Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe
Resource
win10v2004-20240802-en
General
-
Target
02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe
-
Size
393KB
-
MD5
8eaf7b4efcc8dd3567706983eb7df5c3
-
SHA1
f4ea36e1cc2895ff735f32d4e9d32b049dd800a3
-
SHA256
02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51
-
SHA512
f26ed01c1a1b5753b5b8db3aed7074d58f496a2261c9e703e231bd5b45b94a02332253f5d911bb2d4d041675ccad4c435381d9484a655fc49473c171f2d90484
-
SSDEEP
6144:w5uJOnDXYQ/BWJjmpgtBZQZKQj8p3jyb7HREd4SZ1tzLbF:w3DXYJmSTZwYp32bY4qtDF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2756 Logo1_.exe 3576 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ml-IN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe File created C:\Windows\Logo1_.exe 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4716 3428 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe 84 PID 3428 wrote to memory of 4716 3428 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe 84 PID 3428 wrote to memory of 4716 3428 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe 84 PID 3428 wrote to memory of 2756 3428 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe 85 PID 3428 wrote to memory of 2756 3428 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe 85 PID 3428 wrote to memory of 2756 3428 02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe 85 PID 2756 wrote to memory of 3840 2756 Logo1_.exe 86 PID 2756 wrote to memory of 3840 2756 Logo1_.exe 86 PID 2756 wrote to memory of 3840 2756 Logo1_.exe 86 PID 3840 wrote to memory of 3208 3840 net.exe 88 PID 3840 wrote to memory of 3208 3840 net.exe 88 PID 3840 wrote to memory of 3208 3840 net.exe 88 PID 4716 wrote to memory of 3576 4716 cmd.exe 90 PID 4716 wrote to memory of 3576 4716 cmd.exe 90 PID 2756 wrote to memory of 3440 2756 Logo1_.exe 56 PID 2756 wrote to memory of 3440 2756 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe"C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBD06.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe"C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe"4⤵
- Executes dropped EXE
PID:3576
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD56dd38c010083e5c13ff3936a5548205a
SHA1a6a6aeb9015170dc88f15153f63b7d7ddb91a036
SHA25655b5774046171e5182383aebde54e6bbc6a6c1f0ad6da1ab592329e14202bfa2
SHA512002afe6d11c710abe9a69a00bbdb02eba11ec3edec7c38cbcca84f897aa4c399e460a98820a7efe9c94ad0cf05527705ccbb29477fe8969ac3545564b3ac8a37
-
Filesize
573KB
MD51719a2d1601992ea793d68322ec8b503
SHA19d6144a655fa6e3b622e514aa287702492bce00b
SHA2566380c20c410827f37697fb381db2ef5558bfef573e386bb6a2407e81b239d609
SHA512d08719e0beef69a1f5acfadfc95bdba1e685a1cd51608dbea50c0a4b939ca732c11ecdfe2b2c0f1705a323ecc1d1464da5fd8de7643a052ddebe26070ed4019b
-
Filesize
722B
MD5e70448fa1296813fd3ce52c20e14a7df
SHA1213eb04e2fe11e4013aab321bc557c0eae11cf87
SHA25600a07ead5d294fb75a10e3899d91edd1f76830cbbb48b68de19853875bfd8565
SHA512125b6b6142ec7a62def9d9cfbc06344ac25c00b4a1bf9b7275075d9141bf86cd7401188da70a5fe7671afbcbc72e61f044eea935a93b8c9f14dfc8505c12c8d7
-
C:\Users\Admin\AppData\Local\Temp\02cef4ff5490a0eb190b854f104cc8c4ebc0e07f988d1a22568889cc1e3ccc51.exe.exe
Filesize364KB
MD5213eeb5e8f54231f68e5b26a0fc81bd1
SHA11bc31a42536eacbb57d1cd92ec4b5524a82264d2
SHA256b309045509efc205eb35d6037d64640093fde6c54ec5934e329b447417005a50
SHA512ce35c5f453126c98329df141f821c55692f9252549c76921c231d8170df356cda1689e636758519c0b6898f11b5c836cdb4967d296b99f915e4d1980470a083b
-
Filesize
29KB
MD5fe81b352c926f7b1f4c870e720357e97
SHA134b1cfd656edd3961964a52c1e22c46d50efc25b
SHA256d39225fb89e1911dd419a40747fa7d039f64c60740c4d606f59e7da28f84f00d
SHA5122a7673cb82f6ee26823303c51453809e8b8573d0cb3c6129407c363bff6a611d8349fa9d90ee756cd5e589e9ffc3509b34eed61318922f37721913eb9bbd1808
-
Filesize
9B
MD54a3bb7dd20666e6acdbbb0a30534552a
SHA19734039e7de3c663de70f65e731dc3426e73940c
SHA25644b303f424240fd96e60c63ce757a0011734fd320fe031942712f1a1a083fd47
SHA5128b20f7e731d617da7c6d7c1fe1b50424ce3edc58cbc7598b662f0db6e0a31dc92e2d1ecd56021fe43e035bd36e4edd9d3cb80f22afc224096cc3974396076f07