Analysis
-
max time kernel
149s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 03:33
Static task
static1
Behavioral task
behavioral1
Sample
dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe
Resource
win7-20220901-en
General
-
Target
dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe
-
Size
33KB
-
MD5
0c23c8d090bb1d8b8da6ad0bd5c7902e
-
SHA1
d9fb58aac3d06a83fb60157b526679cd388682a1
-
SHA256
dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40
-
SHA512
df2d710c1cefb8bd7f28de656a650e0d2634a62f7a279c27688dcfd813225094b0fbfbdf328309af5e86895740b230835620e83b48f01f168238ef7f97809a6f
-
SSDEEP
768:PNslElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/a:PNslaYzMXqtGNttyUn01Q78a4R
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\K: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\J: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\Z: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\Y: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\X: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\T: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\S: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\E: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\R: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\P: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\M: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\W: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\U: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\I: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\G: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\F: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\V: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\Q: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\O: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\L: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened (read-only) \??\H: dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Windows NT\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\Java\jre7\lib\management\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Windows Journal\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe File created C:\Windows\Dll.dll dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2016 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 27 PID 2032 wrote to memory of 2016 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 27 PID 2032 wrote to memory of 2016 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 27 PID 2032 wrote to memory of 2016 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 27 PID 2016 wrote to memory of 644 2016 net.exe 29 PID 2016 wrote to memory of 644 2016 net.exe 29 PID 2016 wrote to memory of 644 2016 net.exe 29 PID 2016 wrote to memory of 644 2016 net.exe 29 PID 2032 wrote to memory of 1552 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 30 PID 2032 wrote to memory of 1552 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 30 PID 2032 wrote to memory of 1552 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 30 PID 2032 wrote to memory of 1552 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 30 PID 1552 wrote to memory of 1352 1552 net.exe 32 PID 1552 wrote to memory of 1352 1552 net.exe 32 PID 1552 wrote to memory of 1352 1552 net.exe 32 PID 1552 wrote to memory of 1352 1552 net.exe 32 PID 2032 wrote to memory of 1368 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 15 PID 2032 wrote to memory of 1368 2032 dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe"C:\Users\Admin\AppData\Local\Temp\dc8238de927a7c8a60e9516a01c9d98395895ac4c0dd6cac4be00dcb5c44fc40.exe"2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1352
-
-
-