Malware Analysis Report

2025-08-10 12:31

Sample ID 240527-sagcpshc37
Target 59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e
SHA256 59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e
Tags
spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e

Threat Level: Shows suspicious behavior

The file 59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e was found to be: Shows suspicious behavior.

Malicious Activity Summary

spyware stealer

Deletes itself

Executes dropped EXE

Drops startup file

Loads dropped DLL

Reads user/profile data of web browsers

Enumerates connected drives

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Runs net.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-27 14:55

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-27 14:55

Reported

2024-05-27 14:57

Platform

win7-20240221-en

Max time kernel

150s

Max time network

118s

Command Line

C:\Windows\Explorer.EXE

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\java.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre7\lib\jfr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2164 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\net.exe
PID 2164 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\net.exe
PID 2164 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\net.exe
PID 2164 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\net.exe
PID 2120 wrote to memory of 2536 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2120 wrote to memory of 2536 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2120 wrote to memory of 2536 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2120 wrote to memory of 2536 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2164 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\Logo1_.exe
PID 2164 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\Logo1_.exe
PID 2164 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\Logo1_.exe
PID 2164 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\Logo1_.exe
PID 2528 wrote to memory of 2660 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2528 wrote to memory of 2660 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2528 wrote to memory of 2660 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2528 wrote to memory of 2660 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2660 wrote to memory of 2860 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2660 wrote to memory of 2860 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2660 wrote to memory of 2860 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2660 wrote to memory of 2860 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2500 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe
PID 2500 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe
PID 2500 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe
PID 2500 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe
PID 2528 wrote to memory of 1868 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2528 wrote to memory of 1868 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2528 wrote to memory of 1868 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2528 wrote to memory of 1868 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1868 wrote to memory of 2424 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1868 wrote to memory of 2424 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1868 wrote to memory of 2424 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1868 wrote to memory of 2424 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2528 wrote to memory of 1192 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2528 wrote to memory of 1192 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe

"C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a2923.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe

"C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2164-0-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a2923.bat

MD5 e9f9541799ad76146d2c71bae7892fba
SHA1 6b8bd8b7683577dc5210e970f4e02d063723b2c1
SHA256 55b200a8b738eac7693f9527870151a3fe56b57d34799cd046dfe5c12b8dfa7a
SHA512 1025f7ef084faa68b16b519cc9a4002da4500bf4b59281ab30dc5a0bae65df865d6ba331b171e61b23d4b1288ac8edf82e4ad9115aef8613894a4d05e12e6ae6

C:\Windows\Logo1_.exe

MD5 a0b93ff728f6114ae0074a2b4a5bcd47
SHA1 e795935cb0e0cb344e27bda4899f238a77af6258
SHA256 45d9f916a1fa961daa8391edf289e7a0d76f055af591c873f7b9215b9c2224cb
SHA512 0ef7dc4a992dae6fe8b59addbafebdf1cc1d2fdf13b33a4e09d0740718bb61d2a8ccfd19eb505e00f119bfe266fac800a0dc541d2d5eefe29ea68cc693619160

memory/2164-17-0x0000000000400000-0x000000000043D000-memory.dmp

memory/2528-19-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe.exe

MD5 4f4608dd4d3246360a9c53b14d4e3ad7
SHA1 8774ebd330496951e156d3fd08170f1e14c76401
SHA256 0e886c735baf30f4a7c9f91751fc631624c0ded01b76d9570aa26f2289a28c8e
SHA512 07c635e9469934274481d7158f422e3d3483ab06e50658697edd0f133dfbf5096c04605fe3ce50a8215a0c6ace3c6b5123bd6b76b36d004b1ef3b9cc26b1225c

memory/1192-28-0x0000000002D80000-0x0000000002D81000-memory.dmp

memory/2528-31-0x0000000000400000-0x000000000043D000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\_desktop.ini

MD5 fa1e1ef0fdda97877a13339b28fa95e5
SHA1 7e2cffca41118e7b2d62963bd940630b15b85653
SHA256 968b715c081472526487d60da8968e9b3bde2dac103f69beb3f6abe6ef7bc191
SHA512 3d55913a97aa89a7201342705640c1d031d19ad8aca4939219067f84e3fe118f47b4e388f490f69f605683d3854425c3de188f731886405474ae8e3d42c86f4f

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 b0f0ba2ced2322f9b443c020b49aba8e
SHA1 91b3403975535602f6efea9706c4cc8d8b4c10b5
SHA256 708c46a3f135edb785d489050463c9e5acb5f96c089577eb2f806438b4da6a12
SHA512 9e96244b2f2a4370055ad8bc6600452921bc6cb7766457fc8d700938ca620d2e6722aa2bab8f97ff562a9bc4f54ff70a6de05614a7e781742be78ab32586952f

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 a64e221e7aa252d2cafadf779e374ad0
SHA1 5043394894c490e1964e52918ac6648359046dbc
SHA256 a183bc22f75dc7df2202c1d3100d4e20ca73028a03dff5b81a5864de0fedcad0
SHA512 ed60c60a6897a7744ae96ac4a783b18ab8925edcd66e4155dc48b8f56f252f521649d59f35b1680856e30e0aed3d0dad62acd39148cccf7779706467b57f0283

memory/2528-3282-0x0000000000400000-0x000000000043D000-memory.dmp

memory/2528-4093-0x0000000000400000-0x000000000043D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-27 14:55

Reported

2024-05-27 14:57

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

125s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-tw\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\legal\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre8\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Defender\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\WindowsPowerShell\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nb-no\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\libs\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\he-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ko-kr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\da-dk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-gb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\DEEPBLUE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\kn\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\rhp\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ro-ro\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4608 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\net.exe
PID 4608 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\net.exe
PID 4608 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\net.exe
PID 5092 wrote to memory of 4956 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 5092 wrote to memory of 4956 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 5092 wrote to memory of 4956 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4608 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\cmd.exe
PID 4608 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\cmd.exe
PID 4608 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\SysWOW64\cmd.exe
PID 4608 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\Logo1_.exe
PID 4608 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\Logo1_.exe
PID 4608 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe C:\Windows\Logo1_.exe
PID 2252 wrote to memory of 3864 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2252 wrote to memory of 3864 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2252 wrote to memory of 3864 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3864 wrote to memory of 576 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3864 wrote to memory of 576 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3864 wrote to memory of 576 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2520 wrote to memory of 3772 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe
PID 2520 wrote to memory of 3772 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe
PID 2252 wrote to memory of 4192 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2252 wrote to memory of 4192 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2252 wrote to memory of 4192 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4192 wrote to memory of 3304 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4192 wrote to memory of 3304 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4192 wrote to memory of 3304 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2252 wrote to memory of 3580 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2252 wrote to memory of 3580 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe

"C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8EF2.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe

"C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 45.19.74.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/4608-0-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Windows\Logo1_.exe

MD5 a0b93ff728f6114ae0074a2b4a5bcd47
SHA1 e795935cb0e0cb344e27bda4899f238a77af6258
SHA256 45d9f916a1fa961daa8391edf289e7a0d76f055af591c873f7b9215b9c2224cb
SHA512 0ef7dc4a992dae6fe8b59addbafebdf1cc1d2fdf13b33a4e09d0740718bb61d2a8ccfd19eb505e00f119bfe266fac800a0dc541d2d5eefe29ea68cc693619160

memory/4608-10-0x0000000000400000-0x000000000043D000-memory.dmp

memory/2252-11-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a8EF2.bat

MD5 42fe68e779aa5cddaec174196402edbe
SHA1 9c40af5f9934ab0bfcfe61218af1601581f5a55a
SHA256 7436dff0a7249de5b051b2f251c3342b89edbd0a8b1847ec19bee85e4c97f063
SHA512 f777ae38a652c956b27f2d2bf0c205fbb2a7076d6130a828c58c087c6a8e79316eba6c630839567102e84099090d00e04fdd301b9a9551c397e80d0a3ead1ce6

C:\Users\Admin\AppData\Local\Temp\59e62592a1b00c92c45bcfb318d6b7cf0e2efb5840474944410a62954d78283e.exe.exe

MD5 4f4608dd4d3246360a9c53b14d4e3ad7
SHA1 8774ebd330496951e156d3fd08170f1e14c76401
SHA256 0e886c735baf30f4a7c9f91751fc631624c0ded01b76d9570aa26f2289a28c8e
SHA512 07c635e9469934274481d7158f422e3d3483ab06e50658697edd0f133dfbf5096c04605fe3ce50a8215a0c6ace3c6b5123bd6b76b36d004b1ef3b9cc26b1225c

memory/2252-18-0x0000000000400000-0x000000000043D000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\_desktop.ini

MD5 fa1e1ef0fdda97877a13339b28fa95e5
SHA1 7e2cffca41118e7b2d62963bd940630b15b85653
SHA256 968b715c081472526487d60da8968e9b3bde2dac103f69beb3f6abe6ef7bc191
SHA512 3d55913a97aa89a7201342705640c1d031d19ad8aca4939219067f84e3fe118f47b4e388f490f69f605683d3854425c3de188f731886405474ae8e3d42c86f4f

C:\Program Files\BlockGroup.exe

MD5 10ad5bd47db9536ccda61725397bff84
SHA1 83c3753fb524d380558c137706eb9dcb2ef12f97
SHA256 5c1a41021234b87def340f5ba83ec3b12d6163238c1731b15e7b16a7f11a636d
SHA512 358f8dbbcfbed2fae4bfc91d38c98e51a483a5f0eeb75c4808f3e3530da377ca147d903f5c5a1351ae3f32da483042078f129d90adfe882934340d5a1d6d4917

memory/2252-3217-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 b0f0ba2ced2322f9b443c020b49aba8e
SHA1 91b3403975535602f6efea9706c4cc8d8b4c10b5
SHA256 708c46a3f135edb785d489050463c9e5acb5f96c089577eb2f806438b4da6a12
SHA512 9e96244b2f2a4370055ad8bc6600452921bc6cb7766457fc8d700938ca620d2e6722aa2bab8f97ff562a9bc4f54ff70a6de05614a7e781742be78ab32586952f

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 7ffaf51fff2639d8923d04179f9314bb
SHA1 0b0294941f7748cb7d9762cb5bb6bfab00f6547c
SHA256 b0595af7730af742eb37282aa3146d5c399279c2305b8e9c81ffcbb825824913
SHA512 02b5bcb3e254084c755e7211f7abc4387b9b5eb4ea900c5cbaee69e749cfc95c074cf8389e7e18e2895d8ed145e50e042d00c2cc0433d0275f383101a2930572

memory/2252-8642-0x0000000000400000-0x000000000043D000-memory.dmp