Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe
Resource
win10v2004-20240508-en
General
-
Target
c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe
-
Size
27KB
-
MD5
53797629937665db8a4beb03f7a343af
-
SHA1
9c519025282ab4ae4b6977cf640d2bf892e595a6
-
SHA256
c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4
-
SHA512
c2a5a973dc4b37734b32f945f87ea79f4a23d03ec40a3fc38b1a6ce0dfd10d2e3fb705294ced72d0b49900ff1cbcf451cfe73da56898881f3857133eaf9db4d8
-
SSDEEP
384:MGB1Gt5M0zhIV/DZ3KZp7JcTO4yf9KFL/KaUUqd3qR+FlYTj9QTN0wpD9p5Cs:f16GVRu1yK9fMFLKaTxsujCT7pZpY
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\W: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\L: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\K: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\E: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\J: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\G: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\Z: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\V: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\U: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\N: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\M: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\S: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\Q: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\P: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\O: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\I: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\Y: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\T: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\R: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened (read-only) \??\H: c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\DVD Maker\de-DE\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\en-US\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2076 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 28 PID 2240 wrote to memory of 2076 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 28 PID 2240 wrote to memory of 2076 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 28 PID 2240 wrote to memory of 2076 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 28 PID 2076 wrote to memory of 2620 2076 net.exe 30 PID 2076 wrote to memory of 2620 2076 net.exe 30 PID 2076 wrote to memory of 2620 2076 net.exe 30 PID 2076 wrote to memory of 2620 2076 net.exe 30 PID 2240 wrote to memory of 1204 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 21 PID 2240 wrote to memory of 1204 2240 c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe"C:\Users\Admin\AppData\Local\Temp\c0cf541b225ad77d189501689b4b825a1a8f380c6d15e60ddcb98374c0c594d4.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
957KB
MD5536cf0c0cfb09c60b312a082a6eea050
SHA11da9b1c2bf892f00ac6ebdb908cb166ebefe1f87
SHA2564d031a516cfee81240edf32b789e94e5e71e2d2751705a74980cca053c561690
SHA5125098dc8274d38d793c70a5677c0c1cc665089b2e7a4876302d9cb4754142558b9eea634eaf445519e7df3bf45444e53cbebd18ce27eeb69533dd01f62b4d0779
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
9B
MD5db64fea40b8b0f0d620ef2ecc6eadbca
SHA151736590bfbfbac961899ddcc9be998bfeabd3d5
SHA256946d3f6b9ecc2fa53895526caf79e41850ad594f22a240d93f8bb7eb286d70f8
SHA512b70e24f5930090ac0c9a584f3810d41af8de5562c6b78f6979ea97c929edc18d57bedb9af335d19307aa0db00004aa5a4e553f24ac884365d8bd899d6f3258c0