Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 10:25
Behavioral task
behavioral1
Sample
694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Resource
win7-20220812-en
General
-
Target
694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
-
Size
436KB
-
MD5
68903762db226e18344ac90a11fb8fb0
-
SHA1
4ad4e25df70ded17bc5f4f1bc9bda781d704d899
-
SHA256
694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba
-
SHA512
eae7273a9adca8f6dac4895eff0a6ac7fadb71ae8f43c031d6c0d741377ad4cf7c491e8c860aa9970367841fb9b1a8796c4dc3512a7ba8594ed338a2e6e63e83
-
SSDEEP
6144:vrQ7X8rQ7X8rQ7X8rQ7X8rQ7XqF/rxWoksa+IlzpN7kypXsGKLu8N:vrE8rE8rE8rE8rEoxWJsClzPIytmx
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1368 Logo1_.exe 936 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 108 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 1352 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 1896 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 1440 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe -
resource yara_rule behavioral1/memory/536-55-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x000900000001318e-59.dat upx behavioral1/memory/536-60-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x000900000001318e-61.dat upx behavioral1/files/0x000a00000001313e-65.dat upx behavioral1/files/0x000a00000001313e-66.dat upx behavioral1/files/0x000a00000001313e-67.dat upx behavioral1/files/0x000a00000001313e-69.dat upx behavioral1/memory/936-71-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x00080000000132f6-73.dat upx behavioral1/files/0x00080000000132f6-74.dat upx behavioral1/files/0x00080000000132f6-75.dat upx behavioral1/files/0x00080000000132f6-77.dat upx behavioral1/memory/108-79-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x000b00000001313e-81.dat upx behavioral1/files/0x000b00000001313e-82.dat upx behavioral1/files/0x000b00000001313e-83.dat upx behavioral1/files/0x000b00000001313e-85.dat upx behavioral1/memory/1352-87-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x00090000000132f6-89.dat upx behavioral1/files/0x00090000000132f6-90.dat upx behavioral1/files/0x00090000000132f6-91.dat upx behavioral1/files/0x00090000000132f6-93.dat upx behavioral1/memory/1896-95-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1368-105-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x000c0000000054a8-106.dat upx behavioral1/memory/1368-109-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1316 cmd.exe -
Loads dropped DLL 12 IoCs
pid Process 1316 cmd.exe 1316 cmd.exe 1204 cmd.exe 1204 cmd.exe 1064 cmd.exe 1064 cmd.exe 1736 cmd.exe 1736 cmd.exe 1224 cmd.exe 1440 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 1440 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 1440 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe File created C:\Windows\Logo1_.exe 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe File created C:\Windows\Logo1_.exe 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe File created C:\Windows\Logo1_.exe 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe File created C:\Windows\Logo1_.exe 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe 1368 Logo1_.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 1524 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 27 PID 536 wrote to memory of 1524 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 27 PID 536 wrote to memory of 1524 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 27 PID 536 wrote to memory of 1524 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 27 PID 1524 wrote to memory of 1340 1524 net.exe 29 PID 1524 wrote to memory of 1340 1524 net.exe 29 PID 1524 wrote to memory of 1340 1524 net.exe 29 PID 1524 wrote to memory of 1340 1524 net.exe 29 PID 536 wrote to memory of 1316 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 30 PID 536 wrote to memory of 1316 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 30 PID 536 wrote to memory of 1316 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 30 PID 536 wrote to memory of 1316 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 30 PID 536 wrote to memory of 1368 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 31 PID 536 wrote to memory of 1368 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 31 PID 536 wrote to memory of 1368 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 31 PID 536 wrote to memory of 1368 536 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 31 PID 1368 wrote to memory of 1708 1368 Logo1_.exe 33 PID 1368 wrote to memory of 1708 1368 Logo1_.exe 33 PID 1368 wrote to memory of 1708 1368 Logo1_.exe 33 PID 1368 wrote to memory of 1708 1368 Logo1_.exe 33 PID 1708 wrote to memory of 1132 1708 net.exe 35 PID 1708 wrote to memory of 1132 1708 net.exe 35 PID 1708 wrote to memory of 1132 1708 net.exe 35 PID 1708 wrote to memory of 1132 1708 net.exe 35 PID 1316 wrote to memory of 936 1316 cmd.exe 36 PID 1316 wrote to memory of 936 1316 cmd.exe 36 PID 1316 wrote to memory of 936 1316 cmd.exe 36 PID 1316 wrote to memory of 936 1316 cmd.exe 36 PID 936 wrote to memory of 1204 936 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 37 PID 936 wrote to memory of 1204 936 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 37 PID 936 wrote to memory of 1204 936 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 37 PID 936 wrote to memory of 1204 936 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 37 PID 1204 wrote to memory of 108 1204 cmd.exe 39 PID 1204 wrote to memory of 108 1204 cmd.exe 39 PID 1204 wrote to memory of 108 1204 cmd.exe 39 PID 1204 wrote to memory of 108 1204 cmd.exe 39 PID 108 wrote to memory of 1064 108 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 40 PID 108 wrote to memory of 1064 108 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 40 PID 108 wrote to memory of 1064 108 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 40 PID 108 wrote to memory of 1064 108 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 40 PID 1064 wrote to memory of 1352 1064 cmd.exe 42 PID 1064 wrote to memory of 1352 1064 cmd.exe 42 PID 1064 wrote to memory of 1352 1064 cmd.exe 42 PID 1064 wrote to memory of 1352 1064 cmd.exe 42 PID 1352 wrote to memory of 1736 1352 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 43 PID 1352 wrote to memory of 1736 1352 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 43 PID 1352 wrote to memory of 1736 1352 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 43 PID 1352 wrote to memory of 1736 1352 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 43 PID 1736 wrote to memory of 1896 1736 cmd.exe 45 PID 1736 wrote to memory of 1896 1736 cmd.exe 45 PID 1736 wrote to memory of 1896 1736 cmd.exe 45 PID 1736 wrote to memory of 1896 1736 cmd.exe 45 PID 1896 wrote to memory of 1224 1896 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 46 PID 1896 wrote to memory of 1224 1896 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 46 PID 1896 wrote to memory of 1224 1896 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 46 PID 1896 wrote to memory of 1224 1896 694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe 46 PID 1224 wrote to memory of 1440 1224 cmd.exe 48 PID 1224 wrote to memory of 1440 1224 cmd.exe 48 PID 1224 wrote to memory of 1440 1224 cmd.exe 48 PID 1224 wrote to memory of 1440 1224 cmd.exe 48 PID 1224 wrote to memory of 1440 1224 cmd.exe 48 PID 1224 wrote to memory of 1440 1224 cmd.exe 48 PID 1224 wrote to memory of 1440 1224 cmd.exe 48 PID 1368 wrote to memory of 1296 1368 Logo1_.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"3⤵PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1A26.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1C58.bat4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D23.bat6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1EF7.bat8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1FA2.bat10⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1440
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵PID:1296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1032
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5fdee4f086ab5521200ad8cdcf41b9338
SHA17e4a025c0dec9bd30edd9725324baf9dacd2db4c
SHA2564028c001e47f03ddcc800519e76c1e3ffd4d150e3dd92408e595744c29090e69
SHA512c65e2f702d5c4b598978495c6fa24dda3888423b9e93b82bed0428655af8e02f72e17e225b58b4ef6d71327e06b36e88dcf2c8fd02bdb2f27514e3d50db153ee
-
Filesize
722B
MD51cf5dd002c0c028d245ff522e22aa969
SHA18db5bb19a89612aecf0c1af548b4db5e41857d48
SHA256f6cf763d286e2c2e25067a87f25c78c955b4384ec88c77f2ce931baf02ca3baa
SHA512705bf7e712e1717b337574596824d26c3f4402642a329d5dc58cafc5ffe2ec30012bf02263685a4a1589a232e0c9f470a9bc1ea43fdf9ef262fbbed5c2d5d6e7
-
Filesize
722B
MD54a58591fd7e91c14a9f6b168b15b82c6
SHA1dec6a4dd11cb3fad82a10b38637e44980de39fea
SHA2568225cf48fc3da66237cdfdee353e203eb6462ce0f990a19642edd80760ce5373
SHA5127baade603b47f194ca5431906f6098e30c336a65402eeb0ddc58d6260506c227b8971bdfd3a62ad055758b29e1f28f3d08753c84a98750c71347d329bf7a8154
-
Filesize
722B
MD59b73f3b9638e2dc654273b208f9d050c
SHA1a9d40dae8ea177771a82c1b5c9240e5788eeeadf
SHA2565448d634a6fbde5bc0c96faf408b48cf58027531108aef0f01253a0529ce24b1
SHA512f493340cdc656972ca659b2fb54a71b7951f14b4808c500a3a49bb2f8f74b2895a147d138084bbe198db7603592822d58693ff8e353b2d760e159fa8ffbf0b0c
-
Filesize
722B
MD51a0d5cfc3b2daa02d4e2c6698c3211f9
SHA139f556f20e2b9a39a3e4292620e1cbc38cc55a92
SHA256affb6a2a0ce122974367002b47142bb8bc032b373f10a47609f058563d042fa7
SHA5122135c50257e6cb5c98adc7ca88b7d307458ed16073f956b2b3c7c40187bc85225e62713aa4464cd371a564ced2c279a7c1aac9ad24fcc7585cb9051eb2ff166a
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize340KB
MD5bc1ff70814310ca61ed48b4846bd93d6
SHA1f83575492bf084eef69aa73a450187bbde02cc27
SHA256ba48d7d47b07cb9ed0091614a9aae1a2f3fdb95186fcd0ce018834753022acce
SHA5123b55e76788a69154dccb13c54687d8dd33a182a220f00cea25bed3fb6f3ac56601250dae9ba633db5008fc5804ee6f77a9e131c8966d505c6c65d313924391c7
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize244KB
MD5556bb40cb647ba8803469f3ff19249df
SHA1f987beb346fec716a813bf8ec5715129eaead5e9
SHA256d4e88b11d1d9142dd4942b928ec13fc13cbfffaeeb22832e1d292cd16a4d73fc
SHA512d725843a3ffe38e3f8b41a577d00d2d972a02045a914cecffde66107e18b7e6890b44aec2743f5fe7bebc543db89e8a6507f2157ac23f4fc559f1c0393b33377
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize388KB
MD542eb7386a235f374ced15ff014c74fbc
SHA121aace04b3f7fe500ff2e07a0c340f8bdfc07d8a
SHA25610b5b2bd640e5d49deca3819abbb3c3fc2d0657237b13ae389e7939ceb35b766
SHA51264c014a85fbd4133b5446fb180eca9250a0b2bef6893aca2548de59147b769706a438092e24b1c5b3d53c9416422167c8454c8adc56024f2cb5458a12d469004
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize292KB
MD58262261e06fc26a33e6e6823f29aede2
SHA1f56b7c3f8f3c36e54c9141afdc5b581f8c461dfa
SHA256264069c891f0c19c66887a4fc02753076851cdf9a0621e876d94b812f396dd4b
SHA5122b004a9147733cf05dd917645b6e4ddbd7773954ead59a89a527e09606d98f9d01a3c93f14f4fea4f086289916b4984f796028b1c9c5ebce7df34d2afe30c56f
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize196KB
MD5e277c899323a685b21ff31a4da07bb6d
SHA11fdf231e80a4f0b8331313b577814348cdf224e6
SHA256d3af26599e093e4f8250662f5590e9c556dadb271a31231a7e35fcd4da5b1700
SHA51217ef1af2962d6a15dcc57bb2a9b22196405d839659b0b1be6960dd4b5f0a02f1a9aa9641a79ccf26a2b9b0214e95f0230593c2d91aa2966d9deadf1a05da04f4
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe.exe
Filesize340KB
MD5bc1ff70814310ca61ed48b4846bd93d6
SHA1f83575492bf084eef69aa73a450187bbde02cc27
SHA256ba48d7d47b07cb9ed0091614a9aae1a2f3fdb95186fcd0ce018834753022acce
SHA5123b55e76788a69154dccb13c54687d8dd33a182a220f00cea25bed3fb6f3ac56601250dae9ba633db5008fc5804ee6f77a9e131c8966d505c6c65d313924391c7
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe.exe
Filesize244KB
MD5556bb40cb647ba8803469f3ff19249df
SHA1f987beb346fec716a813bf8ec5715129eaead5e9
SHA256d4e88b11d1d9142dd4942b928ec13fc13cbfffaeeb22832e1d292cd16a4d73fc
SHA512d725843a3ffe38e3f8b41a577d00d2d972a02045a914cecffde66107e18b7e6890b44aec2743f5fe7bebc543db89e8a6507f2157ac23f4fc559f1c0393b33377
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe.exe
Filesize388KB
MD542eb7386a235f374ced15ff014c74fbc
SHA121aace04b3f7fe500ff2e07a0c340f8bdfc07d8a
SHA25610b5b2bd640e5d49deca3819abbb3c3fc2d0657237b13ae389e7939ceb35b766
SHA51264c014a85fbd4133b5446fb180eca9250a0b2bef6893aca2548de59147b769706a438092e24b1c5b3d53c9416422167c8454c8adc56024f2cb5458a12d469004
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe.exe
Filesize292KB
MD58262261e06fc26a33e6e6823f29aede2
SHA1f56b7c3f8f3c36e54c9141afdc5b581f8c461dfa
SHA256264069c891f0c19c66887a4fc02753076851cdf9a0621e876d94b812f396dd4b
SHA5122b004a9147733cf05dd917645b6e4ddbd7773954ead59a89a527e09606d98f9d01a3c93f14f4fea4f086289916b4984f796028b1c9c5ebce7df34d2afe30c56f
-
C:\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe.exe
Filesize196KB
MD5e277c899323a685b21ff31a4da07bb6d
SHA11fdf231e80a4f0b8331313b577814348cdf224e6
SHA256d3af26599e093e4f8250662f5590e9c556dadb271a31231a7e35fcd4da5b1700
SHA51217ef1af2962d6a15dcc57bb2a9b22196405d839659b0b1be6960dd4b5f0a02f1a9aa9641a79ccf26a2b9b0214e95f0230593c2d91aa2966d9deadf1a05da04f4
-
Filesize
48KB
MD53e2de32f3ea909656d52b570d8c7dd29
SHA10ae3fa4ffc39e4f5faf4d6fadca810a3414832f9
SHA256546dcbd7105ff7e2f9d8231711d582d557ec1ab1ed08c15b95aa74ba1673ed99
SHA5123b5055aeab86d4f6f5a24105a869024035e7090e5e56f5a1e656e0a9422fd928f111d6f2611e7c77cfcbaffafc9894e9c2b269a3673a0d54a5bc2cfe547d61eb
-
Filesize
48KB
MD53e2de32f3ea909656d52b570d8c7dd29
SHA10ae3fa4ffc39e4f5faf4d6fadca810a3414832f9
SHA256546dcbd7105ff7e2f9d8231711d582d557ec1ab1ed08c15b95aa74ba1673ed99
SHA5123b5055aeab86d4f6f5a24105a869024035e7090e5e56f5a1e656e0a9422fd928f111d6f2611e7c77cfcbaffafc9894e9c2b269a3673a0d54a5bc2cfe547d61eb
-
Filesize
48KB
MD53e2de32f3ea909656d52b570d8c7dd29
SHA10ae3fa4ffc39e4f5faf4d6fadca810a3414832f9
SHA256546dcbd7105ff7e2f9d8231711d582d557ec1ab1ed08c15b95aa74ba1673ed99
SHA5123b5055aeab86d4f6f5a24105a869024035e7090e5e56f5a1e656e0a9422fd928f111d6f2611e7c77cfcbaffafc9894e9c2b269a3673a0d54a5bc2cfe547d61eb
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize340KB
MD5bc1ff70814310ca61ed48b4846bd93d6
SHA1f83575492bf084eef69aa73a450187bbde02cc27
SHA256ba48d7d47b07cb9ed0091614a9aae1a2f3fdb95186fcd0ce018834753022acce
SHA5123b55e76788a69154dccb13c54687d8dd33a182a220f00cea25bed3fb6f3ac56601250dae9ba633db5008fc5804ee6f77a9e131c8966d505c6c65d313924391c7
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize340KB
MD5bc1ff70814310ca61ed48b4846bd93d6
SHA1f83575492bf084eef69aa73a450187bbde02cc27
SHA256ba48d7d47b07cb9ed0091614a9aae1a2f3fdb95186fcd0ce018834753022acce
SHA5123b55e76788a69154dccb13c54687d8dd33a182a220f00cea25bed3fb6f3ac56601250dae9ba633db5008fc5804ee6f77a9e131c8966d505c6c65d313924391c7
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize244KB
MD5556bb40cb647ba8803469f3ff19249df
SHA1f987beb346fec716a813bf8ec5715129eaead5e9
SHA256d4e88b11d1d9142dd4942b928ec13fc13cbfffaeeb22832e1d292cd16a4d73fc
SHA512d725843a3ffe38e3f8b41a577d00d2d972a02045a914cecffde66107e18b7e6890b44aec2743f5fe7bebc543db89e8a6507f2157ac23f4fc559f1c0393b33377
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize244KB
MD5556bb40cb647ba8803469f3ff19249df
SHA1f987beb346fec716a813bf8ec5715129eaead5e9
SHA256d4e88b11d1d9142dd4942b928ec13fc13cbfffaeeb22832e1d292cd16a4d73fc
SHA512d725843a3ffe38e3f8b41a577d00d2d972a02045a914cecffde66107e18b7e6890b44aec2743f5fe7bebc543db89e8a6507f2157ac23f4fc559f1c0393b33377
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize388KB
MD542eb7386a235f374ced15ff014c74fbc
SHA121aace04b3f7fe500ff2e07a0c340f8bdfc07d8a
SHA25610b5b2bd640e5d49deca3819abbb3c3fc2d0657237b13ae389e7939ceb35b766
SHA51264c014a85fbd4133b5446fb180eca9250a0b2bef6893aca2548de59147b769706a438092e24b1c5b3d53c9416422167c8454c8adc56024f2cb5458a12d469004
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize388KB
MD542eb7386a235f374ced15ff014c74fbc
SHA121aace04b3f7fe500ff2e07a0c340f8bdfc07d8a
SHA25610b5b2bd640e5d49deca3819abbb3c3fc2d0657237b13ae389e7939ceb35b766
SHA51264c014a85fbd4133b5446fb180eca9250a0b2bef6893aca2548de59147b769706a438092e24b1c5b3d53c9416422167c8454c8adc56024f2cb5458a12d469004
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize292KB
MD58262261e06fc26a33e6e6823f29aede2
SHA1f56b7c3f8f3c36e54c9141afdc5b581f8c461dfa
SHA256264069c891f0c19c66887a4fc02753076851cdf9a0621e876d94b812f396dd4b
SHA5122b004a9147733cf05dd917645b6e4ddbd7773954ead59a89a527e09606d98f9d01a3c93f14f4fea4f086289916b4984f796028b1c9c5ebce7df34d2afe30c56f
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize292KB
MD58262261e06fc26a33e6e6823f29aede2
SHA1f56b7c3f8f3c36e54c9141afdc5b581f8c461dfa
SHA256264069c891f0c19c66887a4fc02753076851cdf9a0621e876d94b812f396dd4b
SHA5122b004a9147733cf05dd917645b6e4ddbd7773954ead59a89a527e09606d98f9d01a3c93f14f4fea4f086289916b4984f796028b1c9c5ebce7df34d2afe30c56f
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize196KB
MD5e277c899323a685b21ff31a4da07bb6d
SHA11fdf231e80a4f0b8331313b577814348cdf224e6
SHA256d3af26599e093e4f8250662f5590e9c556dadb271a31231a7e35fcd4da5b1700
SHA51217ef1af2962d6a15dcc57bb2a9b22196405d839659b0b1be6960dd4b5f0a02f1a9aa9641a79ccf26a2b9b0214e95f0230593c2d91aa2966d9deadf1a05da04f4
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize196KB
MD5e277c899323a685b21ff31a4da07bb6d
SHA11fdf231e80a4f0b8331313b577814348cdf224e6
SHA256d3af26599e093e4f8250662f5590e9c556dadb271a31231a7e35fcd4da5b1700
SHA51217ef1af2962d6a15dcc57bb2a9b22196405d839659b0b1be6960dd4b5f0a02f1a9aa9641a79ccf26a2b9b0214e95f0230593c2d91aa2966d9deadf1a05da04f4
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize196KB
MD5e277c899323a685b21ff31a4da07bb6d
SHA11fdf231e80a4f0b8331313b577814348cdf224e6
SHA256d3af26599e093e4f8250662f5590e9c556dadb271a31231a7e35fcd4da5b1700
SHA51217ef1af2962d6a15dcc57bb2a9b22196405d839659b0b1be6960dd4b5f0a02f1a9aa9641a79ccf26a2b9b0214e95f0230593c2d91aa2966d9deadf1a05da04f4
-
\Users\Admin\AppData\Local\Temp\694a01dabfcae9081427aaa200f6c0d43d09539e9c300f5165a799362a7a9bba.exe
Filesize196KB
MD5e277c899323a685b21ff31a4da07bb6d
SHA11fdf231e80a4f0b8331313b577814348cdf224e6
SHA256d3af26599e093e4f8250662f5590e9c556dadb271a31231a7e35fcd4da5b1700
SHA51217ef1af2962d6a15dcc57bb2a9b22196405d839659b0b1be6960dd4b5f0a02f1a9aa9641a79ccf26a2b9b0214e95f0230593c2d91aa2966d9deadf1a05da04f4