Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe
Resource
win10v2004-20240709-en
General
-
Target
d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe
-
Size
49KB
-
MD5
0838281c8192753d9a24fe9f0cf8ab9a
-
SHA1
f1996a12162c8d2318c12103ccb86a64470c4edd
-
SHA256
d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f
-
SHA512
185a3f76215376e36b643f91e02e35c000000569f500d8fa8dd3c70ca4ea032a3018068585977fb2fe1de65909e30402fae49c99938ea9fb60725840e3039466
-
SSDEEP
768:/bHt1u16GVRu1yK9fMnJG2V9dDClcxEAZR5wo/uDSYipCAMxkERw:THk3SHuJV9Qax5ZRuO7pAx9w
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3564 Logo1_.exe 3472 d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\messaging\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ha-Latn-NG\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.106\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\accessibilitychecker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-TW\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\dictation\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe File created C:\Windows\Logo1_.exe d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe 3564 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3264 wrote to memory of 3404 3264 d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe 84 PID 3264 wrote to memory of 3404 3264 d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe 84 PID 3264 wrote to memory of 3404 3264 d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe 84 PID 3264 wrote to memory of 3564 3264 d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe 86 PID 3264 wrote to memory of 3564 3264 d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe 86 PID 3264 wrote to memory of 3564 3264 d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe 86 PID 3564 wrote to memory of 3764 3564 Logo1_.exe 87 PID 3564 wrote to memory of 3764 3564 Logo1_.exe 87 PID 3564 wrote to memory of 3764 3564 Logo1_.exe 87 PID 3764 wrote to memory of 4204 3764 net.exe 89 PID 3764 wrote to memory of 4204 3764 net.exe 89 PID 3764 wrote to memory of 4204 3764 net.exe 89 PID 3404 wrote to memory of 3472 3404 cmd.exe 90 PID 3404 wrote to memory of 3472 3404 cmd.exe 90 PID 3404 wrote to memory of 3472 3404 cmd.exe 90 PID 3564 wrote to memory of 3496 3564 Logo1_.exe 56 PID 3564 wrote to memory of 3496 3564 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe"C:\Users\Admin\AppData\Local\Temp\d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA568.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe"C:\Users\Admin\AppData\Local\Temp\d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe"4⤵
- Executes dropped EXE
PID:3472
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4204
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD55eeeda7f94ba02d4e07771a8022d693e
SHA1cb21683ef0b6a6e9f021113901292159ce2de26a
SHA256f35757719cf11cac2e06e36428a23233bef75283b4173ccca04673b0d3809308
SHA512c8e0a06a7b3c61dc0e77ac5e662347e6481562fae37914becf30a3de8e002f31a8be80f3b9a391381ffe517d1778cfd35f3ec7ecb58132a2c9154b5523262265
-
Filesize
573KB
MD5895af9aaa4c5655a90e89b2734573fb6
SHA18f631110513f9e73745391ad91748ae307f09c67
SHA25618b1969bbe25425c55394c72bcf442625b74b537ebd521ba432ba3a4b05cd7f4
SHA5127a637dc4c79c39e72badb3d4352146e545f0b1866fcede1cd94700d54b314ed33cfd751d15d51e0a49567c25f95d8eb49ab40f89ba409cba6d386630f1a02617
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD54ecd8fb63b7004f8913929392d741380
SHA10beda97b6a527ba300e45087ce22106b076ffa18
SHA256332ad9f838dd9cd2996ad3833c9f3111d495aaa947907ef1833ed13acd5c75d2
SHA512e4238c8319811cf53b90434a9b8aa8732e19c2741a77f46f81961ae8aac7f283aca9ad9dc187e8310c9ab5b0f0370665d9ef11ae2f49f9f5ae1c8101a54a1a5c
-
Filesize
722B
MD52b75ca4bcfc1c972c716bcf20e61611f
SHA11eb645be3abea0baf878b6d4e3248d54df8a71f4
SHA256c7fe8988a5c4f7b4b357b197d4f9ad37941e423c8b50bddd4bb27414dd25db3e
SHA5123157bbc7ad4154eafe2ef9cc11bf39536dbb7e919caad991af9b478d443d1340ca4d4b07db005f4a9ed52d7b83c0f24a15d8331cc955ba30394c53f7be4572cd
-
C:\Users\Admin\AppData\Local\Temp\d31cf20cfc39a56d786c9a7b61018f21fa6d21eb64f74d52ecd9d3b39a20784f.exe.exe
Filesize19KB
MD5a1b97bbe06c1f8dc0a8e358e85d9bdd7
SHA1bd935d383c4b4f23ea7b884dbce3f442aa8d94d2
SHA2565d54992bc25d5bd2dbfbf9afe4bf5250488953d8773843b1c3a8bfec8b06f5ad
SHA512f8df25109ebfe709fbba8419a80ecfc9a0d8741675f1af33fc37b9bcfa8818e281d69141f1001d965072c749d2416e3b07ec0aac79b33fb7a5dc4f7347b8fc60
-
Filesize
29KB
MD547189fc6506fa40d4be79e6bcf99417f
SHA181d9fcf6fcecb63947e25b3001772957b0a8b650
SHA256401aa6acbf2597ec1ed489814395cd8dbfca84f8229e298b946500cc6e74d114
SHA512f74be19bb01b6bf0326385fda2dcf898600500d1b88513f8285bba1c98f85945855e238ccafe2f77f873c716b4b6d1f8ff1b0f1cd82765e47407c63665fd09af
-
Filesize
9B
MD534161716a6ca53479b632148242b943e
SHA18858557a658c16f5bd03652eff514e066d1600b8
SHA25664655fa660d975efa9315df6cccb6edb310c9990826101015e68b735162a8e93
SHA512a0f19a255929a439a71438d378f185d476428d7eeb6620dc8483ed838cc0ae044c5f2576a22b77856ae741a62081c9d398d154f71360e8f4b20b67af3b6283fd