Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe
Resource
win7-20240419-en
General
-
Target
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe
-
Size
491KB
-
MD5
b0a6bf8d8898dddb25f6b0da52379a4a
-
SHA1
5b76b473f09844579216683c6129fcdef25bac3b
-
SHA256
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272
-
SHA512
99469eb52f054e05bb22556d926ecafc34efd90ff63d13be11b6c78fd3279b5881c8c1092fb0855ad72d518b3b11e5325740c109e6fbaebcadd14310ca6f2eb7
-
SSDEEP
12288:73WFjV1gL5pRTcAkS/3hzN8qE43fm78V:73MI5jcAkSYqyE
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exeLogo1_.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exepid process 2520 Logo1_.exe 4228 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vreg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\PlatformCapabilities\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\0.2.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PROFILE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe File created C:\Windows\Logo1_.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exeLogo1_.exepid process 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exenet.exeLogo1_.exenet.execmd.exenet.exedescription pid process target process PID 1892 wrote to memory of 4480 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe net.exe PID 1892 wrote to memory of 4480 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe net.exe PID 1892 wrote to memory of 4480 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe net.exe PID 4480 wrote to memory of 2088 4480 net.exe net1.exe PID 4480 wrote to memory of 2088 4480 net.exe net1.exe PID 4480 wrote to memory of 2088 4480 net.exe net1.exe PID 1892 wrote to memory of 4372 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe cmd.exe PID 1892 wrote to memory of 4372 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe cmd.exe PID 1892 wrote to memory of 4372 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe cmd.exe PID 1892 wrote to memory of 2520 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe Logo1_.exe PID 1892 wrote to memory of 2520 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe Logo1_.exe PID 1892 wrote to memory of 2520 1892 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe Logo1_.exe PID 2520 wrote to memory of 620 2520 Logo1_.exe net.exe PID 2520 wrote to memory of 620 2520 Logo1_.exe net.exe PID 2520 wrote to memory of 620 2520 Logo1_.exe net.exe PID 620 wrote to memory of 1020 620 net.exe net1.exe PID 620 wrote to memory of 1020 620 net.exe net1.exe PID 620 wrote to memory of 1020 620 net.exe net1.exe PID 4372 wrote to memory of 4228 4372 cmd.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe PID 4372 wrote to memory of 4228 4372 cmd.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe PID 2520 wrote to memory of 4488 2520 Logo1_.exe net.exe PID 2520 wrote to memory of 4488 2520 Logo1_.exe net.exe PID 2520 wrote to memory of 4488 2520 Logo1_.exe net.exe PID 4488 wrote to memory of 4524 4488 net.exe net1.exe PID 4488 wrote to memory of 4524 4488 net.exe net1.exe PID 4488 wrote to memory of 4524 4488 net.exe net1.exe PID 2520 wrote to memory of 3500 2520 Logo1_.exe Explorer.EXE PID 2520 wrote to memory of 3500 2520 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a465F.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"4⤵
- Executes dropped EXE
PID:4228
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4524
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD5cbefb487013a821a8aca9e776cbb445d
SHA13db5126f2828bcaad9a87119bff85c26b330a343
SHA2567a7d7d4ab1b9b6ef6c3ac4584159fdcd4d9c396ee2c3e69983dcbd9075f55a32
SHA5120ab7923a2e2a41885476bd4edff31594736316af32a37a73e5da9b2e68b7d830005a554384b84688fca9cf1a6cd285295f21b7f67822f97f14a732159dddd9e4
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD53908c6f85096d094870328fabaebbe66
SHA19106bf68a43f77be7cb02afe73fe299b60961153
SHA256864b33d1d5b355ef42f7911c58ec7b33a902815bfbd69d73e7f304ce49ae7ef7
SHA5128ace41dd303c4a5a8caad76e99d3445f7a8e992bd0d74a5ab3e6afd5c5f2d2b52fbf8160d37dd412d9db4d8db018c62b0576975275dd0367dd19397c8b3463b1
-
Filesize
722B
MD565d1e11381db5c1edbb5251b39f2a716
SHA135b9314360bf3bd97977cb18621bb290297c557d
SHA2564cc644240cacd50e26ecd53ca5fa673f205875dad8c013ed8a910ea9a2aeaf74
SHA512aa2510facb6da460448915e7667782a6f8fcb883158e5efa258770e3c93d5b3f3934680195011973e12cb436630d2bd8c108e56555a1b6c0e78afdb8dc7fb652
-
C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
33KB
MD572524cf9b862c04eda809519e1ff803e
SHA131cb19b48f493554e3e8a6d8b8a41854698711e0
SHA256f602e3036944a0423d2c1fd94dea02cbd48e5f64bb346deddb8d8585c0cd2f94
SHA51266e3525b995b673f1b82d88679045379f18e16b10a53a00f4bef9175cb6980c4fce1eba62b92a9b6bb91752142572ee0f8ff3a1a317ddd7b7f7247e5d1059abb
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD5ef2876ec14bdb3dc085fc3af9311b015
SHA168b64b46b1ff0fdc9f009d8fffb8ee87c597fa56
SHA256ac2a34b4f2d44d19ca4269caf9f4e71cdb0b95ba8eb89ed52c5bc56eeeb1971c
SHA512c9998caa062ad5b1da853fabb80e88e41d9f96109af89df0309be20469ca8f5be9dd1c08f3c97030e3a487732e82304f60ee2627462e017579da4204bc163c8f