Malware Analysis Report

2024-11-13 13:58

Sample ID 240407-ypys7add64
Target 5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b
SHA256 5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b
Tags
spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b

Threat Level: Likely malicious

The file 5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b was found to be: Likely malicious.

Malicious Activity Summary

spyware stealer

Drops file in Drivers directory

Loads dropped DLL

Drops startup file

Executes dropped EXE

Deletes itself

Reads user/profile data of web browsers

Enumerates connected drives

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 19:58

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 19:58

Reported

2024-04-07 20:00

Platform

win7-20240221-en

Max time kernel

150s

Max time network

120s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\DVD Maker\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2300 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\net.exe
PID 2300 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\net.exe
PID 2300 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\net.exe
PID 2300 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\net.exe
PID 2196 wrote to memory of 2508 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2196 wrote to memory of 2508 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2196 wrote to memory of 2508 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2196 wrote to memory of 2508 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2300 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\cmd.exe
PID 2300 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\cmd.exe
PID 2300 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\cmd.exe
PID 2300 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\cmd.exe
PID 2300 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\Logo1_.exe
PID 2300 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\Logo1_.exe
PID 2300 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\Logo1_.exe
PID 2300 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\Logo1_.exe
PID 2712 wrote to memory of 2532 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2712 wrote to memory of 2532 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2712 wrote to memory of 2532 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2712 wrote to memory of 2532 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2532 wrote to memory of 2432 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2532 wrote to memory of 2432 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2532 wrote to memory of 2432 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2532 wrote to memory of 2432 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2568 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe
PID 2568 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe
PID 2568 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe
PID 2568 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe
PID 2712 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2712 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2712 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2712 wrote to memory of 2460 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2460 wrote to memory of 2216 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2460 wrote to memory of 2216 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2460 wrote to memory of 2216 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2460 wrote to memory of 2216 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2712 wrote to memory of 1216 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2712 wrote to memory of 1216 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe

"C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a427C.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe

"C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2300-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a427C.bat

MD5 a5ea5e978a931bc2dff646c526388631
SHA1 adfe502539fbe7ae6918ccbf5ff47747d4ea958e
SHA256 888b9f6ff1b1af9a8209392adbae884b37c2656c85196509948a4210f10efd6b
SHA512 76a2dfa5c3032a6aa486a192ab583341846173cdec83d45dd5dea886571cb65bef3ce164c1a59aacf3e18408ae17a7ad63500bd3c3db31740ee14158ef3b5860

C:\Windows\Logo1_.exe

MD5 0e8792b58f9237e03516447b7048d63c
SHA1 6f28494f0766ee470bbced1fe79fb10e5fee8252
SHA256 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956
SHA512 6b935debde1916d7b1f2239ac3534c1f1585406c0d5f1060fdb356253cfab2fe9c716fd7ad05f20b9b3bb222307f15ae1b88e9062c7282d570b523150364e8a5

C:\Windows\system32\drivers\etc\hosts

MD5 7e3a0edd0c6cd8316f4b6c159d5167a1
SHA1 753428b4736ffb2c9e3eb50f89255b212768c55a
SHA256 1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA512 9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

memory/2300-17-0x0000000000230000-0x000000000026E000-memory.dmp

memory/2300-16-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2712-21-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe.exe

MD5 422a02111fabd3e229ffd105d6054f56
SHA1 7930d07dbc89c1113eec7cbd492daf3a025939b2
SHA256 2d6bd317e34216f318ce9fb34fbc24e6260b1472930a8c0f126792f8ff821a9e
SHA512 a46b5f8b6cb3cf2cb9714a0708ff63dfe4b543ab4a651f2b8ab93ce54ae77e8c7f6d67a8d9d4481957ada966f778ac6d1cceb24b1d8bbad2a6bca77b0bc9ea59

memory/1216-29-0x0000000002A00000-0x0000000002A01000-memory.dmp

memory/2712-33-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-778096762-2241304387-192235952-1000\_desktop.ini

MD5 331b730a7f1adbf1f0bc05e0c610f0f1
SHA1 2f2283f84f040fbd4ecf99055026b70bb3b732ec
SHA256 2d3dbb80989e5cc7ef9ef800cc986bb8dccf4ca1f78437040bccd59312a55593
SHA512 16790117c382e66c8af2932ed0c37229ae5ee6b8bbaa8bd4e3f9afed6e07cd89c5807c81145f19f561ab714d844826cf6099a6dc97d84fa3f9da5e763bcc78c4

memory/2712-1797-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 196e80c6461b51a75560df3e57cfbd9a
SHA1 3dd1bb9835e97f093efe4ffd8c078d8fa3d4ef7f
SHA256 dee2cf210ee5f75549462b7cb03674155eb011190c77e332d53edcf655bcc237
SHA512 00a3d357b589b85a644c78558fd8eff80832cec119f8d4976f7248ce2521dbe331078129ec35af26ec18d182daad55812e3d57f2f9b73615762a37ac2fc15798

memory/2712-2479-0x0000000000400000-0x000000000043E000-memory.dmp

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 e93193856beaecee9905e2a6f36be17f
SHA1 d4c267ea34f28f048e29461656984aad70912eda
SHA256 1d345f4e09acdbc12e63ce90d0bd373b56d50a378f4603d8425f6df815e44a7b
SHA512 1fbe9c0e86ad98d6a2a7924badec0fffc69a7d0a4839e8af45d0aedf1e4e24a4a798df0ec5b8d0aa6e0e566c0c83a4030549bd32b9ac27406fc772d4a2ff5fc3

memory/2712-4042-0x0000000000400000-0x000000000043E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 19:58

Reported

2024-04-07 20:00

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

154s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-sl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.185.17\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Media Player\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-tw\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ja-jp\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\da-dk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-ma\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Templates\Presentation Designs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows NT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\dotnet\dotnet.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-tw\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ja-jp\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECLIPSE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\he-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hr-hr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Uninstall Information\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-tw\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.185.17\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3220 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\net.exe
PID 3220 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\net.exe
PID 3220 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\net.exe
PID 4640 wrote to memory of 3012 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4640 wrote to memory of 3012 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4640 wrote to memory of 3012 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3220 wrote to memory of 4712 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\cmd.exe
PID 3220 wrote to memory of 4712 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\cmd.exe
PID 3220 wrote to memory of 4712 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\SysWOW64\cmd.exe
PID 3220 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\Logo1_.exe
PID 3220 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\Logo1_.exe
PID 3220 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe C:\Windows\Logo1_.exe
PID 3904 wrote to memory of 5004 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3904 wrote to memory of 5004 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3904 wrote to memory of 5004 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 5004 wrote to memory of 3460 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 5004 wrote to memory of 3460 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 5004 wrote to memory of 3460 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4712 wrote to memory of 5044 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe
PID 4712 wrote to memory of 5044 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe
PID 4712 wrote to memory of 5044 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe
PID 3904 wrote to memory of 4728 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3904 wrote to memory of 4728 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3904 wrote to memory of 4728 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4728 wrote to memory of 4516 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4728 wrote to memory of 4516 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4728 wrote to memory of 4516 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3904 wrote to memory of 3556 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 3904 wrote to memory of 3556 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe

"C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3D57.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe

"C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

memory/3220-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\Logo1_.exe

MD5 0e8792b58f9237e03516447b7048d63c
SHA1 6f28494f0766ee470bbced1fe79fb10e5fee8252
SHA256 7e4e7447ce04580a3af3a9bf90810712d6daebc0ced6c6856eae22771ac50956
SHA512 6b935debde1916d7b1f2239ac3534c1f1585406c0d5f1060fdb356253cfab2fe9c716fd7ad05f20b9b3bb222307f15ae1b88e9062c7282d570b523150364e8a5

C:\Windows\system32\drivers\etc\hosts

MD5 6f4adf207ef402d9ef40c6aa52ffd245
SHA1 4b05b495619c643f02e278dede8f5b1392555a57
SHA256 d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512 a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

memory/3220-10-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3904-12-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a3D57.bat

MD5 3268a4efc6707af5ea6d28f8e4b4f410
SHA1 3edca913a863bd1b68d71b2d930921b35fa71bfe
SHA256 8b032ec3bb9bef3b5f037c39225876b4ec2912f0622ce0e1d2563b05d14a13ad
SHA512 c193b578fe06bda4d546b773959b44ac1d4fa5adb7808771a53771027c05666a5f9daf12d4046526afcd79d8212960a8c981d97d26a02f9f39c594c74ad1b8ce

C:\Users\Admin\AppData\Local\Temp\5e0c95260c4c4ab11672e950d4a74f173e8a5f66cb5822437c0d0fe29430a30b.exe.exe

MD5 422a02111fabd3e229ffd105d6054f56
SHA1 7930d07dbc89c1113eec7cbd492daf3a025939b2
SHA256 2d6bd317e34216f318ce9fb34fbc24e6260b1472930a8c0f126792f8ff821a9e
SHA512 a46b5f8b6cb3cf2cb9714a0708ff63dfe4b543ab4a651f2b8ab93ce54ae77e8c7f6d67a8d9d4481957ada966f778ac6d1cceb24b1d8bbad2a6bca77b0bc9ea59

memory/3904-19-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-399997616-3400990511-967324271-1000\_desktop.ini

MD5 331b730a7f1adbf1f0bc05e0c610f0f1
SHA1 2f2283f84f040fbd4ecf99055026b70bb3b732ec
SHA256 2d3dbb80989e5cc7ef9ef800cc986bb8dccf4ca1f78437040bccd59312a55593
SHA512 16790117c382e66c8af2932ed0c37229ae5ee6b8bbaa8bd4e3f9afed6e07cd89c5807c81145f19f561ab714d844826cf6099a6dc97d84fa3f9da5e763bcc78c4

C:\Program Files\ConfirmFormat.exe

MD5 eba4d2fd3484554a1a7b5a2a710ebc2d
SHA1 abe5a406fb504ac9f162e09a19feb2d03531536d
SHA256 81c05ae1c3edb1641d1f8f6d2f92bbc40b961d8add021780df7097de977af664
SHA512 6b3da4f01925221b55127468523ca7aab4c32363c954a673e91c2e1c0c8cbcd0f0685e1d044511fee26d05c69e99a34e985aa3483ab8b854461b5004a5dae9da

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 196e80c6461b51a75560df3e57cfbd9a
SHA1 3dd1bb9835e97f093efe4ffd8c078d8fa3d4ef7f
SHA256 dee2cf210ee5f75549462b7cb03674155eb011190c77e332d53edcf655bcc237
SHA512 00a3d357b589b85a644c78558fd8eff80832cec119f8d4976f7248ce2521dbe331078129ec35af26ec18d182daad55812e3d57f2f9b73615762a37ac2fc15798

memory/3904-4882-0x0000000000400000-0x000000000043E000-memory.dmp

C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

MD5 15137620fba9c2013dfa9107be4321d5
SHA1 31c790632ae19274fc2ed7e1615458324bc199bd
SHA256 37cf90de70064c0ecf765ae35e8b0cf412c90cca2aaa2513cfba95b408b4e604
SHA512 e2cbb59ec77cb009bf1b0d8d398c0898e65380858d33afb58e6ffc762842526f097d112369200cda95f015f5aa75e5af88810e2f2e174e0d1600cb6ec22a77e3

memory/3904-8613-0x0000000000400000-0x000000000043E000-memory.dmp