Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/02/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe
Resource
win7-20231215-en
General
-
Target
7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe
-
Size
33KB
-
MD5
0e8792b58f9237e03516447b7048d63c
-
SHA1
6f28494f0766ee470bbced1fe79fb10e5fee8252
-
SHA256
7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956
-
SHA512
6b935debde1916d7b1f2239ac3534c1f1585406c0d5f1060fdb356253cfab2fe9c716fd7ad05f20b9b3bb222307f15ae1b88e9062c7282d570b523150364e8a5
-
SSDEEP
768:PVElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/a:PVaYzMXqtGNttyUn01Q78a4R
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\U: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\T: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\Q: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\M: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\H: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\X: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\V: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\R: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\O: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\K: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\S: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\P: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\N: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\L: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\I: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\E: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\Z: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\Y: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\J: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened (read-only) \??\G: 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\7-Zip\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe File created C:\Windows\Dll.dll 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2424 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 28 PID 2324 wrote to memory of 2424 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 28 PID 2324 wrote to memory of 2424 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 28 PID 2324 wrote to memory of 2424 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 28 PID 2424 wrote to memory of 2408 2424 net.exe 30 PID 2424 wrote to memory of 2408 2424 net.exe 30 PID 2424 wrote to memory of 2408 2424 net.exe 30 PID 2424 wrote to memory of 2408 2424 net.exe 30 PID 2324 wrote to memory of 1920 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 31 PID 2324 wrote to memory of 1920 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 31 PID 2324 wrote to memory of 1920 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 31 PID 2324 wrote to memory of 1920 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 31 PID 1920 wrote to memory of 1764 1920 net.exe 33 PID 1920 wrote to memory of 1764 1920 net.exe 33 PID 1920 wrote to memory of 1764 1920 net.exe 33 PID 1920 wrote to memory of 1764 1920 net.exe 33 PID 2324 wrote to memory of 1192 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 16 PID 2324 wrote to memory of 1192 2324 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe"C:\Users\Admin\AppData\Local\Temp\7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956.exe"2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5196e80c6461b51a75560df3e57cfbd9a
SHA13dd1bb9835e97f093efe4ffd8c078d8fa3d4ef7f
SHA256dee2cf210ee5f75549462b7cb03674155eb011190c77e332d53edcf655bcc237
SHA51200a3d357b589b85a644c78558fd8eff80832cec119f8d4976f7248ce2521dbe331078129ec35af26ec18d182daad55812e3d57f2f9b73615762a37ac2fc15798
-
Filesize
717KB
MD5476086cf88808e6e7f45b3778a684f22
SHA1581be632d283711590208b67805ecae2a3c174cd
SHA2566fbbb67461d9403ab21a6691b86b01c4e0229efedd7df75f38aaa6415c892de2
SHA512af3a43301baadf78666057e9ca3f7dead6cf8dd5eba66cb6f77282597bdf30500c04b2adaabdcc5ea7533a0ac5bf0f736d1fba3dee0c2f9a68eb2a58e4daba4b
-
Filesize
478KB
MD5e93193856beaecee9905e2a6f36be17f
SHA1d4c267ea34f28f048e29461656984aad70912eda
SHA2561d345f4e09acdbc12e63ce90d0bd373b56d50a378f4603d8425f6df815e44a7b
SHA5121fbe9c0e86ad98d6a2a7924badec0fffc69a7d0a4839e8af45d0aedf1e4e24a4a798df0ec5b8d0aa6e0e566c0c83a4030549bd32b9ac27406fc772d4a2ff5fc3
-
Filesize
9B
MD52ff79c7e9d808839945eb189c3d6bc8f
SHA19c3670ac7a3449376a29d051d05595809443e8a9
SHA256bf7fcc6751a0bf3866fe23a58c4ca1d0dc56eef7e4587624f91e1e5ff363d7e0
SHA512a8137fc967a70c92a0b003bf2f2133f7b612bb9d1423311439ac8f07840129a74320fb3006dcf96bf5ce2bcaa8a5b51dd5d2d0f92b9cd11bda9e9682137780d4