Analysis
-
max time kernel
203s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:17
Static task
static1
Behavioral task
behavioral1
Sample
4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe
Resource
win10v2004-20221111-en
General
-
Target
4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe
-
Size
42KB
-
MD5
0ef669a0a6326ccbb26b4b5e28aa12c0
-
SHA1
112c6753e32f40da3b0713607e28f4e8fdb01fd2
-
SHA256
4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894
-
SHA512
6d265c2fdfefcf3df125e60ba6a85c7e93c38f2453770414de1af19da19efa2efbbcd67e89cf22720d6646442d02d24bc12f725ee5d2aaad8e20a20f6394eac1
-
SSDEEP
768:0oaejdMoIwu3N50mgnstaELSiPcWIQGK6+vVfoK5/w4T8BMF2vJtY6:09ejdMv0stxLSikn5ivVfLx1F2vH
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\R: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\O: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\H: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\G: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\U: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\L: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\J: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\V: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\Y: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\X: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\Q: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\K: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\Z: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\T: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\P: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\N: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\M: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\I: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\F: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\E: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened (read-only) \??\W: 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Journal\ja-JP\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe File created C:\Windows\Dll.dll 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2044 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 28 PID 1768 wrote to memory of 2044 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 28 PID 1768 wrote to memory of 2044 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 28 PID 1768 wrote to memory of 2044 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 28 PID 2044 wrote to memory of 1404 2044 net.exe 30 PID 2044 wrote to memory of 1404 2044 net.exe 30 PID 2044 wrote to memory of 1404 2044 net.exe 30 PID 2044 wrote to memory of 1404 2044 net.exe 30 PID 1768 wrote to memory of 1296 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 16 PID 1768 wrote to memory of 1296 1768 4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe"C:\Users\Admin\AppData\Local\Temp\4e62c03502bc169e5fe49f686738af4d5375fec209169d649ba829f222eb7894.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"3⤵PID:1404
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1296