Analysis
-
max time kernel
151s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:26
Static task
static1
Behavioral task
behavioral1
Sample
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe
Resource
win10v2004-20220901-en
General
-
Target
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe
-
Size
93KB
-
MD5
50536965307b8656043d98f6677a1530
-
SHA1
f90629e871cbf0242dec36f46bc2be5d55ada7be
-
SHA256
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27
-
SHA512
7d797869c86f2df25213ea0f657d23e937212990005a8d5994c41583dd5e7dbbc5cdab6996ad6eda2aa524502acb9bba41def84b6893c2b41b77a060bfe61448
-
SSDEEP
1536:77qnkAQtSaoGo5n4iLG0/WM6T4HSaYqey/XxAyN0Hrnj/5vG4CGKN:SCSjGoLpWM6CB/XxAyKH//EV
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exedescription ioc process File opened (read-only) \??\E: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\Y: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\W: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\V: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\U: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\O: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\J: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\G: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\Z: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\S: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\Q: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\M: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\T: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\R: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\P: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\K: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\I: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\H: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\X: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\N: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\L: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened (read-only) \??\F: aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe -
Drops file in Program Files directory 64 IoCs
Processes:
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\RCXE472.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Mozilla Firefox\RCXD6D0.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jre7\bin\kinit.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\RCXE108.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\VideoLAN\VLC\vlc.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\RCXE343.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCXD771.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Mozilla Firefox\RCXD6B0.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCXD781.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\RCXD0F9.tmp aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Program Files\7-Zip\7z.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe.Exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe -
Drops file in Windows directory 2 IoCs
Processes:
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exedescription ioc process File created C:\Windows\uninstall\rundl132.exe aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe File created C:\Windows\RichDll.dll aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exepid process 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exenet.exenet.exedescription pid process target process PID 1460 wrote to memory of 1532 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1460 wrote to memory of 1532 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1460 wrote to memory of 1532 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1460 wrote to memory of 1532 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1532 wrote to memory of 812 1532 net.exe net1.exe PID 1532 wrote to memory of 812 1532 net.exe net1.exe PID 1532 wrote to memory of 812 1532 net.exe net1.exe PID 1532 wrote to memory of 812 1532 net.exe net1.exe PID 1460 wrote to memory of 1332 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1460 wrote to memory of 1332 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1460 wrote to memory of 1332 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1460 wrote to memory of 1332 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe net.exe PID 1332 wrote to memory of 660 1332 net.exe net1.exe PID 1332 wrote to memory of 660 1332 net.exe net1.exe PID 1332 wrote to memory of 660 1332 net.exe net1.exe PID 1332 wrote to memory of 660 1332 net.exe net1.exe PID 1460 wrote to memory of 1200 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe Explorer.EXE PID 1460 wrote to memory of 1200 1460 aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe"C:\Users\Admin\AppData\Local\Temp\aa9da46e959a34710e0e45dd6bedc9fc738beb505d542bb62d5ab8bb94faca27.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:812
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:660