Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe
Resource
win10v2004-20240226-en
General
-
Target
92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe
-
Size
26KB
-
MD5
fef4706af3e9d80fb0818f9f77a619f4
-
SHA1
d2876a45d16ffe676a5f8f85a58db7f7478015ee
-
SHA256
92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999
-
SHA512
2368e43f4d1c6990e4d42096f4b8c046f59a2b10efe1c3f4b20c73ded5bdaa1b529eaa9184e281ff0a6b8976d56d4f66c118e0afe0a3f3d811cb93201b65336a
-
SSDEEP
768:uw1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoZw:HfgLdQAQfcfymN
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\W: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\S: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\G: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\E: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\U: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\O: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\M: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\K: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\J: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\P: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\I: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\Z: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\X: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\V: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\T: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\R: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\Q: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\N: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\L: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened (read-only) \??\H: 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2452 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 28 PID 1008 wrote to memory of 2452 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 28 PID 1008 wrote to memory of 2452 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 28 PID 1008 wrote to memory of 2452 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 28 PID 2452 wrote to memory of 2508 2452 net.exe 30 PID 2452 wrote to memory of 2508 2452 net.exe 30 PID 2452 wrote to memory of 2508 2452 net.exe 30 PID 2452 wrote to memory of 2508 2452 net.exe 30 PID 1008 wrote to memory of 1260 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 21 PID 1008 wrote to memory of 1260 1008 92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe"C:\Users\Admin\AppData\Local\Temp\92440b562f6e17a602c96f489ef13c4043d3e026ab7a392eb80cb1207aa5a999.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2508
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5054a7dee151c8d7dfc80a249e27c24f5
SHA12f595f5d038e0ed2ef1fc51a94a35d8009e500e5
SHA2563147caa89606ec06d30990cf35b53587cad5b5f5f8904dbc82b8171b0c0038fb
SHA512cfaef8c9bc4deae6044e748f301f8463c59723ac08f1610b61191be95de2a6fa2ca5744c445b951dc738abe3f1a979492d21fc3f4ce6777e0655bf51d6425074
-
Filesize
956KB
MD59366c740ac259aa938f81e612e9908d6
SHA1531e7f8b2982bd43a7caf5f70cb526c4413e3dde
SHA2565168664dba4abefa1eb38b270d03d66a7d8444f5f36ffa6930c24b7f2cca3d95
SHA512ec3bf06157b99f0dd0be1c17f8544327b303bf9b6a396b15790859da624bc49925ce135d48fbadf095992b7dcebb75cfecadb6b52c954d9e45471c6ef6d4ac8b
-
Filesize
9B
MD5ffee50c69ce4733057892ab912ba2f08
SHA109ffe94208f4dbeac5a20bad25ffae158e3fc6dc
SHA256c1b6255859813f192c8648418d3923dc540ce2566fac2a17a736f33014438abc
SHA512cb68a272d6d7941417a7dddd9988b5b1f2245fbfeb8df4876b59f7b4157e75a8328dc68cbc0b81c3d6386f75d1632a271635eca276bd274c9a5cd54b34e5c72f