Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
Resource
win10v2004-20240802-en
General
-
Target
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe
-
Size
713KB
-
MD5
8f611028b6eb10f2dc91d3515b62fcba
-
SHA1
4431412ab5f057b64f592f48dc8ba8a948ba4a3a
-
SHA256
38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7
-
SHA512
1ca318ce6b038ab563cbde483be4121069aaff4c1ef646e2344cf36f4ec034a265e8e2147c0279cd36d708b26951a9a4f26bc694fb8d942a0964cf68a27a40a6
-
SSDEEP
12288:bfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:LLOS2opPIXV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4220 Logo1_.exe 1480 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\el-GR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\cef\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\en-us\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\ImmersiveVideoPlayback\Content\Shaders\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hr-HR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe File created C:\Windows\Logo1_.exe 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe 4220 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 448 wrote to memory of 1004 448 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 84 PID 448 wrote to memory of 1004 448 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 84 PID 448 wrote to memory of 1004 448 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 84 PID 448 wrote to memory of 4220 448 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 85 PID 448 wrote to memory of 4220 448 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 85 PID 448 wrote to memory of 4220 448 38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe 85 PID 4220 wrote to memory of 2940 4220 Logo1_.exe 87 PID 4220 wrote to memory of 2940 4220 Logo1_.exe 87 PID 4220 wrote to memory of 2940 4220 Logo1_.exe 87 PID 2940 wrote to memory of 4400 2940 net.exe 89 PID 2940 wrote to memory of 4400 2940 net.exe 89 PID 2940 wrote to memory of 4400 2940 net.exe 89 PID 1004 wrote to memory of 1480 1004 cmd.exe 90 PID 1004 wrote to memory of 1480 1004 cmd.exe 90 PID 4220 wrote to memory of 3472 4220 Logo1_.exe 56 PID 4220 wrote to memory of 3472 4220 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9839.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe"4⤵
- Executes dropped EXE
PID:1480
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD598d6ec076affb1dea33abdd4843c21a9
SHA1582d4e5c8b09f21af9a280f6e0d707d3fb7b8502
SHA256e74c06cab239b237e5553a83b62005fdc796750d9cf6a11b5d7d78b6099adafa
SHA5124dd48a27489cae7e04ca9cd70987af6fc968c0d11a301a3117ff68447e06d9f23ba8cdc642f4be2380b082ff4cf8bf60145eb26e95e1d24fa5b07199e50ca33c
-
Filesize
573KB
MD577b7038561b33c2346fc1744724908c4
SHA13a4942ed70b781b1977d87d69db1269d22c030ea
SHA256b856781d2b3b0bd516413ac4332fa0973a8a30f08cd22e95cef2bbe850e8d701
SHA51209819da55166dbd72f4595c97c2a44d98e71c69a294dc248a6810cac15710ff5f38e53613968466d597658aafb3afefbb199f755dbea2d4a17311de1d09c8a07
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5fdc5a81c18567cb220564ba55e8d7be7
SHA1dfd68e6c2ee80bca6834cc65acd20ac712763211
SHA2562fa38747faeabdadfee00a92284940d5ba67bd18cc5f2eac1d24b2eb51ef4560
SHA51265459f75900b5e80025e8fa3b02ff74ff87df408c85a811aeee1596aaa071548f63db773ac6418c4d26a98211f5b3997b5e5be6402be0e87d4ab6622eaaeb31e
-
Filesize
722B
MD5638ab9b0ef842a49431b8daac5f56f0a
SHA1c532d2d33261bfa78d4cfce6e1cccf0347cfce6a
SHA256881996ff18d317fc494cfbaf4e9de13b60c7fad93847885d494a3ca1ef641a1e
SHA51290f61d71ab51752d917eeed77bef07f6b6c345934faf7d6fa52221d75be622a7e5b6e8d82f8d0e2f04fedbdc1fbb5990dd5467a90d23adc1c5f58fb125cf462b
-
C:\Users\Admin\AppData\Local\Temp\38071126e763492b2983e53f936cc1acfc8118e9282498edd61511dcbb7fa5d7.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
29KB
MD502c3a4e7f369c64fcc4c92be92bc6e29
SHA1031a8330543a7a12de06d356e5e2b75ec8bf760a
SHA256a737dfa46ed58e1ac2264b44e764be23b0d8548717967a4494c13d7669638ac0
SHA51269469ae10b8942fb7ba0e72b47e375dffb31dca5fd8a9ef738dad403b19d17b0e4bc55ebb4d25244d5d99e9e99972bc80675f16554bb8f72f17bfa7d010fa76f
-
Filesize
9B
MD501a8a4ee3580d4da5c60557485bef735
SHA1f792412989fd2ce56b5d859cceef65819bf0ddf0
SHA256e2897bad6bc31a67e597a2ef77fce6939385cf6bd64587f2cc006436c43a4f2b
SHA5128ae193b79f1861b54d2a26031b161bf9aa6929661871de0f2c1cd1db91c5384244332bafc72bea107045eb0b41d876053ce11f5ce70147832f1871816c641145