Analysis
-
max time kernel
157s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:27
Static task
static1
Behavioral task
behavioral1
Sample
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe
Resource
win10v2004-20221111-en
General
-
Target
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe
-
Size
449KB
-
MD5
3dcaa387f649ee2496a346395d631010
-
SHA1
46b32f08d676d973ccd9342f5a79576d345d5994
-
SHA256
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf
-
SHA512
f5b02a689a9e9fd874b2aeb5a31a40b416552fa053fe29b0b85118da35349fba127fb3b3662b8126b1863ea211763b1fd38da752760f021278c9d4fb51282194
-
SSDEEP
6144:Y+aX36zTbUG2HV980CtVwOMA4UDSUvTN/G8voTkwmmYq:Y+a4bUHr8jtV+UWUbN/G8EkCYq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exepid process 4896 Logo1_.exe 4156 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Program Files\Microsoft Office\root\Document Themes 16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\Licenses\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Filters\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\rsod\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUEPRNT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe Logo1_.exe File created C:\Program Files\Microsoft Office\PackageManifests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\4705ECFD-ABBD-4089-8453-56EA3EB6E985\root\vfs\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\PlatformCapabilities\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exeLogo1_.exedescription ioc process File created C:\Windows\Logo1_.exe 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exeLogo1_.exepid process 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe 4896 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exepid process 4156 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exeLogo1_.exenet.exenet.execmd.exenet.exedescription pid process target process PID 4912 wrote to memory of 2352 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe net.exe PID 4912 wrote to memory of 2352 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe net.exe PID 4912 wrote to memory of 2352 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe net.exe PID 4912 wrote to memory of 1864 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe cmd.exe PID 4912 wrote to memory of 1864 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe cmd.exe PID 4912 wrote to memory of 1864 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe cmd.exe PID 4912 wrote to memory of 4896 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe Logo1_.exe PID 4912 wrote to memory of 4896 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe Logo1_.exe PID 4912 wrote to memory of 4896 4912 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe Logo1_.exe PID 4896 wrote to memory of 3520 4896 Logo1_.exe net.exe PID 4896 wrote to memory of 3520 4896 Logo1_.exe net.exe PID 4896 wrote to memory of 3520 4896 Logo1_.exe net.exe PID 2352 wrote to memory of 312 2352 net.exe net1.exe PID 3520 wrote to memory of 4368 3520 net.exe net1.exe PID 2352 wrote to memory of 312 2352 net.exe net1.exe PID 3520 wrote to memory of 4368 3520 net.exe net1.exe PID 2352 wrote to memory of 312 2352 net.exe net1.exe PID 3520 wrote to memory of 4368 3520 net.exe net1.exe PID 1864 wrote to memory of 4156 1864 cmd.exe 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe PID 1864 wrote to memory of 4156 1864 cmd.exe 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe PID 1864 wrote to memory of 4156 1864 cmd.exe 7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe PID 4896 wrote to memory of 1652 4896 Logo1_.exe net.exe PID 4896 wrote to memory of 1652 4896 Logo1_.exe net.exe PID 4896 wrote to memory of 1652 4896 Logo1_.exe net.exe PID 1652 wrote to memory of 5072 1652 net.exe net1.exe PID 1652 wrote to memory of 5072 1652 net.exe net1.exe PID 1652 wrote to memory of 5072 1652 net.exe net1.exe PID 4896 wrote to memory of 964 4896 Logo1_.exe Explorer.EXE PID 4896 wrote to memory of 964 4896 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe"C:\Users\Admin\AppData\Local\Temp\7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aB6FC.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe"C:\Users\Admin\AppData\Local\Temp\7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4156 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4368
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:5072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD5547086cf582aaeda78a0462de15b8445
SHA1cac2bbafe9ede131b67ab71c5cd0702f024ed293
SHA256cf57fb71ce17ed4977a4dd722856e1436f84227d103bb8c479310525867cf47c
SHA512d9c8826789527f4dce49d68cb4b2a55a9a9fb67cf1a469f506408d926a461569a6e84243590d366f7a3d109e52b294ab1016f0d8890752fd18019896cf9e76a4
-
C:\Users\Admin\AppData\Local\Temp\7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe
Filesize416KB
MD55c3a33d68beb97bef792e1156d91c750
SHA1e8f2c17bd333a490ae2d0f518b60a7cfede24262
SHA256b1da35dac930c68621e3d0f1fbd72a2d854890023c0a214d95d03d8e38e2765c
SHA5123e431665a87520d5dcbb2ef226957279e999074a06571b7c4b5b741b6388a1cbd64efd63ef7b8b7cffe30a3e84d67ad77b55496dce38588c7a6fbb3461074754
-
C:\Users\Admin\AppData\Local\Temp\7454f821d791f5f0852ba896f62dae3f9dc09aaad933bb56e47911a3cbe11fdf.exe.exe
Filesize416KB
MD55c3a33d68beb97bef792e1156d91c750
SHA1e8f2c17bd333a490ae2d0f518b60a7cfede24262
SHA256b1da35dac930c68621e3d0f1fbd72a2d854890023c0a214d95d03d8e38e2765c
SHA5123e431665a87520d5dcbb2ef226957279e999074a06571b7c4b5b741b6388a1cbd64efd63ef7b8b7cffe30a3e84d67ad77b55496dce38588c7a6fbb3461074754
-
Filesize
33KB
MD55bb5bcc071987eb852559d28aabca207
SHA170079b13fde37171070fc2fd354d83d198bf20d4
SHA256ab37879d62c3ef8f86146824a8abd50f13af270b0d08f3db21e8bae41c570193
SHA512fbcc63f6550b1d3084c6c969dd8c8fe379c0cdb428cc9ec30e7aba4408cf4d974e6569d575188596ab7c30b583d1eea0af23f8ad51fb334650b2bbb6baa84fa9
-
Filesize
33KB
MD55bb5bcc071987eb852559d28aabca207
SHA170079b13fde37171070fc2fd354d83d198bf20d4
SHA256ab37879d62c3ef8f86146824a8abd50f13af270b0d08f3db21e8bae41c570193
SHA512fbcc63f6550b1d3084c6c969dd8c8fe379c0cdb428cc9ec30e7aba4408cf4d974e6569d575188596ab7c30b583d1eea0af23f8ad51fb334650b2bbb6baa84fa9
-
Filesize
33KB
MD55bb5bcc071987eb852559d28aabca207
SHA170079b13fde37171070fc2fd354d83d198bf20d4
SHA256ab37879d62c3ef8f86146824a8abd50f13af270b0d08f3db21e8bae41c570193
SHA512fbcc63f6550b1d3084c6c969dd8c8fe379c0cdb428cc9ec30e7aba4408cf4d974e6569d575188596ab7c30b583d1eea0af23f8ad51fb334650b2bbb6baa84fa9