Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe
Resource
win7-20240221-en
General
-
Target
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe
-
Size
717KB
-
MD5
dd37d9a76c03c9a2801542308a37d27e
-
SHA1
eaf5d0c872de895c96b655ad30384618a0d9c1d1
-
SHA256
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6
-
SHA512
283930fb99a34aa881da0fa91e8761f79515507cf7551fd6c84cc17aafff5542ae002729734b80dc6a113092b58cb0fbf1c4df408d10cb3da73704e93e9901f9
-
SSDEEP
12288:73WFjJfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:73M9LOS2opPIXV
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exeLogo1_.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exepid process 1396 Logo1_.exe 4652 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ku_IQ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Multimedia Platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe File created C:\Windows\Logo1_.exe 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exeLogo1_.exepid process 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exenet.exeLogo1_.execmd.exenet.exenet.exedescription pid process target process PID 1088 wrote to memory of 4204 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe net.exe PID 1088 wrote to memory of 4204 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe net.exe PID 1088 wrote to memory of 4204 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe net.exe PID 4204 wrote to memory of 3448 4204 net.exe net1.exe PID 4204 wrote to memory of 3448 4204 net.exe net1.exe PID 4204 wrote to memory of 3448 4204 net.exe net1.exe PID 1088 wrote to memory of 4008 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe cmd.exe PID 1088 wrote to memory of 4008 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe cmd.exe PID 1088 wrote to memory of 4008 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe cmd.exe PID 1088 wrote to memory of 1396 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe Logo1_.exe PID 1088 wrote to memory of 1396 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe Logo1_.exe PID 1088 wrote to memory of 1396 1088 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe Logo1_.exe PID 1396 wrote to memory of 1316 1396 Logo1_.exe net.exe PID 1396 wrote to memory of 1316 1396 Logo1_.exe net.exe PID 1396 wrote to memory of 1316 1396 Logo1_.exe net.exe PID 4008 wrote to memory of 4652 4008 cmd.exe 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe PID 4008 wrote to memory of 4652 4008 cmd.exe 2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe PID 1316 wrote to memory of 684 1316 net.exe net1.exe PID 1316 wrote to memory of 684 1316 net.exe net1.exe PID 1316 wrote to memory of 684 1316 net.exe net1.exe PID 1396 wrote to memory of 1092 1396 Logo1_.exe net.exe PID 1396 wrote to memory of 1092 1396 Logo1_.exe net.exe PID 1396 wrote to memory of 1092 1396 Logo1_.exe net.exe PID 1092 wrote to memory of 4152 1092 net.exe net1.exe PID 1092 wrote to memory of 4152 1092 net.exe net1.exe PID 1092 wrote to memory of 4152 1092 net.exe net1.exe PID 1396 wrote to memory of 3408 1396 Logo1_.exe Explorer.EXE PID 1396 wrote to memory of 3408 1396 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4C4B.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe"4⤵
- Executes dropped EXE
PID:4652
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4152
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD5cbefb487013a821a8aca9e776cbb445d
SHA13db5126f2828bcaad9a87119bff85c26b330a343
SHA2567a7d7d4ab1b9b6ef6c3ac4584159fdcd4d9c396ee2c3e69983dcbd9075f55a32
SHA5120ab7923a2e2a41885476bd4edff31594736316af32a37a73e5da9b2e68b7d830005a554384b84688fca9cf1a6cd285295f21b7f67822f97f14a732159dddd9e4
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD53908c6f85096d094870328fabaebbe66
SHA19106bf68a43f77be7cb02afe73fe299b60961153
SHA256864b33d1d5b355ef42f7911c58ec7b33a902815bfbd69d73e7f304ce49ae7ef7
SHA5128ace41dd303c4a5a8caad76e99d3445f7a8e992bd0d74a5ab3e6afd5c5f2d2b52fbf8160d37dd412d9db4d8db018c62b0576975275dd0367dd19397c8b3463b1
-
Filesize
722B
MD5e4f97d432d6458bbf24b71d7e12abd33
SHA1c8df24c18d2cb2ac3eaa7193a2507d4bdc697624
SHA256b01e3109f9f4f40561507a7a2e4d52a7806bc38a9da66e7fc0f716a70b5e5af0
SHA512e13a8e8f323d9590620b67af09ebc08d0e4fd1eb880d3d2a316668825a6aef68f58445da2c118931bf1457a49e3c8ed205b2b3e9c8812c297a66d3afe401c37f
-
C:\Users\Admin\AppData\Local\Temp\2fd451fbf077a9d908988cdde0a783329956f18ba1817401a037ae21508019a6.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
33KB
MD572524cf9b862c04eda809519e1ff803e
SHA131cb19b48f493554e3e8a6d8b8a41854698711e0
SHA256f602e3036944a0423d2c1fd94dea02cbd48e5f64bb346deddb8d8585c0cd2f94
SHA51266e3525b995b673f1b82d88679045379f18e16b10a53a00f4bef9175cb6980c4fce1eba62b92a9b6bb91752142572ee0f8ff3a1a317ddd7b7f7247e5d1059abb
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD5ef2876ec14bdb3dc085fc3af9311b015
SHA168b64b46b1ff0fdc9f009d8fffb8ee87c597fa56
SHA256ac2a34b4f2d44d19ca4269caf9f4e71cdb0b95ba8eb89ed52c5bc56eeeb1971c
SHA512c9998caa062ad5b1da853fabb80e88e41d9f96109af89df0309be20469ca8f5be9dd1c08f3c97030e3a487732e82304f60ee2627462e017579da4204bc163c8f