Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe
Resource
win10v2004-20230915-en
General
-
Target
7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe
-
Size
1.1MB
-
MD5
68655c05d1d55cba107ff7ce407e568b
-
SHA1
d09c30bed3eb9c3a0afc60861b4272754b2cc7f2
-
SHA256
7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47
-
SHA512
e0d7ad2fa69da6901476dd960cb0acde1aa5abcfc08247c0193ef394233b7abe6a41b903d0d170c466cedad6f204f805002c9ffa71533ecb50f3512627c2d0fc
-
SSDEEP
24576:G7dSrfAEWNZXzNvb3yMIR5JztI6/6FS7YtYb/1SrBX+YREGSW:G7dPyYS7YtYb/1SrhE7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1924 Logo1_.exe 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 cmd.exe 2028 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{2268EC07-9322-45E7-83EC-CF4D81A62D67}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe File created C:\Windows\Logo1_.exe 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe 1924 Logo1_.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: 33 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe Token: SeIncBasePriorityPrivilege 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 2784 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2028 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 28 PID 1264 wrote to memory of 2028 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 28 PID 1264 wrote to memory of 2028 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 28 PID 1264 wrote to memory of 2028 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 28 PID 1264 wrote to memory of 1924 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 30 PID 1264 wrote to memory of 1924 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 30 PID 1264 wrote to memory of 1924 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 30 PID 1264 wrote to memory of 1924 1264 7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe 30 PID 1924 wrote to memory of 2732 1924 Logo1_.exe 31 PID 1924 wrote to memory of 2732 1924 Logo1_.exe 31 PID 1924 wrote to memory of 2732 1924 Logo1_.exe 31 PID 1924 wrote to memory of 2732 1924 Logo1_.exe 31 PID 2028 wrote to memory of 2784 2028 cmd.exe 33 PID 2028 wrote to memory of 2784 2028 cmd.exe 33 PID 2028 wrote to memory of 2784 2028 cmd.exe 33 PID 2028 wrote to memory of 2784 2028 cmd.exe 33 PID 2732 wrote to memory of 2528 2732 net.exe 34 PID 2732 wrote to memory of 2528 2732 net.exe 34 PID 2732 wrote to memory of 2528 2732 net.exe 34 PID 2732 wrote to memory of 2528 2732 net.exe 34 PID 1924 wrote to memory of 1236 1924 Logo1_.exe 8 PID 1924 wrote to memory of 1236 1924 Logo1_.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe"C:\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a41C1.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe"C:\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2784
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2528
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5b4b26eac2600e5ef5aa2997f96575ad9
SHA11d9aa3fb567666010d8352af24869a1ce27e3748
SHA256cf7c69ec5be011e664ddc2f3570ad21c1161fdd7485d266127d8eb50a65eb2ef
SHA5121c52a53d631741a40d4963d7a3df89867c575ee24ae2f81d3c6b322557090fdbd4568db1364cd8fe10a4bc8991c68902ab08e836355e0cf66634cd6afc0a3b88
-
Filesize
722B
MD5ab66807078200cae651a8d8835a2c86c
SHA1dccf5bbf358e2b1502bb9d875747e5f632178730
SHA2565b495a765d492bd8c6f36796537df46a2a4f95f6a6bb890094de484e1eb57e56
SHA51278a85aeeb80186e355ce69d0478a96712328981c860216d5b15c25260735dbc1a3e35da0509378250273b0a1953ab0f7e144d5d5eb19a11ab5fa4cd94eb9e13f
-
Filesize
722B
MD5ab66807078200cae651a8d8835a2c86c
SHA1dccf5bbf358e2b1502bb9d875747e5f632178730
SHA2565b495a765d492bd8c6f36796537df46a2a4f95f6a6bb890094de484e1eb57e56
SHA51278a85aeeb80186e355ce69d0478a96712328981c860216d5b15c25260735dbc1a3e35da0509378250273b0a1953ab0f7e144d5d5eb19a11ab5fa4cd94eb9e13f
-
C:\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe
Filesize1.1MB
MD566180e804aea0b21b5ff903a43b44b82
SHA16607b7b84e2621443769de03a841ca0801463561
SHA2567b83f3577d18282997eabc5a8b8062232bf32114681bdd28f5f511db8082e281
SHA512d5021a7ef3611515d2a17476b5e797e9b14d1597ac7bae723e7d6d52889e0cc116d8faa43110e05b2c95e529b2111c24598fff51b33d8ac2f158df3c67b34f9d
-
C:\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe.exe
Filesize1.1MB
MD566180e804aea0b21b5ff903a43b44b82
SHA16607b7b84e2621443769de03a841ca0801463561
SHA2567b83f3577d18282997eabc5a8b8062232bf32114681bdd28f5f511db8082e281
SHA512d5021a7ef3611515d2a17476b5e797e9b14d1597ac7bae723e7d6d52889e0cc116d8faa43110e05b2c95e529b2111c24598fff51b33d8ac2f158df3c67b34f9d
-
Filesize
26KB
MD5f6b4755a189e3a523baa8f80e66ab269
SHA1f16a2c976c3064621b571c992022ff58dc04b5f0
SHA2562fcf5a3706fdac291356bd302b6c5b5485a497d0d8613a6cc1b69269d0b52f89
SHA5128da22db3a054b9ade173c9bd6178d1a8338b44449260b3e30795c9f3694b7e76bf608531a10fe9650e782a856b32d61509d20cd9de3e2b4fef2720e4362e2e03
-
Filesize
26KB
MD5f6b4755a189e3a523baa8f80e66ab269
SHA1f16a2c976c3064621b571c992022ff58dc04b5f0
SHA2562fcf5a3706fdac291356bd302b6c5b5485a497d0d8613a6cc1b69269d0b52f89
SHA5128da22db3a054b9ade173c9bd6178d1a8338b44449260b3e30795c9f3694b7e76bf608531a10fe9650e782a856b32d61509d20cd9de3e2b4fef2720e4362e2e03
-
Filesize
26KB
MD5f6b4755a189e3a523baa8f80e66ab269
SHA1f16a2c976c3064621b571c992022ff58dc04b5f0
SHA2562fcf5a3706fdac291356bd302b6c5b5485a497d0d8613a6cc1b69269d0b52f89
SHA5128da22db3a054b9ade173c9bd6178d1a8338b44449260b3e30795c9f3694b7e76bf608531a10fe9650e782a856b32d61509d20cd9de3e2b4fef2720e4362e2e03
-
Filesize
26KB
MD5f6b4755a189e3a523baa8f80e66ab269
SHA1f16a2c976c3064621b571c992022ff58dc04b5f0
SHA2562fcf5a3706fdac291356bd302b6c5b5485a497d0d8613a6cc1b69269d0b52f89
SHA5128da22db3a054b9ade173c9bd6178d1a8338b44449260b3e30795c9f3694b7e76bf608531a10fe9650e782a856b32d61509d20cd9de3e2b4fef2720e4362e2e03
-
Filesize
10B
MD5a592e6708558f3dc0ad1608608da69c5
SHA169a1224ba3b2f2ab2f2ce8b8287809f3282d20d0
SHA25624c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a
SHA51238724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1
-
\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe
Filesize1.1MB
MD566180e804aea0b21b5ff903a43b44b82
SHA16607b7b84e2621443769de03a841ca0801463561
SHA2567b83f3577d18282997eabc5a8b8062232bf32114681bdd28f5f511db8082e281
SHA512d5021a7ef3611515d2a17476b5e797e9b14d1597ac7bae723e7d6d52889e0cc116d8faa43110e05b2c95e529b2111c24598fff51b33d8ac2f158df3c67b34f9d
-
\Users\Admin\AppData\Local\Temp\7c9c544f83b86a8f7f72e9f234721a823ddda4486019f74525334ca1e2efdc47.exe
Filesize1.1MB
MD566180e804aea0b21b5ff903a43b44b82
SHA16607b7b84e2621443769de03a841ca0801463561
SHA2567b83f3577d18282997eabc5a8b8062232bf32114681bdd28f5f511db8082e281
SHA512d5021a7ef3611515d2a17476b5e797e9b14d1597ac7bae723e7d6d52889e0cc116d8faa43110e05b2c95e529b2111c24598fff51b33d8ac2f158df3c67b34f9d