Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe
Resource
win10v2004-20240802-en
General
-
Target
43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe
-
Size
161KB
-
MD5
483463b08050f33774f37972d454fca8
-
SHA1
138f4aa49f1607d0f91bc6fd0f84e45106877654
-
SHA256
43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365
-
SHA512
b2b168289dc0e1ac9c16d0b5c1da4af6b1b844aa859b4f6dc0c79a080109680cbb667e38565e0e1b249da7ff6654b86ab9cc0a18d696a5af969509953b7dab1a
-
SSDEEP
3072:sftffjmNCslzQC4U29RUoKK1YUoXO3tEKWZumax8apm1G7OXBShPnX5e2:0VfjmN1lzQC4NRaGUOEp/IPX5e
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2512 Logo1_.exe 2684 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\accessibilitychecker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MLModels\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe 2512 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 540 wrote to memory of 2288 540 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe 81 PID 540 wrote to memory of 2288 540 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe 81 PID 540 wrote to memory of 2288 540 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe 81 PID 540 wrote to memory of 2512 540 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe 82 PID 540 wrote to memory of 2512 540 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe 82 PID 540 wrote to memory of 2512 540 43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe 82 PID 2512 wrote to memory of 1552 2512 Logo1_.exe 83 PID 2512 wrote to memory of 1552 2512 Logo1_.exe 83 PID 2512 wrote to memory of 1552 2512 Logo1_.exe 83 PID 1552 wrote to memory of 3700 1552 net.exe 85 PID 1552 wrote to memory of 3700 1552 net.exe 85 PID 1552 wrote to memory of 3700 1552 net.exe 85 PID 2288 wrote to memory of 2684 2288 cmd.exe 87 PID 2288 wrote to memory of 2684 2288 cmd.exe 87 PID 2288 wrote to memory of 2684 2288 cmd.exe 87 PID 2512 wrote to memory of 3256 2512 Logo1_.exe 55 PID 2512 wrote to memory of 3256 2512 Logo1_.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe"C:\Users\Admin\AppData\Local\Temp\43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a859B.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe"C:\Users\Admin\AppData\Local\Temp\43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3700
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD56519f7fdbb937f1ac03190fd5d3e582a
SHA1fed80e73e528841fdfe7fee9b9ab64147f6f4e4f
SHA256090371bc2b41f09c98a2e803822134b9ddf6f9960fb27a21eb1c58e6a20bf3ff
SHA512543d2be4d40a288ae74b23fbd866acaa642f26eedb42d84cdb59c9ff3a50f7b47cc56b9378634fa32d3ea47a6a29025ed7b56c959c92a66754a5fe077a440a38
-
Filesize
570KB
MD5c665340a5749b88d797c60860eeb2a94
SHA15a1050dee16296c85a007ff383aa3be4af34fd1e
SHA25698a4595547fdea35492312c1eebf6785a8d47a2fd699dad7123f81603b07fd2d
SHA512949971ebf08cceae9f3f4982b3a577be45429f211fc068f119dda8a6b58a90d444d2fbf2ff6020f3b4c36d5d106846153380e6455490a496514f375d5c6e7fa0
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5368f614b7645e467abb43b8b8d707cd4
SHA151c781eff4cd92e44599ad9cd58c663e9a7b76db
SHA256b3cfaa0754c27568f0b4ac0c45103f28a02dfe7b759e44111a04411a7281a004
SHA512e513155fc554db626e615f2b30e382fe8114a1b0cd5d5b23488143f5a2913ca010c27a4557dd68968b70363d1633b69ff554a9775f7b1f719672785169889ae3
-
C:\Users\Admin\AppData\Local\Temp\43268e15a2d54f9e108f292c2fd56a7c7a835a156845677081c29b00e6ecb365.exe.exe
Filesize135KB
MD50adbdeb9cf366c4ce8b44099b7bf362e
SHA11b8b04023317d3e14a8753c9fc0a2680e26ff577
SHA256ab2b342d9c99bd9dbc50f0782c4755d7dd27e4af9c3ae2fb24490c57dcceb991
SHA51246e4c3b7426bcdd17d26bac41f9a1787765bf90cb80ac601799cb13d2ddd9db10511abd73badcc43c2553a203b98cc13924fd98908064440ce9b8ecde9aafa22
-
Filesize
26KB
MD5c70a9fd793f9c5f5732962c32f7e3775
SHA13aa103a49c3a16b06a9ff57ef7f853541591854a
SHA2562f34c344d764cecda5b05bdcea2283b882998e6fff50ac121ed8c133996518ca
SHA512f93db88e4247a545a557fbf2d654898f1c9cf8bfb819f4b8279f838d1666054489d51227189bd92fcee4fee97e8cc90f38cbb863e2b0d1adb2979b982789fe3a
-
Filesize
8B
MD55e797d005cfee3b802f98412c511983c
SHA11c65a747549afbed9971b65c604d64ec1f1ab898
SHA256dcb1b824282c0cca0aaad7a62d7857039122e25a100766f82c85f227b36e4c88
SHA51241116f81a81859b0608b0150a4cd791b3fba9e7516ff3eb98494a3802a3532dda052a2ed955d64c023fe6d8113079d7190df6f5bcc7ef86c8e743419a758706b