Analysis
-
max time kernel
174s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe
Resource
win7-20230831-en
General
-
Target
7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe
-
Size
33KB
-
MD5
a3063f70c0d7bb08db595d4cf51642dd
-
SHA1
f8a9840ddc8a0f4cb05fd9b5fe40db3530d5a24e
-
SHA256
7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca
-
SHA512
f7d1206f5aa6ae81629a386d6022542e567e41c6b513e0e3abe48ee11d7306dda24469d6268149e61cd672a5cc75a356ea076e3add3f2a9dce2550619d9ea4c5
-
SSDEEP
768:VgNFeTz5O5RroZJ76739sBWsi7IlPh3Adqx1LESYRYiV:VKcz5e+Zk78tlp3Au1LESYJV
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\X: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\W: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\V: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\U: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\M: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\I: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\Q: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\O: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\L: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\K: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\J: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\P: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\N: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\G: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\Z: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\Y: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\T: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\S: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\R: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened (read-only) \??\E: 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\root\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\de-de\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nb-no\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-gb\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sv-se\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ja-jp\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nb-no\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\en-us\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft.NET\ADOMD.NET\130\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\root\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SONORA\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-ae\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nl-nl\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\es-es\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\tr-tr\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nl-nl\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pt-br\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RADIAL\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LEVEL\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ru-ru\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hu-hu\_desktop.ini 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe File created C:\Windows\Dll.dll 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3852 wrote to memory of 1240 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 87 PID 3852 wrote to memory of 1240 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 87 PID 3852 wrote to memory of 1240 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 87 PID 1240 wrote to memory of 4708 1240 net.exe 89 PID 1240 wrote to memory of 4708 1240 net.exe 89 PID 1240 wrote to memory of 4708 1240 net.exe 89 PID 3852 wrote to memory of 2692 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 90 PID 3852 wrote to memory of 2692 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 90 PID 3852 wrote to memory of 2692 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 90 PID 2692 wrote to memory of 5000 2692 net.exe 92 PID 2692 wrote to memory of 5000 2692 net.exe 92 PID 2692 wrote to memory of 5000 2692 net.exe 92 PID 3852 wrote to memory of 3140 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 24 PID 3852 wrote to memory of 3140 3852 7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe 24
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe"C:\Users\Admin\AppData\Local\Temp\7ca7821af42ec4b2b1880cf7d5f631debe52cb0b6d8d722ddb22ea0c6af9a7ca.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:4708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:5000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD551e95977c775e3758a90f49a4a41034a
SHA1ab239de9bb59e1eb4ceb25f7aa3b43c9f2cc362e
SHA2560909809269df8b127de9a61bcf2adbd285a0b212a7688aba9cdf38b15310651c
SHA5126df56fa4c922ba6874b588693ce3dc0c2194261f51fd4293b8765f4564856103974fafece30a8535e0ed7ae6f96ac9199e233e4a63fceb03c90243433e81a2d3
-
Filesize
2.8MB
MD5fee38bedd4928b39c408c0519724b25b
SHA190e67ca3042856ceed088cbad9aa995cb009085c
SHA256c031dd14c15323a0369c5f8bf394f2afc1ea91116e52aee7f1170912c4ef72b0
SHA512411b00e26b14e9ece808b96b3be9858aaf4cdda072e671a8e40b161dcace734144bdcf6b19329c0e957bd84d947d3c4aacf9fe41f53ba8293542dc3c6f321745
-
Filesize
478KB
MD5a4bd9e80c3fb386b30dc2352161d404b
SHA1e516cb69f5271dfc0daa943b4d5281e15b3dfe35
SHA25698629bd57b1501e443c97597242584ae7315b240afdd0c174a9ca2da123fd07f
SHA512268512078691d28ee5a5d8ddd7282159c14ad602192ad8c020b9a2da6b14efb1930d34cc850e5748447ee2e1a611cd465ecb4b76498e12bcbedbcfd70f365e7f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\pa\_desktop.ini
Filesize10B
MD5dbf19ca54500e964528b156763234c1d
SHA105376f86423aec8badf0adbc47887234ac83ef5a
SHA256bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae
SHA512fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0
-
Filesize
9B
MD5872506f1dadcc0cedd1e9dee11f54da4
SHA1d1e87145ed1d918f10ae4e93ccdbb994bc906ed5
SHA256a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104
SHA5126cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c