Malware Analysis Report

2025-06-15 20:08

Sample ID 240515-ncngkseh35
Target 0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283
SHA256 0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283
Tags
spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283

Threat Level: Shows suspicious behavior

The file 0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283 was found to be: Shows suspicious behavior.

Malicious Activity Summary

spyware stealer

Deletes itself

Loads dropped DLL

Reads user/profile data of web browsers

Executes dropped EXE

Drops startup file

Enumerates connected drives

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Runs net.exe

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 11:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 11:15

Reported

2024-05-15 11:17

Platform

win7-20240215-en

Max time kernel

149s

Max time network

120s

Command Line

C:\Windows\Explorer.EXE

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Services\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2700 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\net.exe
PID 2700 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\net.exe
PID 2700 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\net.exe
PID 2700 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\net.exe
PID 2612 wrote to memory of 2376 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2612 wrote to memory of 2376 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2612 wrote to memory of 2376 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2612 wrote to memory of 2376 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2700 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\cmd.exe
PID 2700 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\cmd.exe
PID 2700 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\cmd.exe
PID 2700 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\cmd.exe
PID 2700 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\Logo1_.exe
PID 2700 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\Logo1_.exe
PID 2700 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\Logo1_.exe
PID 2700 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\Logo1_.exe
PID 2644 wrote to memory of 2436 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2644 wrote to memory of 2436 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2644 wrote to memory of 2436 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2644 wrote to memory of 2436 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2436 wrote to memory of 2872 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2436 wrote to memory of 2872 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2436 wrote to memory of 2872 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2436 wrote to memory of 2872 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2648 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe
PID 2648 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe
PID 2648 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe
PID 2648 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe
PID 2644 wrote to memory of 2432 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2644 wrote to memory of 2432 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2644 wrote to memory of 2432 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2644 wrote to memory of 2432 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2432 wrote to memory of 2496 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2432 wrote to memory of 2496 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2432 wrote to memory of 2496 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2432 wrote to memory of 2496 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2644 wrote to memory of 1184 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2644 wrote to memory of 1184 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe

"C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$aD88.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe

"C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2700-0-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$aD88.bat

MD5 532df9ae6ac304b3d810e61a33a34dab
SHA1 db74501728d5efc7bd74a1a90e4554377cd0d855
SHA256 c9011555cf90286add8c0e85df05d3f079d270685d65ca1afce7b7e002d1eac2
SHA512 4e77a548db00a842ae6968a3b6434fc08af4beaa8db4337de38d2a3910bd5ad3dee4ccaa185b24f8c6024711b2d8b12babdafdbbb76f45adb0caf67c5469ed14

memory/2700-17-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/2644-19-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe.exe

MD5 50f289df0c19484e970849aac4e6f977
SHA1 3dc77c8830836ab844975eb002149b66da2e10be
SHA256 b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512 877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

memory/1184-29-0x0000000002E40000-0x0000000002E41000-memory.dmp

memory/2644-32-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 3ac7773258fe0684e8a28f3793a74ed3
SHA1 316fba91c21ea13e4576a5eeec832fd585c31ca0
SHA256 9f41dbbbdf4edcf63ba6262af0ae0d9a13874d0e008522af866f12f3e71b198f
SHA512 8d2647018107b940fe80b5ab979570b9f255764195976272b8c2ee8640b0e91493d5e7fa598b4ce29bda8f87cf495c6c71fd62734d51761b04bb5127eb5b2b4a

memory/2644-3323-0x0000000000400000-0x000000000043F000-memory.dmp

memory/2644-4142-0x0000000000400000-0x000000000043F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 11:15

Reported

2024-05-15 11:17

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

106s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-gb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\ja-jp\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hr-hr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\it-it\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedgewebview2.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\host\fxr\7.0.16\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Defender\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_platform_specific\win_x64\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\WidevineCdm\_platform_specific\win_x64\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\en-us\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ru-ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Internet Explorer\uk-UA\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\tr-tr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Media Player\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ko-kr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Filters\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pt-br\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3348 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\net.exe
PID 3348 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\net.exe
PID 3348 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\net.exe
PID 1592 wrote to memory of 1364 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1592 wrote to memory of 1364 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1592 wrote to memory of 1364 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3348 wrote to memory of 4636 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\cmd.exe
PID 3348 wrote to memory of 4636 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\cmd.exe
PID 3348 wrote to memory of 4636 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\SysWOW64\cmd.exe
PID 3348 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\Logo1_.exe
PID 3348 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\Logo1_.exe
PID 3348 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe C:\Windows\Logo1_.exe
PID 2576 wrote to memory of 3748 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2576 wrote to memory of 3748 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2576 wrote to memory of 3748 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3748 wrote to memory of 208 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3748 wrote to memory of 208 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3748 wrote to memory of 208 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4636 wrote to memory of 1620 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe
PID 4636 wrote to memory of 1620 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe
PID 2576 wrote to memory of 1164 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2576 wrote to memory of 1164 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2576 wrote to memory of 1164 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1164 wrote to memory of 2584 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1164 wrote to memory of 2584 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1164 wrote to memory of 2584 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2576 wrote to memory of 3516 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2576 wrote to memory of 3516 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe

"C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3E8F.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe

"C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/3348-0-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/2576-11-0x0000000000400000-0x000000000043F000-memory.dmp

memory/3348-10-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a3E8F.bat

MD5 074defcf295d3935c1d61368da72ff0c
SHA1 427ffe5bd2993d9bb960be04f880fd061d87be52
SHA256 3fbac8e21242d4a8501fef2c30f399d58840afbec92756e2fe22d8aa89041603
SHA512 fd31162f61a629eadadc4475103d3e4a1547229d742979956cb7e35f15b7bfeb6573cf83e9f5ba512ce51f17cded8109b099c6cb8f7477a496ff7eee68b69977

C:\Users\Admin\AppData\Local\Temp\0acf07cd7c376dea6a667f03aa2f5e0032baa84e6c5d0c89c7012dcb00993283.exe.exe

MD5 50f289df0c19484e970849aac4e6f977
SHA1 3dc77c8830836ab844975eb002149b66da2e10be
SHA256 b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512 877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38

memory/2576-18-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-711569230-3659488422-571408806-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\Program Files\7-Zip\7z.exe

MD5 20307acbf355d7d7204aea6d3b02a782
SHA1 2e2a1fabd856207be414b8717131d04581d6514a
SHA256 ebf6cdf9f57f2f50c05ade8511c8ea0e1b775891cea9e4fa081e58624e5b3007
SHA512 4b27b30e22ee94f23a82ceca0d0fc00970e25f654b9736d14b1b78d8e64039189f7d772351f1ace71a34d337b8e00994a238a8edc0bc25672af19a07d253fbaf

memory/2576-3283-0x0000000000400000-0x000000000043F000-memory.dmp

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 c0651f5f5ed8c9967b91a89a86cc4dc4
SHA1 6866b91667021c6cc7fd680451a5ea183dce3cd1
SHA256 d09336ea46c4c6e8b83dff2aa4bd31d9e993bcd572e6b274449adc5f9e51627d
SHA512 1cf7354f1b204415fd099c1fdaeecda5f0daec86948cee48da433d847d0ce94fee7fcf2365675868e82450891244b04902d730d6b0e0dfb5c29df1cd4b5d8ad6

memory/2576-8704-0x0000000000400000-0x000000000043F000-memory.dmp