Malware Analysis Report

2025-06-15 20:08

Sample ID 240515-ncxp9aef8t
Target 29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb
SHA256 29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb
Tags
spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb

Threat Level: Shows suspicious behavior

The file 29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb was found to be: Shows suspicious behavior.

Malicious Activity Summary

spyware stealer

Deletes itself

Reads user/profile data of web browsers

Executes dropped EXE

Loads dropped DLL

Drops startup file

Enumerates connected drives

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Suspicious use of WriteProcessMemory

Runs net.exe

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-15 11:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 11:15

Reported

2024-05-15 11:18

Platform

win7-20240215-en

Max time kernel

150s

Max time network

117s

Command Line

C:\Windows\Explorer.EXE

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Media Player\wmlaunch.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Internet Explorer\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Mail\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2156 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\net.exe
PID 2156 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\net.exe
PID 2156 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\net.exe
PID 2156 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\net.exe
PID 2752 wrote to memory of 2984 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2752 wrote to memory of 2984 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2752 wrote to memory of 2984 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2752 wrote to memory of 2984 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2156 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 2156 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 2156 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 2156 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 2156 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\Logo1_.exe
PID 2156 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\Logo1_.exe
PID 2156 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\Logo1_.exe
PID 2156 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\Logo1_.exe
PID 2660 wrote to memory of 2768 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2660 wrote to memory of 2768 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2660 wrote to memory of 2768 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2660 wrote to memory of 2768 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2768 wrote to memory of 2700 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2768 wrote to memory of 2700 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2768 wrote to memory of 2700 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2768 wrote to memory of 2700 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2660 wrote to memory of 2408 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2660 wrote to memory of 2408 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2660 wrote to memory of 2408 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2660 wrote to memory of 2408 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2408 wrote to memory of 2480 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2408 wrote to memory of 2480 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2408 wrote to memory of 2480 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2408 wrote to memory of 2480 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2660 wrote to memory of 1204 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2660 wrote to memory of 1204 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe

"C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a17A6.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe

"C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2156-0-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a17A6.bat

MD5 292795780ba22f58981e5fd7d68d1a24
SHA1 0d8e77a24dabad9c0a258616c46716d39dfc66cc
SHA256 90ad3e9005a77f58e01f2704e6ff8a258227c61fc53ce0ae3083d3ff5b7c1292
SHA512 45de6383b26c69c45a0b67063461dcc85c81a24bab0040e894189b75f29b50c0e51ce8a3065bc3f0fef953249bd05c3002a84393464261f280612aa76fe44e08

memory/2156-17-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/2660-19-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe.exe

MD5 ba18e99b3e17adb5b029eaebc457dd89
SHA1 ec0458f3c00d35b323f08d4e1cc2e72899429c38
SHA256 f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628
SHA512 1f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c

memory/1204-27-0x0000000002550000-0x0000000002551000-memory.dmp

memory/2660-31-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 3ac7773258fe0684e8a28f3793a74ed3
SHA1 316fba91c21ea13e4576a5eeec832fd585c31ca0
SHA256 9f41dbbbdf4edcf63ba6262af0ae0d9a13874d0e008522af866f12f3e71b198f
SHA512 8d2647018107b940fe80b5ab979570b9f255764195976272b8c2ee8640b0e91493d5e7fa598b4ce29bda8f87cf495c6c71fd62734d51761b04bb5127eb5b2b4a

memory/2660-3322-0x0000000000400000-0x000000000043F000-memory.dmp

memory/2660-4141-0x0000000000400000-0x000000000043F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 11:15

Reported

2024-05-15 11:18

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

152s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ca-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\or_IN\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ru-ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Services\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-sl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Updates\Apply\FilesInUse\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\he-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_GB\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ca-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.29\MicrosoftEdgeComRegisterShellARM64.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3640 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\net.exe
PID 3640 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\net.exe
PID 3640 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\net.exe
PID 3856 wrote to memory of 1420 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3856 wrote to memory of 1420 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3856 wrote to memory of 1420 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3640 wrote to memory of 4388 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 3640 wrote to memory of 4388 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 3640 wrote to memory of 4388 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\SysWOW64\cmd.exe
PID 3640 wrote to memory of 4992 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\Logo1_.exe
PID 3640 wrote to memory of 4992 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\Logo1_.exe
PID 3640 wrote to memory of 4992 N/A C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe C:\Windows\Logo1_.exe
PID 4992 wrote to memory of 2544 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4992 wrote to memory of 2544 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4992 wrote to memory of 2544 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2544 wrote to memory of 5264 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2544 wrote to memory of 5264 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2544 wrote to memory of 5264 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4992 wrote to memory of 5316 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4992 wrote to memory of 5316 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4992 wrote to memory of 5316 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 5316 wrote to memory of 3396 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 5316 wrote to memory of 3396 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 5316 wrote to memory of 3396 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4992 wrote to memory of 3436 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 4992 wrote to memory of 3436 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe

"C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a46FC.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe

"C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 28.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
NL 23.62.61.72:443 www.bing.com tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 72.61.62.23.in-addr.arpa udp

Files

memory/3640-0-0x0000000000400000-0x000000000043F000-memory.dmp

memory/3640-8-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Windows\Logo1_.exe

MD5 341ec829f1445cfc22901ee3564a2407
SHA1 3b7d6d531808cf3d17f484d7984c5cbb2ae6d850
SHA256 f99b2ae8656781e1be65ad464d0472b39ca4fb48a31d9949ed12b0992390dc82
SHA512 1fd0ddca12d5b9cfc5ff6c5d3fb1bb5686a6a17e552f6af631ce019bd0f0fe194bd5770f96ad5af3226de91217c9715955d211145e373904b671cf75052da751

memory/4992-10-0x0000000000400000-0x000000000043F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a46FC.bat

MD5 f1625fe0cf22d3bd30071a59e9ef381e
SHA1 928e14782aa21897cb46d0c5687b6590d749d84f
SHA256 1b5dab3a79a15550e518f31fcd252a8dd283170ead443de703ac4ce67ff5dafd
SHA512 074499f84a59013765e439dc14bd210827e83ed38d1394b0926bd99cd791c0ff5e8592b9ad053ea051037d68125d30a252bdcd0fbfb40bd189921d5dfe181480

C:\Users\Admin\AppData\Local\Temp\29afbc7ec19c6c69386a4caf31c13dc18cf6932a58ff367185ef9d3edbf0dbfb.exe.exe

MD5 ba18e99b3e17adb5b029eaebc457dd89
SHA1 ec0458f3c00d35b323f08d4e1cc2e72899429c38
SHA256 f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628
SHA512 1f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c

memory/4992-17-0x0000000000400000-0x000000000043F000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-4018855536-2201274732-320770143-1000\_desktop.ini

MD5 9d187c446579e70f430c5bb5556efc0c
SHA1 0379a56b3d4a9e75d426a088cd523d01929186b2
SHA256 544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA512 6844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc

C:\Program Files\MeasureUndo.exe

MD5 64fe5e946eb14219cc147125b6b00983
SHA1 6d82df350099b04965265d9bf7cd85566a403694
SHA256 e4ae93d45f1015206776485b46f1fb7a68845c2810dc3c44c5788be773ee45fc
SHA512 d72cfe4221783aaa9acd115f35198c66dfb49f904e523d503d76190b4fd0ed38c46b8e08e3644b49da8c59325fae9adbd625292c94bc884217104370d7749d08

memory/4992-5220-0x0000000000400000-0x000000000043F000-memory.dmp

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 c0651f5f5ed8c9967b91a89a86cc4dc4
SHA1 6866b91667021c6cc7fd680451a5ea183dce3cd1
SHA256 d09336ea46c4c6e8b83dff2aa4bd31d9e993bcd572e6b274449adc5f9e51627d
SHA512 1cf7354f1b204415fd099c1fdaeecda5f0daec86948cee48da433d847d0ce94fee7fcf2365675868e82450891244b04902d730d6b0e0dfb5c29df1cd4b5d8ad6

memory/4992-8690-0x0000000000400000-0x000000000043F000-memory.dmp