Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe
Resource
win10v2004-20240802-en
General
-
Target
e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe
-
Size
151KB
-
MD5
3967f385eeae03acc910861a648dd6b4
-
SHA1
bef061f0dabd297cc2f492b3daaa7dcedb7639d2
-
SHA256
e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a
-
SHA512
626d5baca8f26ec307122538d6ef66eb85e6094f7d030c47000af74f81c8998b0c3718d183d4a38ab03a6aeef987b2752a77e3a7d977c492b0107b8440f95d0f
-
SSDEEP
3072:5ftffjmNF9GEy/g+bll7eE92TkvDOb9VO:RVfjmNxGR/92VW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 428 Logo1_.exe 2468 e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Sigma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SlowMotionEditor\UserControls\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Windows Multimedia Platform\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\et-EE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\he-IL\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lo\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe File created C:\Windows\Logo1_.exe e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe 428 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1324 wrote to memory of 3716 1324 e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe 84 PID 1324 wrote to memory of 3716 1324 e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe 84 PID 1324 wrote to memory of 3716 1324 e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe 84 PID 1324 wrote to memory of 428 1324 e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe 85 PID 1324 wrote to memory of 428 1324 e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe 85 PID 1324 wrote to memory of 428 1324 e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe 85 PID 428 wrote to memory of 1044 428 Logo1_.exe 87 PID 428 wrote to memory of 1044 428 Logo1_.exe 87 PID 428 wrote to memory of 1044 428 Logo1_.exe 87 PID 1044 wrote to memory of 1192 1044 net.exe 89 PID 1044 wrote to memory of 1192 1044 net.exe 89 PID 1044 wrote to memory of 1192 1044 net.exe 89 PID 3716 wrote to memory of 2468 3716 cmd.exe 90 PID 3716 wrote to memory of 2468 3716 cmd.exe 90 PID 3716 wrote to memory of 2468 3716 cmd.exe 90 PID 428 wrote to memory of 3484 428 Logo1_.exe 56 PID 428 wrote to memory of 3484 428 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe"C:\Users\Admin\AppData\Local\Temp\e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a89F0.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe"C:\Users\Admin\AppData\Local\Temp\e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2468
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5be38407fdd7671c8b1ab73677ac6faae
SHA1bfee03aeffe26724fdea5854e6eba528ffc261a3
SHA2561b9bec44dde3bb1097f692f6f65c2fba230e3d759d5e0206c5e97af0c067617f
SHA512db64d82f222a6a5c323bb23733550750e2db9f70c0793e15eb4e8b73e370298aff6c60872c3707e1389f0301839e8795944ec764d3edd8746e2ac9ea7ac1851a
-
Filesize
570KB
MD5d7d9b9b8c06017ecda3f8ffdd7ef5a92
SHA1af1930159c88a0167bedb41e491f22e3c99b6aca
SHA2566a25b713db570875e4ffa046eb31bee7dded585fbe4bbb5a60caad5c2d36e9a6
SHA5125323f4f2677e9567b51a81b4922a35e95e9c166d43a94fc742cf9e7fa8cf9a00f1c0723ccd9cc7f90b4cf940bcc60326ba2547643e5ee86914b1260d0d7acc2a
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5c40a32d1cf646144f2ceb8717c3f7ae4
SHA16fea76c9eddbb47218f66a53be3caa1eea75df32
SHA256a67f50b139f5df3bf6b18e4964c282a6fe003c0e43a0a0fb3845b4f33e59a96c
SHA5126553ef714c7bb6066e81e36f6019b4ea382fbd1d13ca92a9e3a1ba52e27f57d9b0501479b563426adada6da4cbf18c258a9c71fa6620ccedd91968690e50be50
-
C:\Users\Admin\AppData\Local\Temp\e4301c87297cfd518af57a203ed6a08a465d1888ce71ed1d3dd4e5dd85ce781a.exe.exe
Filesize124KB
MD56dd728836c46dffc93e66b6139889f98
SHA1b29496cd2432f2d7de076f06915dae49f4cb1827
SHA2562975c97b27cf0e8717587ea58a07da6a2f646e4fb42c7b8db479268b011e5a88
SHA51204aec32fc1b98321e584a0ec8b7a57b2e2709ffefa278f7193a119ad2f5c677f8b6abe3d118f1fb1424cb847aceff2b517b8799355acd7d751c072c0d3937896
-
Filesize
26KB
MD536b3f02b659eb0ad5fddf054af96b525
SHA117eab1988b6601611ae0683bb8b26ec04c377cb9
SHA256a1822df7617c493bc4dca454e06a5f93d3dac7b6133b5a8dca37866d3cd3c1c6
SHA512e20e9add4525449be31da571226255cb3cb06bf1f2efe84591e77972283407c783321b676f2e3bc78dd85dcfb0f20db77a40bcd179599cdd0f453534acf9dbaf
-
Filesize
8B
MD5a451cf229ab77d19c624b2e48ac11ec8
SHA10f3002921952d4e528750030d6340b77d10b5fc9
SHA25696a8bb2a4a11f6596cd7c59eee4a5ea4dcfb02550aadc0b233e6cc269883f222
SHA512699a221508bfee448d09720da926c818de965de39253e6c82fe79343d2916c59edb97ae5dc6d1e3b6343928fcefb636f5dfa13507e5ec53b3c4eeb1266caa3cd