Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe
Resource
win10v2004-20240802-en
General
-
Target
90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe
-
Size
383KB
-
MD5
1ad3d81781370907fa47413b556115f8
-
SHA1
09b085e38db794cfbc43d58f747b2b40376cc35d
-
SHA256
90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79
-
SHA512
2a14da66a86077b26290b74770c502b7687047e29c6f93a5482a2c11fb3e6d3b0d3c0f01d61e42dda33415485201c39834e9b1d2eb4a3e24fd77abc002f3c5fd
-
SSDEEP
6144:0VfjmNu4WATf7l+psskdSMLLSATCNxFx3TQqNLz:27+uITfgps/dSsLTCNxgWLz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4776 Logo1_.exe 3652 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-BR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\et-EE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ca-ES\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe File created C:\Windows\Logo1_.exe 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe 4776 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1132 2752 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe 83 PID 2752 wrote to memory of 1132 2752 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe 83 PID 2752 wrote to memory of 1132 2752 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe 83 PID 2752 wrote to memory of 4776 2752 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe 84 PID 2752 wrote to memory of 4776 2752 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe 84 PID 2752 wrote to memory of 4776 2752 90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe 84 PID 4776 wrote to memory of 4792 4776 Logo1_.exe 85 PID 4776 wrote to memory of 4792 4776 Logo1_.exe 85 PID 4776 wrote to memory of 4792 4776 Logo1_.exe 85 PID 4792 wrote to memory of 4820 4792 net.exe 87 PID 4792 wrote to memory of 4820 4792 net.exe 87 PID 4792 wrote to memory of 4820 4792 net.exe 87 PID 1132 wrote to memory of 3652 1132 cmd.exe 89 PID 1132 wrote to memory of 3652 1132 cmd.exe 89 PID 1132 wrote to memory of 3652 1132 cmd.exe 89 PID 4776 wrote to memory of 3476 4776 Logo1_.exe 56 PID 4776 wrote to memory of 3476 4776 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe"C:\Users\Admin\AppData\Local\Temp\90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5EE9.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe"C:\Users\Admin\AppData\Local\Temp\90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3652
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD55aa4338434853c59bcde9d90cc7cf799
SHA12c181af79469166b7d9c1b4434fcaf0774de92e2
SHA256dc87dd3d518bea8e2a0a9436ec184ae4de99e9d924eeac4b70ce1d6684fb61bc
SHA512c39a896b1c32e9b1fa94711fe8fb16bd7660920139f5f053a579bfbda14be888fc75d111d11f878852169bf6054951882d5f090e19105dab796e8b0484115bcc
-
Filesize
570KB
MD50a65037a70b947632f86b1405b0b81f2
SHA168714eac7d4baf1521a7e16599f34bc22a73cd67
SHA2561889dfdb23441c347bb5d2e15e5ead7e5cb970937e871ae705174fad41098311
SHA5121a4927435efe085b461a2eb02b097d5c500220948e3b6d07a8a83971b4371fb6d205f5d8f5fa791c274ca39aeeffadb98ac0929b2d425c05d02d10af02782a8c
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5f1e8d6acd442f6eb0d58029eb3baeb86
SHA1ab67b0319edf36f71da6da9d858abc60f44bebb2
SHA256afe4cedece092e1fa3986f08e57946a750486a01e4552081a75bd8950387a7be
SHA5120f1e30e913718e4f4b695e23599f8653c9e0f29d495875fca4898b6cc7927462a49f222ebecd709f6f21f5a4265d739ec5ee85e0961d07cedb6ea13ee5571fec
-
C:\Users\Admin\AppData\Local\Temp\90dd9a96aa8ffda6797cb77fb66fa4d92aadd039a98a1923a1db2ea4ed057b79.exe.exe
Filesize357KB
MD513d397c39908367dbd8f6a271978936a
SHA1f17dd2fc0304b3ce0de7d1ee07c5416d7f8770b4
SHA2565f1ec77cac147c80ef32b3b1cb1ce941359e8077bba0203d9a5cb60301a38006
SHA51206cc81e9616f8e7286518951636b9ce0015532f58a456805c048f17c97bdd435b490b3b5b53f290a3bce9088b9b9e16f414b0427647e4293251067a29f36b945
-
Filesize
26KB
MD5eef1439386c015a2051ca663969bc0fe
SHA17556ca851b74d7b07b69f2280d46a93541a2afec
SHA256d5b33c767d3bd46605b4e1d6f4ba80a098b0cfba7f1dc70a6142b81ef79f9cba
SHA512f1d1f6d0bbbe1e503c63c471b18e260b95433c29c8edf0090a4c35bb8567514f1796275f32446f7a9041cebef75ee69457b0a90e4163ce978175ecaa401440ac
-
Filesize
8B
MD55d65d1288c9ecedfd5f28d17a01a30bc
SHA1e5bb89b8ad5c73516abf7e3baeaf1855154381dc
SHA2563501728ad227b52ce4d4f85ddd0e6d28dfa7acce977ae27f1e337be209825a5f
SHA5126177ce001dd535382c3bae5e8c3cfda85d8d8b76b68bce10fa8e5e1e748fd1512a531ffc93fef1316f2c27d93b5b4a5b60a6391f0e131ccc5cc0a65c2755868e