Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe
Resource
win10v2004-20240709-en
General
-
Target
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe
-
Size
315KB
-
MD5
337347c936df99f79c92ab844abfc310
-
SHA1
fa02390e22ec0f3af4389985d0c438b7a0aaee1a
-
SHA256
51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0
-
SHA512
2e5cc226ff4b6ca2887e87df0655377a38d530060b0169d32f6436961b920e31c7def7d3d40a4c6cae82cbb3021345cfd8074062150daa64dc76f00b3a5fa921
-
SSDEEP
6144:2VfjmNGCAmFrmNzVzf3tYN5gPNv5+9WgSHpx3FUdXOKFNnokn:Y7+GCSVzf3i64WJJTUhO0rn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4824 Logo1_.exe 1240 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\th-TH\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe File created C:\Windows\Logo1_.exe 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe 4824 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 208 wrote to memory of 432 208 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 84 PID 208 wrote to memory of 432 208 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 84 PID 208 wrote to memory of 432 208 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 84 PID 208 wrote to memory of 4824 208 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 85 PID 208 wrote to memory of 4824 208 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 85 PID 208 wrote to memory of 4824 208 51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe 85 PID 4824 wrote to memory of 4128 4824 Logo1_.exe 87 PID 4824 wrote to memory of 4128 4824 Logo1_.exe 87 PID 4824 wrote to memory of 4128 4824 Logo1_.exe 87 PID 4128 wrote to memory of 1668 4128 net.exe 89 PID 4128 wrote to memory of 1668 4128 net.exe 89 PID 4128 wrote to memory of 1668 4128 net.exe 89 PID 432 wrote to memory of 1240 432 cmd.exe 90 PID 432 wrote to memory of 1240 432 cmd.exe 90 PID 432 wrote to memory of 1240 432 cmd.exe 90 PID 4824 wrote to memory of 3384 4824 Logo1_.exe 56 PID 4824 wrote to memory of 3384 4824 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB15E.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe"4⤵
- Executes dropped EXE
PID:1240
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD597a533e33765046422715a4e1dc2f203
SHA1e044a853e84ba0dc3f191c7884c2797e223ca4e6
SHA25677c1d1810ff974221b72cf90df1b8c028aa03660cd247ced79717079d842c246
SHA5129dca0a7f943889065b79b573024cdf1d735ad4a09958d66d1c6741297377f4e285f03d876cec1e6fca62a82e0972dd656195bb41c9e631b6359346351e4a47ac
-
Filesize
570KB
MD5bf658abddef00daf63c11c6271194151
SHA186813f3217a43f07eb77a9b455467605ee141001
SHA25693f1b6ba3ee063708bc3794c01c36747cdf52054b88656277675865818f1cf61
SHA5129e176970ebbd1daae38444f5eca35aa38c1af894b8f0361d56a290631594531edf2ddff7aff4c4ec2b4cae3d656509412529ea8a25ee7b1a8f92dc5189aa71d2
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD55ea035f261ac4a0c93f30f1e71efba4d
SHA137f60af4cc09c6c946ba325eb6c215d75e52a1e5
SHA25668c336b687fbf3d6a14bee68d9047e1de41248177145b9e638625eb4bfc681e0
SHA51226b97de94655eabd74c9f05b009c1e36b1cefce1bc1718dc9f19583f49ec38bfe65d5adf6bf85812eb9cc255de5b57a1df4e4867c3027dfc5662ad4c3072dfc6
-
C:\Users\Admin\AppData\Local\Temp\51d1acdbed7a49a84f9b295f299e1542a1b2097605fbf4e95a6037dcc25cd0e0.exe.exe
Filesize288KB
MD59bd7f6c66aeee6d240517c0dc78dff19
SHA1627084a7b0900adec1be08d3f08fb01c7aaed4c2
SHA2562a37971200dda9141321e7ac09681822d2b0af1935360328e96601edf963efcf
SHA512a188a44f63841e13ce5b9fbac07d59bbd1772a4d8169ffccd395df36591ec9aa916b38b1f65c6bc4e3d629ae62f7e3c79879ed69ed5378381e52578b2a260195
-
Filesize
26KB
MD59bdf847671dc3903890f77077bcb0901
SHA111c0c0b5032d088b270e41a2b4ef84e6dbce0903
SHA256f3b0988c673f8190dd9ca5e66522f8844ec26a2abb7eaed78815a4f54f76cf64
SHA5129476560001bd604b35a27b0d2f15e7e43df643831104be4669a320425a61d8b48f2d24899b7b70cbdd8107e69aa498e412632bec7876d9394c3744866d04ac43
-
Filesize
9B
MD5c20162cff0e529974834e150d7e6691f
SHA1512e9821581354bd8078227ddf386b17e771ff38
SHA25682f2070eb6138ab12ec2a1f0c3ca7b3b97db75cc19a5076ed382b017f309bdd6
SHA512c2c414232ac5fc3d7ff195523c49610795d0ea4d95c69748ef9ddd4a42203ace52a7da8594cb20102743a21b6eb5bd9e7ee5915513a9c11a0db319323538d744