Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2023 02:41
Static task
static1
Behavioral task
behavioral1
Sample
41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe
Resource
win7-20230712-en
General
-
Target
41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe
-
Size
33KB
-
MD5
24431670323eafb026105fd8cece839d
-
SHA1
9402f2e690d364339466a177c0ba44da8d5b1f64
-
SHA256
41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2
-
SHA512
b03f736432002ae089e742d851a4b0b1cdf819d864db4f2f05edda79159cf22600f961d71ce0330b4c86611c060e13533e3dcbc2bf5abc9e4c8fb450780187c7
-
SSDEEP
768:VSfKHhO5RroZJ767395uINv6v+stOLzyGOzEWF3vXVkSGN2EO:VSiHhe+Zk77RNyvb0LzszE83C8
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\R: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\V: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\Q: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\P: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\M: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\G: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\E: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\U: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\X: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\S: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\O: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\N: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\L: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\K: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\Y: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\W: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\J: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\I: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\H: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened (read-only) \??\Z: 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\de-de\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-cn\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\tr-tr\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pt-br\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\eu-es\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATER\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\he-il\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-cn\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\hr-hr\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\pt-br\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\root\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sk-sk\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ca-es\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\ja\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sv-se\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\eu-es\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\cef\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sk-sk\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-ma\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\nb-no\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hu-hu\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\root\_desktop.ini 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe File created C:\Windows\Dll.dll 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1132 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 80 PID 3460 wrote to memory of 1132 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 80 PID 3460 wrote to memory of 1132 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 80 PID 1132 wrote to memory of 4532 1132 net.exe 82 PID 1132 wrote to memory of 4532 1132 net.exe 82 PID 1132 wrote to memory of 4532 1132 net.exe 82 PID 3460 wrote to memory of 4312 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 83 PID 3460 wrote to memory of 4312 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 83 PID 3460 wrote to memory of 4312 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 83 PID 4312 wrote to memory of 1756 4312 net.exe 85 PID 4312 wrote to memory of 1756 4312 net.exe 85 PID 4312 wrote to memory of 1756 4312 net.exe 85 PID 3460 wrote to memory of 3080 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 54 PID 3460 wrote to memory of 3080 3460 41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe"C:\Users\Admin\AppData\Local\Temp\41f3e1567129d7140ecdbcea7b2da2a155abef882ee05327c754fc7d7eb154c2.exe"2⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:4532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1756
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5abdacffbadaea7b37b8f54cf0803a1da
SHA10d264b54ee704fc56026c87f91aca56feddd6e97
SHA256f1184cc500de53756a4bf86cf32693d96579d6595bc72f29daeceacc01038f8e
SHA512bc86938fec1b597c2ebbe6b66863dd7dde9ff47211bba7b9e98fdd1b173f4cddd31fca09b3979adc02d3bd69fcab9d14f3a6bb50949b9672be124b78710901a7
-
Filesize
2.8MB
MD5e060f028f0046cb1f35b5dd8c8a9fba4
SHA1af917a4f237e9f2d414041c702964034147c3eaf
SHA256429d046b4d162b2335e0a7e463324211271fc428661eff3249c77e6d777f1dc8
SHA51278d51f14a541f2ef4393fe3ea01d5c1788c691a596fed61d207effbf31dab4d27f3884cd97e04e9def7f4f37b91637dd30dde5c986fa31c117b6f9ad636b12b1
-
Filesize
478KB
MD526c030ec0225cb4765d6fa990a4334a2
SHA1a52e08716fca11ce2f3273228cc3cd0af5dc6542
SHA256eb4fc068639dde0bf3fc179870a50bce85801269e46d93c98462a9c0fec1575f
SHA5127e1187018a2d576d20684b43a4d07dbb5287f35752c4e8d3d43e8edd7b6f938254163c14f74ad085c1a79e588c3a45a436aac169f4aebf6ec5661032f2cef503
-
Filesize
9B
MD52326d479b287193a70f520700dc8d23e
SHA1afea66d3788a50debd6f5d4c9dd51f68a4477e64
SHA25695d41561a1467d20977f59108e85da181e0b4dfd3db9e40182ae7378c4a927f8
SHA512cb971c406ddf7147536a6a1569d4ff49d7219aa52cde5d110be1109874d66daace832d423d7969af9e6bbc9738a65734c7e68e994591b7677aad51fa0f52cf37