Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe
Resource
win7-20240221-en
General
-
Target
7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe
-
Size
39KB
-
MD5
0c66c78eb026971356126503c6366615
-
SHA1
0a6ff1ba641cbda042328329393fff95e356f94b
-
SHA256
7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260
-
SHA512
b5a781cf4eda3414c0c0ba6f1db084f5d19d7df625c587bef83867d1f6bec8a0e96789015acb15adc5b7572fcd203458a26d5a1a00aa6702fc77eb3b08f20495
-
SSDEEP
768:8bjeUHoO5RroZJ76739/dZVdfpULiAYXjPrN+8WEjrZMYjV8mp8w:8mFe+Zk7VJbwlYXjPrsqrZMYR5p8w
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\Y: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\W: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\T: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\G: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\R: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\P: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\H: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\E: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\X: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\V: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\U: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\Q: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\O: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\N: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\S: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\M: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\L: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\K: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\J: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened (read-only) \??\I: 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Google\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe File created C:\Windows\Dll.dll 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2584 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 28 PID 2172 wrote to memory of 2584 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 28 PID 2172 wrote to memory of 2584 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 28 PID 2172 wrote to memory of 2584 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 28 PID 2584 wrote to memory of 3036 2584 net.exe 30 PID 2584 wrote to memory of 3036 2584 net.exe 30 PID 2584 wrote to memory of 3036 2584 net.exe 30 PID 2584 wrote to memory of 3036 2584 net.exe 30 PID 2172 wrote to memory of 2236 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 31 PID 2172 wrote to memory of 2236 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 31 PID 2172 wrote to memory of 2236 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 31 PID 2172 wrote to memory of 2236 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 31 PID 2236 wrote to memory of 2600 2236 net.exe 33 PID 2236 wrote to memory of 2600 2236 net.exe 33 PID 2236 wrote to memory of 2600 2236 net.exe 33 PID 2236 wrote to memory of 2600 2236 net.exe 33 PID 2172 wrote to memory of 1212 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 21 PID 2172 wrote to memory of 1212 2172 7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe"C:\Users\Admin\AppData\Local\Temp\7db6e7b89825e97a70ffddd87caf6a9b6296134a89388986ea4867359903f260.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD582aff40c160a0a881bf7a0fa4b647957
SHA1dee101a59ad91bf0065dafb0fd680c339c110c17
SHA256c0025a5dc9fd03e01f08941e4163078e5ce9adc3401c1e1da6441c27cdf0d0a3
SHA512de32bf34a53fa0c80ba3b1277ff42f708fba5414f6d281baada7bf1268d4cebf09c3fca613b73962ba112c22ba6690689a0c2727d63e2a8adbe0868ba2ec6ce5
-
Filesize
723KB
MD57412939606c2600b453e3ee20939eb58
SHA1d13ca991ae214751172d07b5ac59cfe061b40278
SHA2567c94b31a8e366d90ab012e787001fd869606cc1901e5e7140f37529f18c6b53f
SHA5128609618171d1df15fa14edcebdca15f883feb0b9f1fa9e9b592df71672c101a2094cb506bd478cd63a376acb427fe041a6648f023a5fc20fecbc2c4666cb24ca
-
Filesize
484KB
MD579d4fd1cb70f3844796aa1ea18a238e2
SHA178d207a7de2aeb85eefc185d894b0b7626e1e1f3
SHA256ccaacc3965c1bdfce8cd1e934895a4563dddf082016e56846966c250bed87d5b
SHA5127a0167cbce49f09ea39e490862b8c371eacf8ce3d74d6a6054e7f0e1df4b307019f5adee03603fcb9d4db2b17841cbc9cf129e9480d70b20c266fe82b3979b33
-
Filesize
9B
MD5c59aab012a570d8b20f60efcafb272be
SHA1709df64d9a23340c6bc42f2bf8dfdca512bff2e0
SHA2568a349242c7461f8fccc029421cd051ef8f140a8e3738d348a2354a3d5b9de220
SHA5128c3f67dc02beaca59f0deaa4d8e33bc385b19df02d2a8b905b47148e21919f7d059f3883f02dad25a0d11dc807343390114753a7918171720d8cd72e84239e17