Malware Analysis Report

2024-11-30 02:35

Sample ID 240407-xmnd1abe8s
Target 27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4
SHA256 27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4
Tags
spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4

Threat Level: Likely malicious

The file 27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4 was found to be: Likely malicious.

Malicious Activity Summary

spyware stealer

Drops file in Drivers directory

Executes dropped EXE

Deletes itself

Loads dropped DLL

Reads user/profile data of web browsers

Enumerates connected drives

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Runs net.exe

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 18:58

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 18:58

Reported

2024-04-07 19:00

Platform

win7-20240221-en

Max time kernel

149s

Max time network

120s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2976 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\net.exe
PID 2976 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\net.exe
PID 2976 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\net.exe
PID 2976 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\net.exe
PID 2972 wrote to memory of 3044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2972 wrote to memory of 3044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2972 wrote to memory of 3044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2972 wrote to memory of 3044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2976 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\cmd.exe
PID 2976 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\cmd.exe
PID 2976 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\cmd.exe
PID 2976 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\cmd.exe
PID 2976 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\Logo1_.exe
PID 2976 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\Logo1_.exe
PID 2976 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\Logo1_.exe
PID 2976 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\Logo1_.exe
PID 2556 wrote to memory of 2616 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2556 wrote to memory of 2616 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2556 wrote to memory of 2616 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2556 wrote to memory of 2616 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2616 wrote to memory of 2608 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2616 wrote to memory of 2608 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2616 wrote to memory of 2608 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2616 wrote to memory of 2608 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2800 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe
PID 2800 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe
PID 2800 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe
PID 2800 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe
PID 2556 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2556 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2556 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2556 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2460 wrote to memory of 2408 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2460 wrote to memory of 2408 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2460 wrote to memory of 2408 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2460 wrote to memory of 2408 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2556 wrote to memory of 1256 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2556 wrote to memory of 1256 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe

"C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a474D.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe

"C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2976-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a474D.bat

MD5 c9913006130b11c3d4900d4f05a0c143
SHA1 cf265cdb62b1019fead11e9f6ab6886d652996a0
SHA256 2825ef9ccf27768bf08d4f9671a1863cf811928b6d44e5c8bd73e942007360f0
SHA512 a5ced2176573cb33d4915b4f3b3fe5aaa4cc404df9f10006e10b3a90d5e47d81582c9a63c114d485f09f7cb1443171864c43db5f1d58a6030f0d02b8408d05f9

memory/2556-22-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\Logo1_.exe

MD5 0e8792b58f9237e03516447b7048d63c
SHA1 6f28494f0766ee470bbced1fe79fb10e5fee8252
SHA256 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956
SHA512 6b935debde1916d7b1f2239ac3534c1f1585406c0d5f1060fdb356253cfab2fe9c716fd7ad05f20b9b3bb222307f15ae1b88e9062c7282d570b523150364e8a5

C:\Windows\system32\drivers\etc\hosts

MD5 7e3a0edd0c6cd8316f4b6c159d5167a1
SHA1 753428b4736ffb2c9e3eb50f89255b212768c55a
SHA256 1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA512 9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

memory/2976-18-0x0000000000240000-0x000000000027E000-memory.dmp

memory/2976-17-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2976-13-0x0000000000240000-0x000000000027E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe.exe

MD5 1af55e19c1bd264d635aa202f0b3e628
SHA1 e7cc75ca40566fc257974340b611ba24ed09b3f3
SHA256 e2bbf624927463534b2757974ef38f453faee9564736e4672e1481273f6cfc48
SHA512 bb967372d392f4e320490212053fbb09637b472b3636443c7dfd1dde993ee91a7033a4c48ac9e25ebaf20d72c9f3dcb9d497d6b153ee7bdf65389caa81996f71

memory/1256-30-0x0000000002A90000-0x0000000002A91000-memory.dmp

memory/2556-34-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-1658372521-4246568289-2509113762-1000\_desktop.ini

MD5 331b730a7f1adbf1f0bc05e0c610f0f1
SHA1 2f2283f84f040fbd4ecf99055026b70bb3b732ec
SHA256 2d3dbb80989e5cc7ef9ef800cc986bb8dccf4ca1f78437040bccd59312a55593
SHA512 16790117c382e66c8af2932ed0c37229ae5ee6b8bbaa8bd4e3f9afed6e07cd89c5807c81145f19f561ab714d844826cf6099a6dc97d84fa3f9da5e763bcc78c4

memory/2556-2051-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 196e80c6461b51a75560df3e57cfbd9a
SHA1 3dd1bb9835e97f093efe4ffd8c078d8fa3d4ef7f
SHA256 dee2cf210ee5f75549462b7cb03674155eb011190c77e332d53edcf655bcc237
SHA512 00a3d357b589b85a644c78558fd8eff80832cec119f8d4976f7248ce2521dbe331078129ec35af26ec18d182daad55812e3d57f2f9b73615762a37ac2fc15798

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 e93193856beaecee9905e2a6f36be17f
SHA1 d4c267ea34f28f048e29461656984aad70912eda
SHA256 1d345f4e09acdbc12e63ce90d0bd373b56d50a378f4603d8425f6df815e44a7b
SHA512 1fbe9c0e86ad98d6a2a7924badec0fffc69a7d0a4839e8af45d0aedf1e4e24a4a798df0ec5b8d0aa6e0e566c0c83a4030549bd32b9ac27406fc772d4a2ff5fc3

memory/2556-4042-0x0000000000400000-0x000000000043E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 18:58

Reported

2024-04-07 19:01

Platform

win10v2004-20240226-en

Max time kernel

155s

Max time network

157s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\include\win32\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\Simple\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\lib\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\en\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Defender\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECLIPSE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\dotnet\host\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Client\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Filters\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LEVEL\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\zh-Hans\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\legal\jdk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre-1.8\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1524 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\net.exe
PID 1524 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\net.exe
PID 1524 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\net.exe
PID 1944 wrote to memory of 1480 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1944 wrote to memory of 1480 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1944 wrote to memory of 1480 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1524 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\cmd.exe
PID 1524 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\cmd.exe
PID 1524 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\SysWOW64\cmd.exe
PID 1524 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\Logo1_.exe
PID 1524 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\Logo1_.exe
PID 1524 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe C:\Windows\Logo1_.exe
PID 1672 wrote to memory of 4840 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1672 wrote to memory of 4840 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1672 wrote to memory of 4840 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4840 wrote to memory of 2956 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4840 wrote to memory of 2956 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4840 wrote to memory of 2956 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2668 wrote to memory of 2180 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe
PID 2668 wrote to memory of 2180 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe
PID 2668 wrote to memory of 2180 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe
PID 1672 wrote to memory of 1856 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1672 wrote to memory of 1856 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1672 wrote to memory of 1856 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1856 wrote to memory of 3180 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1856 wrote to memory of 3180 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1856 wrote to memory of 3180 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1672 wrote to memory of 3572 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 1672 wrote to memory of 3572 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe

"C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a954B.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe

"C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/1524-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\Logo1_.exe

MD5 0e8792b58f9237e03516447b7048d63c
SHA1 6f28494f0766ee470bbced1fe79fb10e5fee8252
SHA256 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956
SHA512 6b935debde1916d7b1f2239ac3534c1f1585406c0d5f1060fdb356253cfab2fe9c716fd7ad05f20b9b3bb222307f15ae1b88e9062c7282d570b523150364e8a5

memory/1524-9-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 6f4adf207ef402d9ef40c6aa52ffd245
SHA1 4b05b495619c643f02e278dede8f5b1392555a57
SHA256 d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512 a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

memory/1672-12-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a954B.bat

MD5 c28ace800b61bab5817fb9e27f722e0f
SHA1 9683dadccc0cade48348e71de4a968a86bbe0e50
SHA256 fd0c8d1fe8f1265f3f00980dc201ea9d6799996f7bda7797e709ba8290d80f46
SHA512 03e0b28ddc7424faf55bba9f83c3e8d936ab71b8e66524c2b5eff9733624c4aea34690d4161f633e413ae80b8fbd16ab361eed9b448cf32ceb2a93ecf66edbf6

C:\Users\Admin\AppData\Local\Temp\27ea279b69c11d20ca644935da16e5d1e9e0d04601142d9aec57e36b0b3160d4.exe.exe

MD5 1af55e19c1bd264d635aa202f0b3e628
SHA1 e7cc75ca40566fc257974340b611ba24ed09b3f3
SHA256 e2bbf624927463534b2757974ef38f453faee9564736e4672e1481273f6cfc48
SHA512 bb967372d392f4e320490212053fbb09637b472b3636443c7dfd1dde993ee91a7033a4c48ac9e25ebaf20d72c9f3dcb9d497d6b153ee7bdf65389caa81996f71

memory/1672-19-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-609813121-2907144057-1731107329-1000\_desktop.ini

MD5 331b730a7f1adbf1f0bc05e0c610f0f1
SHA1 2f2283f84f040fbd4ecf99055026b70bb3b732ec
SHA256 2d3dbb80989e5cc7ef9ef800cc986bb8dccf4ca1f78437040bccd59312a55593
SHA512 16790117c382e66c8af2932ed0c37229ae5ee6b8bbaa8bd4e3f9afed6e07cd89c5807c81145f19f561ab714d844826cf6099a6dc97d84fa3f9da5e763bcc78c4

memory/1672-39-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Program Files\7-Zip\7z.exe

MD5 52b929e3308c6c5cf1e9366799ba774d
SHA1 73367e44a6aeb30f38c053492485ccc88f3f96b9
SHA256 1371f108190c128f882a8babd65e575855c16a158530163f97d4aaec08204a3a
SHA512 074eb6f7224979654bf1f5239a9b46a4a30ce8a17c3e47b3f38902cffdbb4c394facbe948d6b0b7f99077483708f8bc03aa40fb1ddba2c18033d52719ac47baa

memory/1672-67-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1672-79-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1672-88-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1672-387-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1672-742-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1672-1601-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1672-1604-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1672-1671-0x0000000000400000-0x000000000043E000-memory.dmp