Analysis
-
max time kernel
178s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe
Resource
win7-20230831-en
General
-
Target
ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe
-
Size
33KB
-
MD5
a1f73658520a973a1e88a29d4ad7c967
-
SHA1
8ce8595794cff91aa349342fd84071a76758a90e
-
SHA256
ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb
-
SHA512
cc8558290782438f63428ca32bfecbd98252a35aca52598373829685610d4865978f12940ec57463914d0023eebafe15689ce28c61a32865f630bb18c25bff5c
-
SSDEEP
768:0tVElOIEvzMXqtwp/lttaL7HP4ATCf0vn4DAwdHtLuQN:0tVaYzMXqtGNttyOf0v4DAyNjN
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\U: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\M: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\I: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\X: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\W: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\J: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\H: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\G: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\R: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\L: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\P: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\E: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\Y: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\S: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\Q: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\O: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\N: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\K: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\Z: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened (read-only) \??\T: ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Windows Sidebar\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Microsoft Games\Chess\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe File created C:\Windows\Dll.dll ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2272 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 30 PID 2228 wrote to memory of 2272 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 30 PID 2228 wrote to memory of 2272 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 30 PID 2228 wrote to memory of 2272 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 30 PID 2272 wrote to memory of 2396 2272 net.exe 32 PID 2272 wrote to memory of 2396 2272 net.exe 32 PID 2272 wrote to memory of 2396 2272 net.exe 32 PID 2272 wrote to memory of 2396 2272 net.exe 32 PID 2228 wrote to memory of 2788 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 33 PID 2228 wrote to memory of 2788 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 33 PID 2228 wrote to memory of 2788 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 33 PID 2228 wrote to memory of 2788 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 33 PID 2788 wrote to memory of 2668 2788 net.exe 35 PID 2788 wrote to memory of 2668 2788 net.exe 35 PID 2788 wrote to memory of 2668 2788 net.exe 35 PID 2788 wrote to memory of 2668 2788 net.exe 35 PID 2228 wrote to memory of 1288 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 18 PID 2228 wrote to memory of 1288 2228 ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe"C:\Users\Admin\AppData\Local\Temp\ad58d6c8cb959839e6464a20128cde48cc9b06b61a1489e43b7b81a020457eeb.exe"2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2396
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5aa8454a6d03a65364b5ab9dfa635858e
SHA1a02da5b82696fdd03ccc7147138b7fd9ce62cdf2
SHA25636110d96b9020d0ccb953823ec356960cf939daa3292d1a39b04577c24c8860c
SHA512a2773d9d16a91c88289445abb25b5a0df2f18b0992e5d61a9c38bc913bf9ac32cfa022b1b951807aad6201cc846a3d35fb51522649a2c70e1859a3f7ac5469d2
-
Filesize
601KB
MD5794d925e1d401888f793e166a7eca4c3
SHA19ed49052074d4a9c349dc1191a66c9a8306ba15b
SHA2561da1309f85d919b81ab47ddeec29bb12b89f6f63f7fc670bfd7d3765b0d7fddf
SHA5123469b650964201bef19ace08ae605391f3c954f0eeb48251ca206dcc3262d984247aa0cb2c7aceb398a3b374f76de2ba706b2b8504ea5bbadaa3c918eee3c148
-
Filesize
478KB
MD52937b1bcc2bc9e085a87002ad91dab15
SHA1f00f772ca752f29d722aeac878c611d0e4e866eb
SHA2561c63a6cd1debd7d62305cb67efd761cb0d1f6c3892aac49de358c62d19c60f2e
SHA512744e123c7cdab18bc02c53affb280a8c15b4a7840a48304b03ae3f716abe04d58dce63c2ee97cf50731ab2173a32a6fcf651ba20640c88a255e1548458f91fc3
-
Filesize
10B
MD5dbf19ca54500e964528b156763234c1d
SHA105376f86423aec8badf0adbc47887234ac83ef5a
SHA256bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae
SHA512fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0