Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe
Resource
win7-20240220-en
General
-
Target
c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe
-
Size
33KB
-
MD5
0d20f038ad62ff6b5fd30ce3ea460037
-
SHA1
1a654b3d6703c1e9aab6f420ee722184179558b7
-
SHA256
c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82
-
SHA512
e15973fd11e948fffa2e93296070c4c90b459b869e2548e37d02add2a948f0a6b4aa84c35ee971eb994a5187f114dbccfce2efbbaf981afd1a0e47b2aa5f5689
-
SSDEEP
768:PksElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/a:PksaYzMXqtGNttyUn01Q78a4R
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\P: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\N: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\M: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\L: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\H: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\X: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\U: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\J: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\I: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\E: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\W: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\T: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\V: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\S: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\Q: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\G: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\Z: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\Y: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\O: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened (read-only) \??\K: c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Uninstall Information\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Microsoft Office\Office14\1033\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Google\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe File created C:\Windows\Dll.dll c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1228 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 28 PID 2300 wrote to memory of 1228 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 28 PID 2300 wrote to memory of 1228 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 28 PID 2300 wrote to memory of 1228 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 28 PID 1228 wrote to memory of 2544 1228 net.exe 30 PID 1228 wrote to memory of 2544 1228 net.exe 30 PID 1228 wrote to memory of 2544 1228 net.exe 30 PID 1228 wrote to memory of 2544 1228 net.exe 30 PID 2300 wrote to memory of 1056 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 31 PID 2300 wrote to memory of 1056 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 31 PID 2300 wrote to memory of 1056 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 31 PID 2300 wrote to memory of 1056 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 31 PID 1056 wrote to memory of 2600 1056 net.exe 33 PID 1056 wrote to memory of 2600 1056 net.exe 33 PID 1056 wrote to memory of 2600 1056 net.exe 33 PID 1056 wrote to memory of 2600 1056 net.exe 33 PID 2300 wrote to memory of 1208 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 21 PID 2300 wrote to memory of 1208 2300 c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe"C:\Users\Admin\AppData\Local\Temp\c35269f7174fca4d6c47d66f7ab60fc0f4f401b91caaca17b3c637fad3ed4c82.exe"2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2544
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5edfa3e4e20077e1788efe171d6c9242c
SHA1ba9a86931f220ab1dabd728bc8ad6aee8177cf62
SHA256c15ebbc97462922e35823192f29c1c9a1437722a0d1a8b0e671b31566f8d5dd1
SHA512747c45c4935caa88bf9a939aab3c663c3ab15e8d4c7bda41130921aa5ff66d8c28bcaef8f6b703b1c9ae6f41acd0d09c5ae4e41f9b6bd0bde7e5c156a9144fcb
-
Filesize
717KB
MD5523ca570f0dbb91e42c5ee89b73919c5
SHA178edd98d4d409b901ad39b500c754b255241c293
SHA256e2c648a85b070f7e3c06fe54baabc74d653d104c019708c617a997fd92fd5d40
SHA512f76c9569f919d135a6c724905eff8cf36f80b512eeb87d0b80fa43fbef470e1c3c5ae848165dd45a4039f8204b4c27f33e61b4848c325d0549e431388f961cae
-
Filesize
478KB
MD5e93193856beaecee9905e2a6f36be17f
SHA1d4c267ea34f28f048e29461656984aad70912eda
SHA2561d345f4e09acdbc12e63ce90d0bd373b56d50a378f4603d8425f6df815e44a7b
SHA5121fbe9c0e86ad98d6a2a7924badec0fffc69a7d0a4839e8af45d0aedf1e4e24a4a798df0ec5b8d0aa6e0e566c0c83a4030549bd32b9ac27406fc772d4a2ff5fc3
-
Filesize
8B
MD51b16d2dbd4281ce4e4e5729c608dcb0b
SHA1851e624080ba5598edb808d4b30fe2d74999ce18
SHA256c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549
SHA512cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59