b76b606deae3729b020b6fbea959719ebe8f0e5d1884567ed0af3d049a8e2ad28042583e5e3264ee8d7f728031d052fb75cf5d017134d12b
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD52a6a0566abaed25978364ba95a3f0f40
SHA15a7dfdab4c220482cdb9b4d9c3e723c4d50bd968
SHA2563f6115ae7cd7c951805144c72601e3b3d9919aef99b25536784ec12968092643
SHA512bb56744e286a98cb1c60d27cab644c0b4c6c1cee7f15dda485a1992eac08e31930bb1bd260c64a20dbe64b2d31be5af56b6c5268b285a564703dfc5bcec27bc9
-
Filesize
722B
MD5e8e2c44c25eab16ecc5378e5a9fae19b
SHA128fdb614a88432b2413145cbbe7ae290e14de48a
SHA25612240ce4ea769c903fb4a622f4ae2de53f0fc245d156c0a9ad8e0ca677cd3ed4
SHA512bb621535b8e556ae14c485be9571d5b9b43a8196d2486cbe43f2d6a25bf77154d38f23b933f34a1cfe4e9d4191838597a5b12a56b70b05dd281aa0dec21e002d
-
C:\Users\Admin\AppData\Local\Temp\3452839f96bfa8ec491ed9b48f4152ac4298a4b19f25e0850c7b91331d55c9b9.exe.exe
Filesize36KB
MD59f498971cbe636662f3d210747d619e1
SHA144b8e2732fa1e2f204fc70eaa1cb406616250085
SHA2568adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93
-
Filesize
29KB
MD52bc53fb2d52f602de7e4ec6914cdfffe
SHA1fadb9859e7d69263578800e3f0731d9041e9f9ca
SHA2565678bdfeea8944eef09836062eb5c91d30a04c1f129e27dc4b2d7c584fde0c46
SHA5124e7f191ef905cd6cda9e262470f47d56e1bc52cfda9de984e9d97b94773294d3a644d67cef3ccccc1b1a6f64602cd639b636d62a18e68185f4d2f3ba52473d44
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b