Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe
Resource
win10v2004-20240802-en
General
-
Target
dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe
-
Size
712KB
-
MD5
94249897568dde226227b7bec700fa59
-
SHA1
a52aea55107b7a9bd85ab119890c5eaeef4005f4
-
SHA256
dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63
-
SHA512
307bbdaad7674f0e08de7f39d08b0ecaf13a22d3b17d727590ef36dfcca73f5adb844e1f94a8eb658d3db9b9183aba79c96ca1d110d2ae98b57fd9de3839017a
-
SSDEEP
12288:V7+p9y+V6/ZOkBmt6bvMwBaOA+jlqDS33KudL:V7Gh6RMwO+jN3audL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3400 Logo1_.exe 3484 dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pl-PL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app-api\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe File created C:\Windows\Logo1_.exe dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe 3400 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1588 2388 dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe 87 PID 2388 wrote to memory of 1588 2388 dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe 87 PID 2388 wrote to memory of 1588 2388 dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe 87 PID 2388 wrote to memory of 3400 2388 dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe 88 PID 2388 wrote to memory of 3400 2388 dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe 88 PID 2388 wrote to memory of 3400 2388 dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe 88 PID 3400 wrote to memory of 2440 3400 Logo1_.exe 90 PID 3400 wrote to memory of 2440 3400 Logo1_.exe 90 PID 3400 wrote to memory of 2440 3400 Logo1_.exe 90 PID 2440 wrote to memory of 868 2440 net.exe 92 PID 2440 wrote to memory of 868 2440 net.exe 92 PID 2440 wrote to memory of 868 2440 net.exe 92 PID 1588 wrote to memory of 3484 1588 cmd.exe 93 PID 1588 wrote to memory of 3484 1588 cmd.exe 93 PID 3400 wrote to memory of 3448 3400 Logo1_.exe 56 PID 3400 wrote to memory of 3448 3400 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe"C:\Users\Admin\AppData\Local\Temp\dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aFB29.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe"C:\Users\Admin\AppData\Local\Temp\dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe"4⤵
- Executes dropped EXE
PID:3484
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5499b41c835407698fc879f87e88b606d
SHA1dcf8563ad9791a5b1bea29721ab4cd88a3dd7347
SHA2560fa3c4c53f19ea113547acd2fc1b60a9f9b30d8c5ce7993592bba0d9e784aff8
SHA5126366a4879766e9e0c2829ab32e67cb4a6707688221ba3e15943a79e37edf27940ee610609bca0fcc0446513fef2c909e0a248ed946c37bfdbe425265f6e82427
-
Filesize
570KB
MD5658e8e9dbfeab5fa7c7ad6a97df10d5c
SHA1f72a53af02525035a51d17eb51b658ff6ac8155a
SHA256b37ea9d22d7d50f9eabeca6a99428cac2e0388ee89218442f719a377f3e5b072
SHA5120821a12e384053256344e0da159eb59b1b2e04bc1dc0412d13aa4ee220eee80694a61be62dccc95e72387ce5e05f0e85ecbd8912dca0e77b63741aa93b789551
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD56a741211bd00cccc8430313509b85b3e
SHA1a2f28ae2cbe1a07d143b2037ab65ed4e3b8ed3db
SHA256f55cfdf9a1b080e97b9183770931f577465d891b3f442f822d1b71d02f4a63ce
SHA5120b9863a56a9ea5c4d4cdd9381ec62068c9496a3015acfd2d2697b8a9c00b1940e5f58695db5413799ed81bd0b9debff5944c399c24965414c0070d0696c1b56e
-
C:\Users\Admin\AppData\Local\Temp\dd5d795b7f5ece7b0a0d3a2b958d78cdbdbc3da70d2643345f4f58a9d24d6a63.exe.exe
Filesize685KB
MD51d162efa99a81ec4c68ebe7a20ab07ca
SHA171fdd7f76287aac30f0c12a6559ecfffad7579e6
SHA2562eb26253b3647c9cf2d0b6f80bc4ec11f2723cce287d2afa5f7fb4c40cce4b5b
SHA5122c82843878f54cdd50ce9a8777a9e16c960756e521be5083f2474ba1d6f20d2f5d5765f07587aa1e88348cf5a2e114d91ba4d2bf9eb634c3e758d17b94f0897d
-
Filesize
26KB
MD575eb37924e68b2595bc0312918d4a63b
SHA110ab938fc66cd08bb0c46829ab22b17019af7197
SHA2567b1ff2f554870ae049b64929791e7c45191610b709cfbaa5a095694d5252dd69
SHA5124527d987450b54872ce0dfe9258ae8cb72b37faab7ab331638c7ca5a27f7bce78cc912548ad0376bcd3daf305d91ee7ac8f4ce373cbea297e43b4659303771a6
-
Filesize
8B
MD5fcbaf0a2c3988ef775359f94d545ab42
SHA1174ccd98ff87b8e6f46eebc493f379beafeb3b08
SHA256895aaa8dac57f2bb76ddc8c2681e0480bf57dbf3f62cda3840cb448b8615612f
SHA5127c81b6445708b1c482599bfb808e90462d6111e885691dd947d9cdf95ba028d580b20027575814a310a81f310261b649792b65153ce43063da063b5005561d20