Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe
Resource
win7-20240221-en
General
-
Target
25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe
-
Size
33KB
-
MD5
54bf44306953a5b6f406e5540e60c7b4
-
SHA1
5252474cc785229e8b958668a72650a1d5777a4d
-
SHA256
25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45
-
SHA512
17e48d33e3012ae8790af9677434dbbad419c6876388c4b4c9e7178d582e7967b63b5107a85e5a4062656241006c1d6d8d5183f0e20b1a3aa2cb6eff5abf176f
-
SSDEEP
768:JIm84UElOIEvzMXqtwp/lDTJg/MFksCRsd2u9C9MFWoVaZel:JZ84UaYzMXqtGN/CstC9qVF
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\H: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\E: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\W: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\V: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\R: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\O: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\J: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\X: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\P: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\M: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\L: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\I: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\G: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\Z: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\Y: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\U: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\T: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\S: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\Q: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened (read-only) \??\N: 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe File created C:\Windows\Dll.dll 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2724 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 28 PID 2452 wrote to memory of 2724 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 28 PID 2452 wrote to memory of 2724 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 28 PID 2452 wrote to memory of 2724 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 28 PID 2724 wrote to memory of 2460 2724 net.exe 30 PID 2724 wrote to memory of 2460 2724 net.exe 30 PID 2724 wrote to memory of 2460 2724 net.exe 30 PID 2724 wrote to memory of 2460 2724 net.exe 30 PID 2452 wrote to memory of 2956 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 31 PID 2452 wrote to memory of 2956 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 31 PID 2452 wrote to memory of 2956 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 31 PID 2452 wrote to memory of 2956 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 31 PID 2956 wrote to memory of 2628 2956 net.exe 33 PID 2956 wrote to memory of 2628 2956 net.exe 33 PID 2956 wrote to memory of 2628 2956 net.exe 33 PID 2956 wrote to memory of 2628 2956 net.exe 33 PID 2452 wrote to memory of 1192 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 21 PID 2452 wrote to memory of 1192 2452 25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe"C:\Users\Admin\AppData\Local\Temp\25ba409f54719204b0cc95c4f522e39892c2cf19acb35df862bf9c47556c1c45.exe"2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2460
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717KB
MD518a06ed778227002721e5aab99f6d815
SHA1f4b40dab1e43c5040e5e7e470f5c5f137f33d553
SHA2567b9c638f8cc97eca9a750fe32211de5cc5366b1e319dd3ffbbd7a0a038b3209b
SHA512e2c1c8a31396f3ccd1b4e0d34e04d11703b1c72452cbaf5bde32536d0e34ff338d4740c33c68c5c6020d21dd172b3619e6716bb470f19447de78aa5e09cff752
-
Filesize
478KB
MD5e3ed025983edd3f0811b528d691f5aad
SHA1d4dba9af05f4499e9b7b9152b4b79fdc392fea0e
SHA256baabdc56c507e1820de6caf9cfd27eb3298c955fe5725460cfb9b2e833546005
SHA512f0c40858619b35c307a55ecb3647645717a05fc229dcf3af6562720305a38b4ed2e7f4000a50ba44d2644173a1c99c8781859236f497c4d79437d19043914567
-
Filesize
9B
MD5ef2876ec14bdb3dc085fc3af9311b015
SHA168b64b46b1ff0fdc9f009d8fffb8ee87c597fa56
SHA256ac2a34b4f2d44d19ca4269caf9f4e71cdb0b95ba8eb89ed52c5bc56eeeb1971c
SHA512c9998caa062ad5b1da853fabb80e88e41d9f96109af89df0309be20469ca8f5be9dd1c08f3c97030e3a487732e82304f60ee2627462e017579da4204bc163c8f