Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe
Resource
win10v2004-20240709-en
General
-
Target
3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe
-
Size
4.4MB
-
MD5
dba63c7c4e08bf1ac1fc28b322ba5b17
-
SHA1
9b9049e78f9943d5bd2045296ac42077d3162a27
-
SHA256
3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece
-
SHA512
ae5590a94f1ef1febe8a59a5e7848133792b25685c86eb0b9da0e26272910178e0f7859b7c5bd710c8a2a90bbc47a03b56b2a2a6c747fcff91e041b1a068b292
-
SSDEEP
98304:oFNvvcHGfR0dtyt/1S9xHu0Lvg7oKxEQFa7GqjTEaDZm7wmGz2/ERR3x:oFNMHGfR0dtyt/1S9xHu0Lvg7oKxEQoD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1904 Logo1_.exe 4068 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\Controls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\nb-NO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Toolkit\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Offline\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe File created C:\Windows\Logo1_.exe 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe 1904 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3028 wrote to memory of 4344 3028 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe 84 PID 3028 wrote to memory of 4344 3028 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe 84 PID 3028 wrote to memory of 4344 3028 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe 84 PID 3028 wrote to memory of 1904 3028 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe 85 PID 3028 wrote to memory of 1904 3028 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe 85 PID 3028 wrote to memory of 1904 3028 3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe 85 PID 1904 wrote to memory of 2808 1904 Logo1_.exe 87 PID 1904 wrote to memory of 2808 1904 Logo1_.exe 87 PID 1904 wrote to memory of 2808 1904 Logo1_.exe 87 PID 2808 wrote to memory of 4872 2808 net.exe 89 PID 2808 wrote to memory of 4872 2808 net.exe 89 PID 2808 wrote to memory of 4872 2808 net.exe 89 PID 4344 wrote to memory of 4068 4344 cmd.exe 90 PID 4344 wrote to memory of 4068 4344 cmd.exe 90 PID 1904 wrote to memory of 3452 1904 Logo1_.exe 56 PID 1904 wrote to memory of 3452 1904 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe"C:\Users\Admin\AppData\Local\Temp\3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7E09.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe"C:\Users\Admin\AppData\Local\Temp\3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe"4⤵
- Executes dropped EXE
PID:4068
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD533242da55fea3ceb1dcaca8a58f8fbb4
SHA1efee3e801189490f52d72f9623b701b04e2578c6
SHA25632e1720f825b6be8f4d3cceeea1ff36b5acd37179eb80f03040ac2a341e9f7bf
SHA512426fa2ba1fc5eefaafc0e5423d8a39a296c85c35afe986f08667e207d64e60305e204045621448e1e261b0967e198f3457df7b71cd15653a9e25bced966bd779
-
Filesize
570KB
MD56c26236b1a2636c758aa036640ae98e5
SHA161674b2332d46af1e2df2198a01af59b23208be8
SHA2565d9a860e7ceb753e8e26fd9a5ff9da16ac89fdfdc4e08871cf1cfff56d4f5fea
SHA5121562c5821150e2e5b85c164ff99424ea7fa955799f546c460cea7bc2aeb39cfec60a5c98faf0f1a8954d75f8549d931804f803c75c04d0162d29078ad1227783
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD52862f22262b57b72746b9cdf771ad393
SHA1113d1693329325fe0053c114cea5719bb5fdb190
SHA2566b245cb2fb64dd013e0bb9546544f9d82f3d2ef3d8d0bbd4c0e4ea5560be0402
SHA51256089abe9efcb40d6bfc9ff9674ba150dce6b214573df22c335a83cdb82322df296aa6907cf31d35538f980261d6b703632ad1a5d63241a1821b1304f36242e3
-
C:\Users\Admin\AppData\Local\Temp\3d667d2ca9d9e8c99546ddbfc3d8bbc5fb422f4942fe35b85274f23fecfe9ece.exe.exe
Filesize4.4MB
MD5f67477caf68929c59f27dcd012b745e2
SHA1fbafe737b494996e36bdf45e0b1a980ac7680970
SHA256887b81d085369141d39f0acf4a96506d3081c95cde0abbd538db00d1f4c743ae
SHA512720e03a947e455c55dbd4208c9ce0e12254d41b8feb90c1b00029f78399cdf34ccd2f38562accb9b017694a79189c6c2c530804532ba406c504f55e074e274ab
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b