Malware Analysis Report

2025-06-15 20:08

Sample ID 240515-ncejnseh22
Target 007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113
SHA256 007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113
Tags
spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113

Threat Level: Shows suspicious behavior

The file 007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113 was found to be: Shows suspicious behavior.

Malicious Activity Summary

spyware stealer

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Deletes itself

Enumerates connected drives

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Suspicious use of WriteProcessMemory

Runs net.exe

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 11:14

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 11:14

Reported

2024-05-15 11:17

Platform

win7-20240221-en

Max time kernel

149s

Max time network

118s

Command Line

C:\Windows\Explorer.EXE

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Media Player\Media Renderer\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1968 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\net.exe
PID 1968 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\net.exe
PID 1968 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\net.exe
PID 1968 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\net.exe
PID 2468 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2468 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2468 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2468 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1968 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\cmd.exe
PID 1968 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\cmd.exe
PID 1968 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\cmd.exe
PID 1968 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\cmd.exe
PID 1968 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\Logo1_.exe
PID 1968 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\Logo1_.exe
PID 1968 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\Logo1_.exe
PID 1968 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\Logo1_.exe
PID 2524 wrote to memory of 2960 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe
PID 2524 wrote to memory of 2960 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe
PID 2524 wrote to memory of 2960 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe
PID 2524 wrote to memory of 2960 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe
PID 2572 wrote to memory of 2392 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2572 wrote to memory of 2392 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2572 wrote to memory of 2392 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2572 wrote to memory of 2392 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2392 wrote to memory of 2632 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2392 wrote to memory of 2632 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2392 wrote to memory of 2632 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2392 wrote to memory of 2632 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2572 wrote to memory of 2608 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2572 wrote to memory of 2608 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2572 wrote to memory of 2608 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2572 wrote to memory of 2608 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2608 wrote to memory of 2440 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2608 wrote to memory of 2440 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2608 wrote to memory of 2440 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2608 wrote to memory of 2440 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2572 wrote to memory of 1200 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2572 wrote to memory of 1200 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe

"C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1C38.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe

"C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/1968-0-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe

MD5 9f498971cbe636662f3d210747d619e1
SHA1 44b8e2732fa1e2f204fc70eaa1cb406616250085
SHA256 8adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512 b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93

C:\Users\Admin\AppData\Local\Temp\$$a1C38.bat

MD5 f4f7b3992b9fe318b14ed9ece78fc308
SHA1 18b3eabc97b389b2e2813d9a71b25c3ab7e97cf5
SHA256 979d3a29434a0d6070929b1de77636b59ec6dfbf3b4ee439e207823db5ed3c39
SHA512 ed1664f4fe1b7471adc7231f1549c473e552528449a1f52c9bfbb52f975c69655b6ed21ca2829413a7603394531deb0cae37d34db6af7b3680c14860ae9fb331

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/2572-19-0x0000000000400000-0x000000000043F000-memory.dmp

memory/1968-18-0x0000000000400000-0x000000000043F000-memory.dmp

memory/1968-12-0x0000000000440000-0x000000000047F000-memory.dmp

memory/1200-28-0x0000000002F20000-0x0000000002F21000-memory.dmp

memory/2572-32-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 3ac7773258fe0684e8a28f3793a74ed3
SHA1 316fba91c21ea13e4576a5eeec832fd585c31ca0
SHA256 9f41dbbbdf4edcf63ba6262af0ae0d9a13874d0e008522af866f12f3e71b198f
SHA512 8d2647018107b940fe80b5ab979570b9f255764195976272b8c2ee8640b0e91493d5e7fa598b4ce29bda8f87cf495c6c71fd62734d51761b04bb5127eb5b2b4a

memory/2572-3319-0x0000000000400000-0x000000000043F000-memory.dmp

memory/2572-4134-0x0000000000400000-0x000000000043F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 11:14

Reported

2024-05-15 11:17

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

153s

Command Line

C:\Windows\Explorer.EXE

Signatures

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pt-br\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\lib\security\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Media Player\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\eu-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\EBWebView\x86\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Office Setup Controller\Office.en-us\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\ResiliencyLinks\WidevineCdm\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-fr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\pt-br\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Media Player\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\Trust Protection Lists\Sigma\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\da-dk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ar-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Google\Chrome\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\lib\applet\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ja-jp\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\SetupMetrics\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_CA\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\he-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\he-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\ResiliencyLinks\MEIPreload\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\swidtag\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1380 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\net.exe
PID 1380 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\net.exe
PID 1380 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\net.exe
PID 1284 wrote to memory of 4808 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1284 wrote to memory of 4808 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1284 wrote to memory of 4808 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1380 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\cmd.exe
PID 1380 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\cmd.exe
PID 1380 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\SysWOW64\cmd.exe
PID 1380 wrote to memory of 5116 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\Logo1_.exe
PID 1380 wrote to memory of 5116 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\Logo1_.exe
PID 1380 wrote to memory of 5116 N/A C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe C:\Windows\Logo1_.exe
PID 5116 wrote to memory of 3916 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 5116 wrote to memory of 3916 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 5116 wrote to memory of 3916 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3916 wrote to memory of 4852 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3916 wrote to memory of 4852 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3916 wrote to memory of 4852 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4560 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe
PID 4560 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe
PID 5116 wrote to memory of 1648 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 5116 wrote to memory of 1648 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 5116 wrote to memory of 1648 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1648 wrote to memory of 1904 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1648 wrote to memory of 1904 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1648 wrote to memory of 1904 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 5116 wrote to memory of 3356 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 5116 wrote to memory of 3356 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe

"C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aABFF.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe

"C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 23.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
FR 142.250.178.138:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 138.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 72.239.69.13.in-addr.arpa udp

Files

memory/1380-0-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/5116-9-0x0000000000400000-0x000000000043F000-memory.dmp

memory/1380-10-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$aABFF.bat

MD5 39c8b12f51a9d55a320c016f6589da89
SHA1 9dcca504c73c861a0f1a09ba1c64def207087b47
SHA256 446f87fe866fdba0d842480b1414e5076667dd0d36b29412270eebfd1aa83256
SHA512 1004f32788291cba9d9ea218e4f3d8e6936b3f0391628c346ad70cb452f7dcc3387601f8e57f2ef3e3668d6d2926e90d7a07c248b2ff8b22a9aff41d83e760c6

C:\Users\Admin\AppData\Local\Temp\007161f7af5ed95fdaf2345fdd30c76518c70da3882a5e095dcdc9d9936bf113.exe.exe

MD5 9f498971cbe636662f3d210747d619e1
SHA1 44b8e2732fa1e2f204fc70eaa1cb406616250085
SHA256 8adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512 b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93

memory/5116-17-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\Program Files\StartPing.exe

MD5 3fc4c0ddb80fbdf5baf4d648b51c5908
SHA1 75f954426eb3e339ac101fca11b9fb9923953d58
SHA256 05a24ef5c0f85c7240b62055e5c31ba7f34c4ac8de2c1fcf50975044ec7912b9
SHA512 b11f4b8fc6bfd3e5ccb771c30aaa7a8ac43dcc7c28c3cddca0820df34b359f34ebba5a9542be187a65f72cdc45f7091b60543292098de1d4d2ef1a5871cbb885

memory/5116-65-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-96-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-259-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-429-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-734-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-1286-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-1629-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-2447-0x0000000000400000-0x000000000043F000-memory.dmp

memory/5116-5558-0x0000000000400000-0x000000000043F000-memory.dmp

C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

MD5 407d9e4c9bddf64762371463891b1006
SHA1 24b05da67f6d6a33807a74b43c728549a97ab7ba
SHA256 62816173c7319fdfd0ea73291bae772c6b116568b3ca2f71ae4268489ed29bb9
SHA512 7d74b2f03c6fef4d17b295e0541b8ab04d434918ef5c9bde4301b296cd1144fa2e6a0808297dbae38b9b232017e6fb457667e4fb3a655d02d9c4aee36aaae7ab

memory/5116-8221-0x0000000000400000-0x000000000043F000-memory.dmp