Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe
Resource
win7-20240221-en
General
-
Target
0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe
-
Size
577KB
-
MD5
65321b45c11d2f1ae2ef5b3e508e99db
-
SHA1
6ab49fa25966d5dbb6e6209ad3a4686cf6aad44d
-
SHA256
0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9
-
SHA512
f3f868de4a43973d232b6f54f2b15cf7643a48c80dac64be08c5ba2e0e6ca31c8c1843cabdb7fd48c2a2b798a03cd7c80fe86d8fed9035f5553df195cdbd5488
-
SSDEEP
6144:yf46tGdye419E7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQC:e3NbI7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 4904 Logo1_.exe 4360 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe File created C:\Windows\Logo1_.exe 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe 4904 Logo1_.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3696 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 84 PID 4416 wrote to memory of 3696 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 84 PID 4416 wrote to memory of 3696 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 84 PID 3696 wrote to memory of 3480 3696 net.exe 86 PID 3696 wrote to memory of 3480 3696 net.exe 86 PID 3696 wrote to memory of 3480 3696 net.exe 86 PID 4416 wrote to memory of 4448 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 90 PID 4416 wrote to memory of 4448 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 90 PID 4416 wrote to memory of 4448 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 90 PID 4416 wrote to memory of 4904 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 92 PID 4416 wrote to memory of 4904 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 92 PID 4416 wrote to memory of 4904 4416 0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe 92 PID 4448 wrote to memory of 4360 4448 cmd.exe 93 PID 4448 wrote to memory of 4360 4448 cmd.exe 93 PID 4904 wrote to memory of 4788 4904 Logo1_.exe 94 PID 4904 wrote to memory of 4788 4904 Logo1_.exe 94 PID 4904 wrote to memory of 4788 4904 Logo1_.exe 94 PID 4788 wrote to memory of 364 4788 net.exe 96 PID 4788 wrote to memory of 364 4788 net.exe 96 PID 4788 wrote to memory of 364 4788 net.exe 96 PID 4904 wrote to memory of 4380 4904 Logo1_.exe 97 PID 4904 wrote to memory of 4380 4904 Logo1_.exe 97 PID 4904 wrote to memory of 4380 4904 Logo1_.exe 97 PID 4380 wrote to memory of 4252 4380 net.exe 99 PID 4380 wrote to memory of 4252 4380 net.exe 99 PID 4380 wrote to memory of 4252 4380 net.exe 99 PID 4904 wrote to memory of 3428 4904 Logo1_.exe 56 PID 4904 wrote to memory of 3428 4904 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3836.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe"4⤵
- Executes dropped EXE
PID:4360
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:364
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4252
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD565321b45c11d2f1ae2ef5b3e508e99db
SHA16ab49fa25966d5dbb6e6209ad3a4686cf6aad44d
SHA2560527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9
SHA512f3f868de4a43973d232b6f54f2b15cf7643a48c80dac64be08c5ba2e0e6ca31c8c1843cabdb7fd48c2a2b798a03cd7c80fe86d8fed9035f5553df195cdbd5488
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD551c1eb02821359551eae62ff451ccbb4
SHA1917e11eb8a26a033a330a9cee5c5207d0da1109a
SHA2569afbb3fd781ea931d8bc856c768fe7af7e440e9f7a29950b5dca44593f0ef04f
SHA512062f0c32d3d9b46fc670512a818c88919bcc90a2f7f5bd4910f917a96c42527fd6c28117c366cb66cd6bfa3ec64f5a43aadcaa4bdad01c8d45eb2bfe2c85f5ee
-
Filesize
722B
MD563e91c9567c7dc0ff710ba5078811998
SHA1148a88380ff9b1e3ea7fd4f7059fabd68ad4aaef
SHA256f411c83673a501023150606350ef1df4ecd5f2a5509df262d65244d1010304c6
SHA51252dcfe792bbd82ca71d00a0224ab34e05decadea5c6c282f826ff4bb1b848d6ca43b030a191218e5e285259c2f910c835e4be3f9a42a140092d4004a400bf276
-
C:\Users\Admin\AppData\Local\Temp\0527f89ac0cbe4a36c3ec73afe8be84967edf526a49e1bde1437025d6523f0a9.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
33KB
MD58c9e7eefdd62f19108ae9e444ad2c208
SHA1e40870610792bb8e4e835787634a0ac9a8daff3e
SHA2561cffa0d883a8763fd15280a4148775ddf3789857a2df269c9425f41095b83a92
SHA51292e4fb044d706550c0e833318e8d732ee3130c78ea198530fbbc604f34ef41cfc9b53b8fc60bfdbbe61afde60fbf3a9e528fbc1ae14eac6226d9b5966367b292
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
8B
MD54b4dbd7e2fe4189c8136069a10e1698a
SHA1e4e6e1e80d1fe41d20456173c522d8e7affc4579
SHA256f00f66ba8f3341c7ae8e3c7741a1ff31e522c75580afa9793dcaee17488ccf5b
SHA5122be5b324ef5d951c5e66d692c26f813e0fdd76cb4ef01a9abf38e5f7837f649e0194f7f5c55b1cfd79a9d253031ace5b270fc50f6c11f1885e85f9a874380d8c