Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe
Resource
win7-20240419-en
General
-
Target
afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe
-
Size
93KB
-
MD5
c8b1afddcc9d1b91f85265978ce9f364
-
SHA1
f04be173486ac4962e134e9fc474f093c636211b
-
SHA256
afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6
-
SHA512
b05f028b09526944735981684064387451f209655a744d3077e7dc8159ccb7396e8ae73f2b6457f675f796608650756dd2b70b93c25d0297a376a47606627ded
-
SSDEEP
1536:Jj4UaYzMXqtGN/CstC9qVFeyapmebn4ddJZeY86iLflLJYEIs67rxo:JPaY46tGNFC0VFDLK4ddJMY86ipmns6S
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exeLogo1_.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exeafea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exepid process 3736 Logo1_.exe 2972 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Program Files\Microsoft Office\Updates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\cef\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\uk-UA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe File created C:\Windows\Logo1_.exe afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exeLogo1_.exepid process 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe 3736 Logo1_.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exenet.exeLogo1_.exenet.execmd.exenet.exedescription pid process target process PID 2012 wrote to memory of 32 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe net.exe PID 2012 wrote to memory of 32 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe net.exe PID 2012 wrote to memory of 32 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe net.exe PID 32 wrote to memory of 4132 32 net.exe net1.exe PID 32 wrote to memory of 4132 32 net.exe net1.exe PID 32 wrote to memory of 4132 32 net.exe net1.exe PID 2012 wrote to memory of 4512 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe cmd.exe PID 2012 wrote to memory of 4512 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe cmd.exe PID 2012 wrote to memory of 4512 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe cmd.exe PID 2012 wrote to memory of 3736 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe Logo1_.exe PID 2012 wrote to memory of 3736 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe Logo1_.exe PID 2012 wrote to memory of 3736 2012 afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe Logo1_.exe PID 3736 wrote to memory of 408 3736 Logo1_.exe net.exe PID 3736 wrote to memory of 408 3736 Logo1_.exe net.exe PID 3736 wrote to memory of 408 3736 Logo1_.exe net.exe PID 408 wrote to memory of 3968 408 net.exe net1.exe PID 408 wrote to memory of 3968 408 net.exe net1.exe PID 408 wrote to memory of 3968 408 net.exe net1.exe PID 4512 wrote to memory of 2972 4512 cmd.exe afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe PID 4512 wrote to memory of 2972 4512 cmd.exe afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe PID 3736 wrote to memory of 2020 3736 Logo1_.exe net.exe PID 3736 wrote to memory of 2020 3736 Logo1_.exe net.exe PID 3736 wrote to memory of 2020 3736 Logo1_.exe net.exe PID 2020 wrote to memory of 2608 2020 net.exe net1.exe PID 2020 wrote to memory of 2608 2020 net.exe net1.exe PID 2020 wrote to memory of 2608 2020 net.exe net1.exe PID 3736 wrote to memory of 3500 3736 Logo1_.exe Explorer.EXE PID 3736 wrote to memory of 3500 3736 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe"C:\Users\Admin\AppData\Local\Temp\afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:4132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5EE9.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe"C:\Users\Admin\AppData\Local\Temp\afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe"4⤵
- Executes dropped EXE
PID:2972
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3968
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD548572b2d0c2ecfb094e561a12ea4f701
SHA1df2072cc57a533bb6764c155a193743d505d3878
SHA256ad5be370b1d5b27e5062b757adc88bac81b32e1916c015327ca3904672260abf
SHA51218fb9dd835dba80c40770c146c745088752b6ae33b598866c87ea83b2688381b95ed291fbf77f19b340e0ee39ae4c32017c11ac6ba633d52f016204f936555b7
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD53908c6f85096d094870328fabaebbe66
SHA19106bf68a43f77be7cb02afe73fe299b60961153
SHA256864b33d1d5b355ef42f7911c58ec7b33a902815bfbd69d73e7f304ce49ae7ef7
SHA5128ace41dd303c4a5a8caad76e99d3445f7a8e992bd0d74a5ab3e6afd5c5f2d2b52fbf8160d37dd412d9db4d8db018c62b0576975275dd0367dd19397c8b3463b1
-
Filesize
722B
MD5588a33e23b0982fe9545d9d2dbc69795
SHA19df258ef8c7dd3dd6e19f6ae593c853d82dfbe09
SHA2562a7d5e171f720d993a9e2c631526327c6077cfd4edf2369a9f82418a04e2a59d
SHA512cdc852c8212797572f798092887cde32f7544af4372ead188c3195d3d3b77f5ca080a22216e849fcae67da7fab95d3ef30cdfb35d2e48d51f51b30935b2fae0c
-
C:\Users\Admin\AppData\Local\Temp\afea313fd8adfe63248910d027d6a9a36c7f0adf9bba95c2ffabb9084990a4c6.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
33KB
MD572524cf9b862c04eda809519e1ff803e
SHA131cb19b48f493554e3e8a6d8b8a41854698711e0
SHA256f602e3036944a0423d2c1fd94dea02cbd48e5f64bb346deddb8d8585c0cd2f94
SHA51266e3525b995b673f1b82d88679045379f18e16b10a53a00f4bef9175cb6980c4fce1eba62b92a9b6bb91752142572ee0f8ff3a1a317ddd7b7f7247e5d1059abb
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD5ef2876ec14bdb3dc085fc3af9311b015
SHA168b64b46b1ff0fdc9f009d8fffb8ee87c597fa56
SHA256ac2a34b4f2d44d19ca4269caf9f4e71cdb0b95ba8eb89ed52c5bc56eeeb1971c
SHA512c9998caa062ad5b1da853fabb80e88e41d9f96109af89df0309be20469ca8f5be9dd1c08f3c97030e3a487732e82304f60ee2627462e017579da4204bc163c8f