Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe
Resource
win10v2004-20230915-en
General
-
Target
b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe
-
Size
33KB
-
MD5
2dbe6bbefc65c1ca0ee7171a08383336
-
SHA1
68fb3d025158255f8be919c3587fcec8786879a7
-
SHA256
b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee
-
SHA512
4d642abe74c7acb964dbd99c57f8b598a9311cec2cb0bfbd8b4532c0a584e3d7eec82177783b7c1936224fb554527f604b1eba991fb046ae8393e450c44a800a
-
SSDEEP
768:PwjhElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/a:PoaYzMXqtGNttyUn01Q78a4R
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\U: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\Q: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\P: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\N: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\M: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\G: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\Y: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\W: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\S: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\L: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\E: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\K: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\J: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\I: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\H: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\X: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\V: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\T: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\R: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened (read-only) \??\O: b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Windows Journal\ja-JP\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Java\jre7\lib\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Microsoft Office\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\DVD Maker\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Dll.dll b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe File created C:\Windows\rundl132.exe b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2080 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 28 PID 2304 wrote to memory of 2080 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 28 PID 2304 wrote to memory of 2080 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 28 PID 2304 wrote to memory of 2080 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 28 PID 2080 wrote to memory of 1164 2080 net.exe 30 PID 2080 wrote to memory of 1164 2080 net.exe 30 PID 2080 wrote to memory of 1164 2080 net.exe 30 PID 2080 wrote to memory of 1164 2080 net.exe 30 PID 2304 wrote to memory of 2616 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 31 PID 2304 wrote to memory of 2616 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 31 PID 2304 wrote to memory of 2616 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 31 PID 2304 wrote to memory of 2616 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 31 PID 2616 wrote to memory of 2804 2616 net.exe 33 PID 2616 wrote to memory of 2804 2616 net.exe 33 PID 2616 wrote to memory of 2804 2616 net.exe 33 PID 2616 wrote to memory of 2804 2616 net.exe 33 PID 2304 wrote to memory of 1264 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 10 PID 2304 wrote to memory of 1264 2304 b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe"C:\Users\Admin\AppData\Local\Temp\b2148e329ae3005f4465b006b51b21a60c06c32d6aaf01c27bd85685bb1663ee.exe"2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1164
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD590d480c151060797b4d5a8bbbbf83460
SHA19c7f25f2c8bd05e64eced566d79d67e9a5cd78f9
SHA256bb537850e2ec583f558e908dcf9808fdbf6c3d8f513c74d6deba756631b2c5b4
SHA5124d1c2667a1f0bbfa37ad44c29d50176fb7afe6b5668fef91c3489a458d06dc5f10708ce658d94e0c490bd64aee9dad7595c942f60a74f3a796b844df6568f607
-
Filesize
601KB
MD5ecf64f898c14da8f7bd3ff788f077a4d
SHA1b83b03810521723571b6df5ba35b2b5742f947ca
SHA256c54a820d7a8a5889984bea70862bf3c284332d56c0ccc1230abec98c27603e72
SHA51293f865d25116e418f87e9e6efb85eb1121d188462108a704071d43292e67f48fd179830fd4b2a27ff88d05d66bf38561bde68f63bdf55b328a1d8af6268a4188
-
Filesize
478KB
MD5db98da017417f3bfea4d9a1a97b4a073
SHA1f6e7d57d64df537b7de4e1b9ff2a1d3f092c02b6
SHA2563a827199db204413824f3c15910bf406ae5d9a90511f6baadba95392222b2e37
SHA512fcd8dd3d92092538483006815578f95ed754562e3b215dc9d5fc82ff321a29c459d52b5babe7d82213385b842c0df4e7afdf745364e4a6dab2306bc9ad4798f8
-
Filesize
10B
MD581570c50286369016cef7a9f904c4b04
SHA1b5758b23667cb35cad0adb23371b830fcee4f4e5
SHA256b882f41a5c84d248a75714eaf215a9e363a49361b6a14beedb921ee3dfdb46a1
SHA5120e6c479b0252e24635810b7d030cc9b5b17603ee20ccf62812446b8d15884521c6c7be65dfc0090bb1502e859fae27c2a63b3e58be714021f473a88407982162