Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe
Resource
win10v2004-20240802-en
General
-
Target
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe
-
Size
35KB
-
MD5
02cfb4130187dec11bd92eff544d2ac1
-
SHA1
e22a42564e6a8e93d8e54dc25f47f05616b8efe6
-
SHA256
32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086
-
SHA512
3599b027f199369857944b33fc1d179874c5b58b539cafb1139d90647f373c4348e7476a2062bdc83c6a9986e11306bae6deb6b2e52b8dc774618f3e79049e80
-
SSDEEP
768:V16GVRu1yK9fMFLKaTxsujCT7pZpY04O30pG2a:T3SHmLKarIpY04G9B
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4132 Logo1_.exe 2328 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe Logo1_.exe File created C:\Program Files\WindowsApps\MutableBackup\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Shell\Themes\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe File created C:\Windows\Logo1_.exe 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe 4132 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3624 wrote to memory of 4184 3624 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 82 PID 3624 wrote to memory of 4184 3624 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 82 PID 3624 wrote to memory of 4184 3624 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 82 PID 3624 wrote to memory of 4132 3624 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 83 PID 3624 wrote to memory of 4132 3624 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 83 PID 3624 wrote to memory of 4132 3624 32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe 83 PID 4132 wrote to memory of 4436 4132 Logo1_.exe 85 PID 4132 wrote to memory of 4436 4132 Logo1_.exe 85 PID 4132 wrote to memory of 4436 4132 Logo1_.exe 85 PID 4436 wrote to memory of 3688 4436 net.exe 87 PID 4436 wrote to memory of 3688 4436 net.exe 87 PID 4436 wrote to memory of 3688 4436 net.exe 87 PID 4184 wrote to memory of 2328 4184 cmd.exe 88 PID 4184 wrote to memory of 2328 4184 cmd.exe 88 PID 4184 wrote to memory of 2328 4184 cmd.exe 88 PID 4132 wrote to memory of 3512 4132 Logo1_.exe 54 PID 4132 wrote to memory of 3512 4132 Logo1_.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9715.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe"4⤵
- Executes dropped EXE
PID:2328
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5daee96e93be21c25daf9d6a002e39552
SHA127c17b2bbc4c7651260da59ece2d8cb3acecc587
SHA256b1f235e9e02ac940253a8b885ef6d554e5b7833c65d052d11f9db268a01fd302
SHA51270ffdb039105829efbd3c0f3f042fd3451a86531b54784ce6ca371342a6984a4351a9ef03c9a1b8273ebeefa27e7d559f6fc3be05458076162ef4ea8a5fc100d
-
Filesize
571KB
MD5cc50909f603d8293c48865555ce7c85d
SHA1259b57cb73add74e21eb9492e378fab72945e704
SHA2560424d824da780cbc0d2760b22fba320f8ee11a38ef345d221d8f80f9b3dfc4b0
SHA51226b7d331be29ac4ecfe7fdae26a6a95fa03cc27cabd6b36bea1ddd37594fdbaf4a264f975c6cb0b24ed410e0ad8c9c7b97a57726a0eb7ac5562077efee923aed
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize637KB
MD59cba1e86016b20490fff38fb45ff4963
SHA1378720d36869d50d06e9ffeef87488fbc2a8c8f7
SHA256a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19
SHA5122f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765
-
Filesize
722B
MD509682251a39fdbfb1a3143b637764aa8
SHA131340659eb08326116523356463dae51b50cb9f1
SHA2563f40e11c06a42ee41e799223434824887cea19187b88ceb56e6a122e42ddbbdb
SHA512cb5a5b77b0a75d0664aa48f66e9341204724dbdd4c61283309f1a181919fd3e5da9f0484653695bde7954230ad085723ea1118a3c5098aaad68809734624b6e9
-
C:\Users\Admin\AppData\Local\Temp\32a95e71bfdb526b3cebf2c26d8e362b0cafad36ce2df6c8939b67d328639086.exe.exe
Filesize8KB
MD55243ae7347809960a907a4494807de00
SHA1b40e0a218cf9982a3f546fa004e60e428d1bd7fc
SHA256ed9c09c62b604d67c46027c4a3fb868a8d89a30ba299a35c47f0ffed690c36c9
SHA512758b40e36b3037d40c1f4ec3426fc14c2b622af864f59a077309041171709f9d2c2ba25241eeeca1e0d6d767a328ab91e00c8bd114ae4fd4e599a9874ec5b60c
-
Filesize
27KB
MD5c1e93a00c76fe9038279108132881b11
SHA1db99e99d49c3ceec5aa5181573456c486696dd2a
SHA2567c29108cb820ca23779c64a8e419596bf53578df1329e8c4abde530daf8b0d5a
SHA51277c0e401c1a1782ee96c7f7f58748f898e8e7819952c81b04087c0dbc765b7e0b9591b8e17589a17ace293719a935525d79f376db53c9a82c3fc3f16dbc893b5
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf