Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe
Resource
win10v2004-20240802-en
General
-
Target
0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe
-
Size
52KB
-
MD5
f04b3c4850ffb3eadcfcdd49013daff2
-
SHA1
26952c8a0eb5342197e6ef46394e7751ccf80b75
-
SHA256
0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133
-
SHA512
b077f23d68a23dc74fc63d5663ea758e930007f191bb7df44f15e8785950754af81f00c875f19544a5c5c923550b3cb132107d46a9397ad3cb44f6453991e142
-
SSDEEP
768:pGJYg16GVRu1yK9fMnJG2V9dHS85qgt6jpYU5ltbDrYiI0oPxWExI:pGr3SHuJV9NP6jWWvr78Pxc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3144 Logo1_.exe 2648 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\sr-latn-cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.MagicEdit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hu-HU\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-Toolkit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-BR\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe File created C:\Windows\Logo1_.exe 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe 3144 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3824 OpenWith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1500 wrote to memory of 5004 1500 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe 83 PID 1500 wrote to memory of 5004 1500 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe 83 PID 1500 wrote to memory of 5004 1500 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe 83 PID 1500 wrote to memory of 3144 1500 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe 85 PID 1500 wrote to memory of 3144 1500 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe 85 PID 1500 wrote to memory of 3144 1500 0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe 85 PID 3144 wrote to memory of 4100 3144 Logo1_.exe 86 PID 3144 wrote to memory of 4100 3144 Logo1_.exe 86 PID 3144 wrote to memory of 4100 3144 Logo1_.exe 86 PID 4100 wrote to memory of 4596 4100 net.exe 88 PID 4100 wrote to memory of 4596 4100 net.exe 88 PID 4100 wrote to memory of 4596 4100 net.exe 88 PID 5004 wrote to memory of 2648 5004 cmd.exe 89 PID 5004 wrote to memory of 2648 5004 cmd.exe 89 PID 3144 wrote to memory of 3520 3144 Logo1_.exe 56 PID 3144 wrote to memory of 3520 3144 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe"C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a667A.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe"C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe"4⤵
- Executes dropped EXE
PID:2648
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD55f0181971ad5b0ac47c6dc3c344bda3d
SHA1c0b978c343cdcbcde0d9559dd340e93e3becf2ef
SHA2562726302227e4f4ea4f961ea72a2213f78083e70583d9a08e578debfb1b8d2b81
SHA5120f316b3725931f46471c022c57f0c61fe0373dabfb3da9d4080c9e233c184bfec5ed1b8c98eb81f1edea2fe6234e7429e888b267ea4217327c53ee73f8e2f5b7
-
Filesize
573KB
MD5ec2e945a357824f70f245c0b3d0580e5
SHA14ce100487f06095223db9209441443d478add3e1
SHA2561c84e2a648c2feb2f2f12cfe888e95f6d4cbc7bfcfbe980b49429f6d8b86e37a
SHA512f3713fc921b773b9d5db7087476fe73439b01a57b5c6c296868bb350c86082493ed97c9c8fa9ac949aa48d6b08f739f729dab92b8517e962fbc16e8ae2a68a38
-
Filesize
722B
MD5cee51fa2d6590142cb9acc9aa43f426e
SHA15ad9ac5826b7591b9b1afb883c51361ac9d834cf
SHA25645054708125ac44dde726b275af4e987e84ead172a3793f83acc4e7cae5604e2
SHA512a572ad9012ec6ce78a7198adc1ed8f2fe473dad9d185c13161d477085a1facf6207114bd1b5c7ffffe8773306110657062b31a4ea0aa8374a174116d8685f582
-
C:\Users\Admin\AppData\Local\Temp\0a6f6e83542baed4f0bbd8f86713e414aad16a4aac50f4b140a19b5aa2df2133.exe.exe
Filesize23KB
MD53f9dbfee668294872ef01b90740b01d0
SHA199a4702b65485cd14736b1c2cdfb81b455dda01c
SHA25640b32fea1fcadcb2db369475e2bba58b0b83f5c3bb647e2e63877726c35a9f86
SHA5120113cec160d97ea0cce70860cc5b79b502d16191ee237a3abb84309499be193aa0127dbcb41fc05a90fa61484b061ec4332ad29a918db598e32fe832b74bd1e3
-
Filesize
29KB
MD541d00e6ffc4c6a0cf2f90dee70d92c90
SHA1e97fa0cdb1f4ed2a8eb568d11836bfa003561316
SHA256eaacb8352a7177a0d406a57ac7c8f493e00a1b6648a7b74a5c3a8b5849561c40
SHA512aa724b87673ffc878f06257b9a1a0c4f5fecbec61f8cc4eb833fc09cee3e5b3607c976beffb5fbb3a5a908005b821b83a780465a21d895cf29a15d19f2aa448b
-
Filesize
9B
MD5cd0bf5c2efb8cc7ddbff2ab5d2cb7e87
SHA16830a1817f2055b6beba9063b87af16bbef7fa19
SHA256d00701a279110fcafdaa6a9dcb36385845f9d2aac5b1ac1c52c015c61718dcbd
SHA5126fabfd6bced63153d3dd6b376a92e824c95b15ef046607b89376a17c7ac863e92c95770ed86d8ecec3639d280dd6256a7ab1ec2d8119799fb3a479fbce96254a