Malware Analysis Report

2025-06-15 20:08

Sample ID 240515-nck2fseh33
Target 8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4
SHA256 8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4
Tags
spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4

Threat Level: Shows suspicious behavior

The file 8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4 was found to be: Shows suspicious behavior.

Malicious Activity Summary

spyware stealer

Drops startup file

Deletes itself

Loads dropped DLL

Reads user/profile data of web browsers

Executes dropped EXE

Enumerates connected drives

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Suspicious use of WriteProcessMemory

Runs net.exe

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 11:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 11:15

Reported

2024-05-15 11:17

Platform

win7-20240419-en

Max time kernel

150s

Max time network

126s

Command Line

C:\Windows\Explorer.EXE

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Internet Explorer\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\7-Zip\Lang\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Internet Explorer\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft.NET\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Uninstall Information\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft.NET\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2820 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\net.exe
PID 2820 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\net.exe
PID 2820 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\net.exe
PID 2820 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\net.exe
PID 2032 wrote to memory of 2988 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2032 wrote to memory of 2988 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2032 wrote to memory of 2988 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2032 wrote to memory of 2988 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2820 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\cmd.exe
PID 2820 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\cmd.exe
PID 2820 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\cmd.exe
PID 2820 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\cmd.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\Logo1_.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\Logo1_.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\Logo1_.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\Logo1_.exe
PID 2668 wrote to memory of 2328 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2668 wrote to memory of 2328 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2668 wrote to memory of 2328 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2668 wrote to memory of 2328 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2576 wrote to memory of 2740 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe
PID 2576 wrote to memory of 2740 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe
PID 2576 wrote to memory of 2740 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe
PID 2576 wrote to memory of 2740 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe
PID 2328 wrote to memory of 2756 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2328 wrote to memory of 2756 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2328 wrote to memory of 2756 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2328 wrote to memory of 2756 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2668 wrote to memory of 2696 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2668 wrote to memory of 2696 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2668 wrote to memory of 2696 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2668 wrote to memory of 2696 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2696 wrote to memory of 2464 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2696 wrote to memory of 2464 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2696 wrote to memory of 2464 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2696 wrote to memory of 2464 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2668 wrote to memory of 1196 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2668 wrote to memory of 1196 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe

"C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a202E.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe

"C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2820-0-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a202E.bat

MD5 3f96aa3384adde8708f78d2a335e7fbb
SHA1 5c88186d95e5d108c86463d10e6a74de769770f5
SHA256 f329bb8feb8ab621554a208232a0c804c199b6b403e71710c10eb8ed72f4ed7d
SHA512 b405db03dffd1bad09e6a69b7f6525e4e33094a733c872baa9be9bcea88ca2ad4ab8db326932d237a04ff1111a24bbc71c78bf7cd2d3541b3a0dfef1cc6f950c

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/2668-18-0x0000000000400000-0x000000000043F000-memory.dmp

memory/2820-17-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe.exe

MD5 40ac62c087648ccc2c58dae066d34c98
SHA1 0e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256 482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA512 0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

memory/1196-27-0x0000000002580000-0x0000000002581000-memory.dmp

memory/2668-31-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-481678230-3773327859-3495911762-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 3ac7773258fe0684e8a28f3793a74ed3
SHA1 316fba91c21ea13e4576a5eeec832fd585c31ca0
SHA256 9f41dbbbdf4edcf63ba6262af0ae0d9a13874d0e008522af866f12f3e71b198f
SHA512 8d2647018107b940fe80b5ab979570b9f255764195976272b8c2ee8640b0e91493d5e7fa598b4ce29bda8f87cf495c6c71fd62734d51761b04bb5127eb5b2b4a

memory/2668-3343-0x0000000000400000-0x000000000043F000-memory.dmp

memory/2668-4176-0x0000000000400000-0x000000000043F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 11:15

Reported

2024-05-15 11:17

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

128s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.187.37\MicrosoftEdgeComRegisterShellARM64.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\dark\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ENES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Photo Viewer\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Google\Temp\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ar-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-sl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\copilot_provider_msix\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Cultures\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nb-no\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Templates\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Multimedia Platform\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\eu-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.187.37\MicrosoftEdgeUpdateCore.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\it-it\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-sl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sl-sl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\dtplugin\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\EBWebView\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\PublicAssemblies\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1060 wrote to memory of 224 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\net.exe
PID 1060 wrote to memory of 224 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\net.exe
PID 1060 wrote to memory of 224 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\net.exe
PID 224 wrote to memory of 2764 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 224 wrote to memory of 2764 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 224 wrote to memory of 2764 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1060 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\cmd.exe
PID 1060 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\cmd.exe
PID 1060 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\SysWOW64\cmd.exe
PID 1060 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\Logo1_.exe
PID 1060 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\Logo1_.exe
PID 1060 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe C:\Windows\Logo1_.exe
PID 2428 wrote to memory of 3092 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2428 wrote to memory of 3092 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2428 wrote to memory of 3092 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4408 wrote to memory of 5104 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe
PID 4408 wrote to memory of 5104 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe
PID 3092 wrote to memory of 2600 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3092 wrote to memory of 2600 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3092 wrote to memory of 2600 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2428 wrote to memory of 1236 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2428 wrote to memory of 1236 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2428 wrote to memory of 1236 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1236 wrote to memory of 2592 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1236 wrote to memory of 2592 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1236 wrote to memory of 2592 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2428 wrote to memory of 3472 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2428 wrote to memory of 3472 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe

"C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aEE57.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe

"C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4168,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4316 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 28.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 95.16.208.104.in-addr.arpa udp

Files

memory/1060-0-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/1060-10-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$aEE57.bat

MD5 9ec4f25727e532c77c5249029eb877ff
SHA1 0deaa6b7e19ae955efe91dd15cedaa82c3cf43f5
SHA256 89474d5f6673244910fda04c1965c917246e8e683db9255e3d6e6956e273eb5a
SHA512 138f19be8a442b545d6a11cef1421e82c8b92b70fe2005778962a028ac9b4808d2dd288d63ba3cd9bf500268d0afd29481d99378b375000d5a52c5b1edb5fb00

C:\Users\Admin\AppData\Local\Temp\8709a4ecf6b4134700d57e0788c16969e8dfa3b977cad561c2f53f49829fbda4.exe.exe

MD5 40ac62c087648ccc2c58dae066d34c98
SHA1 0e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256 482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA512 0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

memory/2428-17-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-1181767204-2009306918-3718769404-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\Program Files\7-Zip\7z.exe

MD5 20307acbf355d7d7204aea6d3b02a782
SHA1 2e2a1fabd856207be414b8717131d04581d6514a
SHA256 ebf6cdf9f57f2f50c05ade8511c8ea0e1b775891cea9e4fa081e58624e5b3007
SHA512 4b27b30e22ee94f23a82ceca0d0fc00970e25f654b9736d14b1b78d8e64039189f7d772351f1ace71a34d337b8e00994a238a8edc0bc25672af19a07d253fbaf

memory/2428-5267-0x0000000000400000-0x000000000043F000-memory.dmp

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 c0651f5f5ed8c9967b91a89a86cc4dc4
SHA1 6866b91667021c6cc7fd680451a5ea183dce3cd1
SHA256 d09336ea46c4c6e8b83dff2aa4bd31d9e993bcd572e6b274449adc5f9e51627d
SHA512 1cf7354f1b204415fd099c1fdaeecda5f0daec86948cee48da433d847d0ce94fee7fcf2365675868e82450891244b04902d730d6b0e0dfb5c29df1cd4b5d8ad6

memory/2428-9091-0x0000000000400000-0x000000000043F000-memory.dmp