Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe
Resource
win7-20220901-en
General
-
Target
886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe
-
Size
121KB
-
MD5
1c6d0a9cf0b66e421fa982e3e4ec9776
-
SHA1
ec597ecc8548f6486cceeb4bf1723a8c563a835a
-
SHA256
886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df
-
SHA512
b99cbce6a153b764d5093f90d9b18c1d409d1b44b1d54ea8d0e26857b1723277a3a2b8003ae550a39794834d8127a7251c19305a46c0d2ac05988da1096f8267
-
SSDEEP
3072:PwaY46tGNttyJQ7KRBNf3wRqQxKvxnsRcaC:Y46tGdyRPeyxT
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe -
Executes dropped EXE 2 IoCs
pid Process 2412 Logo1_.exe 3128 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.167.21\MicrosoftEdgeUpdateCore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Notifications\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PIXEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Portal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe File created C:\Windows\Logo1_.exe 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe 2412 Logo1_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3128 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3128 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4812 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 82 PID 2204 wrote to memory of 4812 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 82 PID 2204 wrote to memory of 4812 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 82 PID 4812 wrote to memory of 1780 4812 net.exe 84 PID 4812 wrote to memory of 1780 4812 net.exe 84 PID 4812 wrote to memory of 1780 4812 net.exe 84 PID 2204 wrote to memory of 2352 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 85 PID 2204 wrote to memory of 2352 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 85 PID 2204 wrote to memory of 2352 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 85 PID 2204 wrote to memory of 2412 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 86 PID 2204 wrote to memory of 2412 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 86 PID 2204 wrote to memory of 2412 2204 886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe 86 PID 2412 wrote to memory of 1180 2412 Logo1_.exe 87 PID 2412 wrote to memory of 1180 2412 Logo1_.exe 87 PID 2412 wrote to memory of 1180 2412 Logo1_.exe 87 PID 1180 wrote to memory of 1412 1180 net.exe 90 PID 1180 wrote to memory of 1412 1180 net.exe 90 PID 1180 wrote to memory of 1412 1180 net.exe 90 PID 2352 wrote to memory of 3128 2352 cmd.exe 91 PID 2352 wrote to memory of 3128 2352 cmd.exe 91 PID 2352 wrote to memory of 3128 2352 cmd.exe 91 PID 2412 wrote to memory of 1900 2412 Logo1_.exe 92 PID 2412 wrote to memory of 1900 2412 Logo1_.exe 92 PID 2412 wrote to memory of 1900 2412 Logo1_.exe 92 PID 1900 wrote to memory of 4056 1900 net.exe 94 PID 1900 wrote to memory of 4056 1900 net.exe 94 PID 1900 wrote to memory of 4056 1900 net.exe 94 PID 2412 wrote to memory of 980 2412 Logo1_.exe 50 PID 2412 wrote to memory of 980 2412 Logo1_.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe"C:\Users\Admin\AppData\Local\Temp\886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD4F8.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe"C:\Users\Admin\AppData\Local\Temp\886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3128
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1412
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4056
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD54618befcd69ec0a989aad1bd44461c3b
SHA16e1de53848c45bee2ff04722772df04b74c09f1a
SHA256a60c12f4227c4dac15c2c22f90d9bea3320c9640decc65184aff6027d5185588
SHA5123507068eb65194566a6a40830e70d03bf72f743b77ee7122ee1944c32067ad725af346f343a4bf6ead6ef4b0b9617919d85ba4da794be4077a464ddbc5ff6569
-
C:\Users\Admin\AppData\Local\Temp\886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe
Filesize88KB
MD59f480ae6157a5f6494343702163f9ed1
SHA165fed913b986aaa19e4287bee72170f4e3bc71e4
SHA256573ef3707a5a7fd58dd7e529c1a9f19d1e5f2f68df1be157080bc830e8a3d97d
SHA512ca20f65fdfc080e4b9a7cd786ba8cd174dd651469d758c94f82661f213faec3dd772f0f843dee6e72c7b78ffd99c5deacccc11f0bd93c924909aa1fe77f8831d
-
C:\Users\Admin\AppData\Local\Temp\886e8c24ade86028836b99f8c3e1a967bc870b2470c3fa707476ec265e9504df.exe.exe
Filesize88KB
MD59f480ae6157a5f6494343702163f9ed1
SHA165fed913b986aaa19e4287bee72170f4e3bc71e4
SHA256573ef3707a5a7fd58dd7e529c1a9f19d1e5f2f68df1be157080bc830e8a3d97d
SHA512ca20f65fdfc080e4b9a7cd786ba8cd174dd651469d758c94f82661f213faec3dd772f0f843dee6e72c7b78ffd99c5deacccc11f0bd93c924909aa1fe77f8831d
-
Filesize
33KB
MD5fd4d8de3b2a84d826f8cbb041578dd83
SHA101402685a8ccad998d16e01f02b1ea4bb5a99b6c
SHA256acf0f42a040f9cbc3f9ac288160b49488a632490c281768c67936ba61b6b6341
SHA5124acb4696361f5a2d62bf09b49c6e609640d4d8753b5971451635ee9d91a9f021cf21d3e3494017f35d85d3deb408900bfa49f71b75e5be8401e8cee03b4e93d3
-
Filesize
33KB
MD5fd4d8de3b2a84d826f8cbb041578dd83
SHA101402685a8ccad998d16e01f02b1ea4bb5a99b6c
SHA256acf0f42a040f9cbc3f9ac288160b49488a632490c281768c67936ba61b6b6341
SHA5124acb4696361f5a2d62bf09b49c6e609640d4d8753b5971451635ee9d91a9f021cf21d3e3494017f35d85d3deb408900bfa49f71b75e5be8401e8cee03b4e93d3
-
Filesize
33KB
MD5fd4d8de3b2a84d826f8cbb041578dd83
SHA101402685a8ccad998d16e01f02b1ea4bb5a99b6c
SHA256acf0f42a040f9cbc3f9ac288160b49488a632490c281768c67936ba61b6b6341
SHA5124acb4696361f5a2d62bf09b49c6e609640d4d8753b5971451635ee9d91a9f021cf21d3e3494017f35d85d3deb408900bfa49f71b75e5be8401e8cee03b4e93d3