Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe
Resource
win7-20230831-en
General
-
Target
fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe
-
Size
370KB
-
MD5
42578f059b473b2a62e141ab2a1a6ad4
-
SHA1
20f774b65ab478e5c661f3cb321b4ade47d4c7ae
-
SHA256
fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d
-
SHA512
c797307fa268f857769b1158ec23a702be0c9f470cc521f01874fab87525eaf3d3f5190514995d73611cecb94a416a24de31998904f160084211dadf1bd5bd48
-
SSDEEP
6144:ZMp6t4DREcMZ5vVCiiKrao9afJu3YYtWGaVoRiS6hxH5AgPaxA:ZMp6+FuvVCiisao9Ii3aViKHye
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 1128 Logo1_.exe 864 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EVRGREEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\116.0.1938.76\identity_proxy\win11\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ca-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\rundl132.exe fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe File created C:\Windows\Logo1_.exe fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe 1128 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 864 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 864 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4876 wrote to memory of 388 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 82 PID 4876 wrote to memory of 388 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 82 PID 4876 wrote to memory of 388 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 82 PID 388 wrote to memory of 2368 388 net.exe 84 PID 388 wrote to memory of 2368 388 net.exe 84 PID 388 wrote to memory of 2368 388 net.exe 84 PID 4876 wrote to memory of 3660 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 85 PID 4876 wrote to memory of 3660 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 85 PID 4876 wrote to memory of 3660 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 85 PID 4876 wrote to memory of 1128 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 87 PID 4876 wrote to memory of 1128 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 87 PID 4876 wrote to memory of 1128 4876 fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe 87 PID 1128 wrote to memory of 2988 1128 Logo1_.exe 88 PID 1128 wrote to memory of 2988 1128 Logo1_.exe 88 PID 1128 wrote to memory of 2988 1128 Logo1_.exe 88 PID 2988 wrote to memory of 4644 2988 net.exe 90 PID 2988 wrote to memory of 4644 2988 net.exe 90 PID 2988 wrote to memory of 4644 2988 net.exe 90 PID 3660 wrote to memory of 864 3660 cmd.exe 91 PID 3660 wrote to memory of 864 3660 cmd.exe 91 PID 3660 wrote to memory of 864 3660 cmd.exe 91 PID 1128 wrote to memory of 2316 1128 Logo1_.exe 96 PID 1128 wrote to memory of 2316 1128 Logo1_.exe 96 PID 1128 wrote to memory of 2316 1128 Logo1_.exe 96 PID 2316 wrote to memory of 2196 2316 net.exe 98 PID 2316 wrote to memory of 2196 2316 net.exe 98 PID 2316 wrote to memory of 2196 2316 net.exe 98 PID 1128 wrote to memory of 3104 1128 Logo1_.exe 50 PID 1128 wrote to memory of 3104 1128 Logo1_.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe"C:\Users\Admin\AppData\Local\Temp\fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a1E03.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe"C:\Users\Admin\AppData\Local\Temp\fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2196
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD545290af4beb107e9ebb9999a1ccfc37e
SHA1bd6b220540c28369a94650f32b14113caa7a9ad1
SHA2567c83414415b603bcc3ed8392831761f624af314c2a02c9fbce76975d249f6b78
SHA51243eb9868b2ae38b874ae9613fd48cc3a9418b37f21b89372e0ed5d682a495c343dbf880b3f69edc3230de59fb7152bb368560506ada5fc861432d8efa9a92d10
-
Filesize
491KB
MD5950c6b4ae533d9181054af057e663952
SHA19f1ae5ca9d7c2e7b40228dfa64d34179abdd0e5b
SHA2560aa52bd85261909f345746395c7121aa491b8cd2c415bd7db3d672dc15bc4906
SHA512bacc2b657366eb9d3c5e1c2998c35222a0cc37705f204abc73d0bdfec6fb79350d679c467b379e57146e5c9ba41e9981a5ab0e6082af5df16de071bbc906d812
-
Filesize
478KB
MD5559621f69b938488a7d98cf123a29640
SHA13dfe808fdf654a30ae778341d2d44302cde46baf
SHA256f5c2bfa4c8aa4885bc29c15f3e8253eda4737f73d312ae074b6438ce522d79f8
SHA51275f4f69ad33898c2edbaf00bd6387d629d04131e36fb3d45e04c4bf9d31517435fca8a92a36b3674fdca768dacff46797d8738dc4162e113c43bb26c3389c9ce
-
Filesize
722B
MD57d454a00e6d702d9869ff78edaaf6231
SHA163a71195b1300a09d71cc46debf92e2fd7619413
SHA256108919c92d38a60706e6dc2a280a18397af769ae5b5b16393f7cbd10ac1b9a49
SHA512ab28270948dd2616dc637196f0762bd33a920918fa80c517c19cf156d1ec7d5e7ade7bc3ad25883cd1e7ec10c3d0562f023b15d28ae30c1bbcae0aed3829462d
-
C:\Users\Admin\AppData\Local\Temp\fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe
Filesize337KB
MD5383dcbf7e816408a7bcc0a2c41634356
SHA18179e5d4f88995a92110e4341be44335fa6636f6
SHA2561a4bd956c34459258c85ca9c81dc547d2ef3e276c1f5d07f93902b4a8c74586e
SHA5128b0b5015fc9100d58d73c1b331318f4568cf16529205b127c4ff473df95a8f0a52d5271cc4b66640630ed633449eccdf025166781b67834cc04d8ce23d79554a
-
C:\Users\Admin\AppData\Local\Temp\fc49ee4702a7c9d95dfaea0a014e3ff6cc678baa96361159fc459f016dfcba9d.exe.exe
Filesize337KB
MD5383dcbf7e816408a7bcc0a2c41634356
SHA18179e5d4f88995a92110e4341be44335fa6636f6
SHA2561a4bd956c34459258c85ca9c81dc547d2ef3e276c1f5d07f93902b4a8c74586e
SHA5128b0b5015fc9100d58d73c1b331318f4568cf16529205b127c4ff473df95a8f0a52d5271cc4b66640630ed633449eccdf025166781b67834cc04d8ce23d79554a
-
Filesize
33KB
MD5d4b910e72a18fa251db1ac00a3c27f62
SHA10fca93f82c67f8ee1fc564d47c3ed49b99c94222
SHA25625d35297b7a17ad1411a81b7d3ac69808777adcd309bda2fdcc0fc300eda1dab
SHA51242c49403938d951dcefc4eb4e04361c3f749517d07216c149efd1b2ec1f68e94e4b640c52e7c7bdcd5f06737bf988530acc71f79f568461d0549e09d92cfd521
-
Filesize
33KB
MD5d4b910e72a18fa251db1ac00a3c27f62
SHA10fca93f82c67f8ee1fc564d47c3ed49b99c94222
SHA25625d35297b7a17ad1411a81b7d3ac69808777adcd309bda2fdcc0fc300eda1dab
SHA51242c49403938d951dcefc4eb4e04361c3f749517d07216c149efd1b2ec1f68e94e4b640c52e7c7bdcd5f06737bf988530acc71f79f568461d0549e09d92cfd521
-
Filesize
33KB
MD5d4b910e72a18fa251db1ac00a3c27f62
SHA10fca93f82c67f8ee1fc564d47c3ed49b99c94222
SHA25625d35297b7a17ad1411a81b7d3ac69808777adcd309bda2fdcc0fc300eda1dab
SHA51242c49403938d951dcefc4eb4e04361c3f749517d07216c149efd1b2ec1f68e94e4b640c52e7c7bdcd5f06737bf988530acc71f79f568461d0549e09d92cfd521
-
Filesize
10B
MD564a8745f77935c35c66f3aeeddf5d47d
SHA11214a584f661cb008b494ce6278289f8cf406810
SHA2567841de37b0bf8c995d0b903bef18bd4159f94d9c2a35c91b06dabe8198c6c63a
SHA512807b8f5512f868d0a2b1a10889164f787aa07b4309511326f4755d1121e666ec30dfb444a0565a5a7426cbd45b41d49d6429c9baf63a0bd3948b85b57841af3b