Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe
Resource
win10v2004-20220812-en
General
-
Target
bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe
-
Size
89KB
-
MD5
0bbf7c9c3c645d4105e42495f1d12810
-
SHA1
8eeb257c15a92baaaaca114ec4c2e250915950a1
-
SHA256
bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e
-
SHA512
fab44799bdb8ac756241dcd719853b66cde4afe58ad26bb693660706c4828cde6747e8d9a34f6d83891ce9b580c5f7d1599bff116014cabd5133412a5ad9437a
-
SSDEEP
1536:u7qnkAQtSaoGo5n4iLG0/WM6TnHSaYqemmjx73ZD5tN:/CSjGoLpWM65lmjx73h
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\U: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\S: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\P: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\L: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\K: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\I: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\H: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\T: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\Q: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\N: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\F: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\Z: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\X: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\J: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\Y: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\V: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\R: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\O: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\M: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\G: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened (read-only) \??\E: bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\RCXA987.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\7-Zip\RCX99A2.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Java\jre7\bin\javaws.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Mozilla Firefox\RCX9DA6.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\RCX9AF7.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\RCXA8E6.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Java\jre7\bin\ktab.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Java\jre7\bin\orbd.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX99E3.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Mozilla Firefox\crashreporter.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\RCX9D53.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Program Files\Mozilla Firefox\uninstall\helper.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe.Exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\RCX9D1F.tmp bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\uninstall\rundl132.exe bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe File created C:\Windows\RichDll.dll bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 960 wrote to memory of 628 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 27 PID 960 wrote to memory of 628 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 27 PID 960 wrote to memory of 628 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 27 PID 960 wrote to memory of 628 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 27 PID 628 wrote to memory of 556 628 net.exe 29 PID 628 wrote to memory of 556 628 net.exe 29 PID 628 wrote to memory of 556 628 net.exe 29 PID 628 wrote to memory of 556 628 net.exe 29 PID 960 wrote to memory of 912 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 30 PID 960 wrote to memory of 912 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 30 PID 960 wrote to memory of 912 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 30 PID 960 wrote to memory of 912 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 30 PID 912 wrote to memory of 1636 912 net.exe 32 PID 912 wrote to memory of 1636 912 net.exe 32 PID 912 wrote to memory of 1636 912 net.exe 32 PID 912 wrote to memory of 1636 912 net.exe 32 PID 960 wrote to memory of 1220 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 16 PID 960 wrote to memory of 1220 960 bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe"C:\Users\Admin\AppData\Local\Temp\bd62af2ebe157658da1bb4150df492e013fcdabc98d52da2c7a45ec88f34843e.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1636
-
-
-