Malware Analysis Report

2024-11-15 06:35

Sample ID 240604-a3ds6sfh83
Target 5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc
SHA256 5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc
Tags
spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc

Threat Level: Shows suspicious behavior

The file 5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc was found to be: Shows suspicious behavior.

Malicious Activity Summary

spyware stealer

Drops startup file

Deletes itself

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Enumerates connected drives

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-04 00:43

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-04 00:43

Reported

2024-06-04 00:46

Platform

win7-20240508-en

Max time kernel

149s

Max time network

119s

Command Line

C:\Windows\Explorer.EXE

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2140 wrote to memory of 1712 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\net.exe
PID 2140 wrote to memory of 1712 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\net.exe
PID 2140 wrote to memory of 1712 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\net.exe
PID 2140 wrote to memory of 1712 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\net.exe
PID 1712 wrote to memory of 1276 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1712 wrote to memory of 1276 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1712 wrote to memory of 1276 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1712 wrote to memory of 1276 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2140 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\cmd.exe
PID 2140 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\cmd.exe
PID 2140 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\cmd.exe
PID 2140 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\cmd.exe
PID 2140 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\Logo1_.exe
PID 2140 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\Logo1_.exe
PID 2140 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\Logo1_.exe
PID 2140 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\Logo1_.exe
PID 2740 wrote to memory of 2540 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2740 wrote to memory of 2540 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2740 wrote to memory of 2540 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2740 wrote to memory of 2540 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2644 wrote to memory of 1396 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe
PID 2644 wrote to memory of 1396 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe
PID 2644 wrote to memory of 1396 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe
PID 2644 wrote to memory of 1396 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe
PID 2540 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2540 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2540 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2540 wrote to memory of 2568 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2740 wrote to memory of 2772 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2740 wrote to memory of 2772 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2740 wrote to memory of 2772 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2740 wrote to memory of 2772 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2772 wrote to memory of 2776 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2772 wrote to memory of 2776 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2772 wrote to memory of 2776 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2772 wrote to memory of 2776 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2740 wrote to memory of 1196 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2740 wrote to memory of 1196 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe

"C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1999.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe

"C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2140-0-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a1999.bat

MD5 3f3b51c63c14ee592360045156f61549
SHA1 296039d00b5cc1a6e4f2cc0f6f6582351c767c2b
SHA256 ef8861701f4e1a743785be6d72d5e3f5e5fc6481671e04a95c1b22efb1c7bc7b
SHA512 3f1aee9b5ecd496f55255f9cac4aa9e21d3116da15a91bf7ee835a018fc54d7717b4977f568135c90aba58911930e7e6fd953ec29eb2d71041ceca018b944a67

memory/2140-17-0x0000000000400000-0x000000000043D000-memory.dmp

memory/2740-18-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Windows\Logo1_.exe

MD5 005782dec3941236334d871c5153fbf3
SHA1 c973a6811e47002ccb7c48911cf58d9b0f15c990
SHA256 def563a72f35ff1bd5d55bb4d8db6b098975b14f9f0a1e6c099415dda5887103
SHA512 235604f421d5596f55f22ce59116a6975c527b433c26630c8a0aed7089710a9b4a781db2eae71eb93e7917ed4cf154554bbf37fa2ea4c7c0aaaa7737d96f2933

C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe.exe

MD5 40ac62c087648ccc2c58dae066d34c98
SHA1 0e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256 482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA512 0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

memory/1196-27-0x0000000002E00000-0x0000000002E01000-memory.dmp

memory/2740-31-0x0000000000400000-0x000000000043D000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-3691908287-3775019229-3534252667-1000\_desktop.ini

MD5 378d822ce12583d0d584184af22d1d77
SHA1 c062ac770b028df6db676099e02f09fc2f77b171
SHA256 1ad01f8e46c86dfa34468e306eabe54b58d56134130b53ea7677961e3baaf6c7
SHA512 23cf7b916de734c6bb6fd3b2beee21f3e82bc95e93d8662dca818d7cf13602706f22671dce61388b2a7e0b613c07c70512331c4132759b16cf438cb1750bc397

memory/2740-3026-0x0000000000400000-0x000000000043D000-memory.dmp

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 5e54b5419052a6321d15fe6088be5258
SHA1 420003c0ad68fa2b977bee9e2ca2d1a53f8f1ec2
SHA256 142a70f95c82ea8acba8d3550273a20411a5b82f6d1b1c9657db51c3f83d5d97
SHA512 6d2d2025ed17d6f730d3fbb3a5549e60cfe951c7d9e0063f4ecca045ee28a375eac11fb9aa9cc484b181369165a0f7abae967807bad16aac0e4b60b7a8092f71

memory/2740-4133-0x0000000000400000-0x000000000043D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-04 00:43

Reported

2024-06-04 00:46

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

141s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\fr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\5DE348A7-D1AB-4F5E-935D-8A3992E6EB3E\root\vfs\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\it-it\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ca-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.29\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\tr-tr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Uninstall Information\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jfr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\da-dk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3748 wrote to memory of 4444 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\net.exe
PID 3748 wrote to memory of 4444 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\net.exe
PID 3748 wrote to memory of 4444 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\net.exe
PID 4444 wrote to memory of 2448 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4444 wrote to memory of 2448 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4444 wrote to memory of 2448 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3748 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\cmd.exe
PID 3748 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\cmd.exe
PID 3748 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\SysWOW64\cmd.exe
PID 3748 wrote to memory of 4388 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\Logo1_.exe
PID 3748 wrote to memory of 4388 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\Logo1_.exe
PID 3748 wrote to memory of 4388 N/A C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe C:\Windows\Logo1_.exe
PID 4388 wrote to memory of 1272 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4388 wrote to memory of 1272 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4388 wrote to memory of 1272 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1940 wrote to memory of 1120 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe
PID 1940 wrote to memory of 1120 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe
PID 1272 wrote to memory of 60 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1272 wrote to memory of 60 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1272 wrote to memory of 60 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4388 wrote to memory of 4384 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4388 wrote to memory of 4384 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4388 wrote to memory of 4384 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4384 wrote to memory of 4448 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4384 wrote to memory of 4448 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4384 wrote to memory of 4448 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4388 wrote to memory of 3440 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 4388 wrote to memory of 3440 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe

"C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3FC8.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe

"C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp

Files

memory/3748-0-0x0000000000400000-0x000000000043D000-memory.dmp

memory/3748-8-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Windows\Logo1_.exe

MD5 005782dec3941236334d871c5153fbf3
SHA1 c973a6811e47002ccb7c48911cf58d9b0f15c990
SHA256 def563a72f35ff1bd5d55bb4d8db6b098975b14f9f0a1e6c099415dda5887103
SHA512 235604f421d5596f55f22ce59116a6975c527b433c26630c8a0aed7089710a9b4a781db2eae71eb93e7917ed4cf154554bbf37fa2ea4c7c0aaaa7737d96f2933

memory/4388-10-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a3FC8.bat

MD5 657cb6f79835d370b8b19696f90e5163
SHA1 bc2c363331b2c5439a121059f7bdbe6ac36fabca
SHA256 d31ef7d0d5e0450bcf6a3719c2305f5255441ed5e4fd42c1ce0e8291657ef873
SHA512 7824ce2bdfc36f615001cbb6a07dd09b16b7adbfe4d424f4af95d68cb9444b9675d533898c95b97c272fb47b9a67961b18d4bb0a09863fc11732e0b763b7ec43

C:\Users\Admin\AppData\Local\Temp\5628df40dadaa39660521577b549537c23e129593a7584c55c008f62f7f6efdc.exe.exe

MD5 40ac62c087648ccc2c58dae066d34c98
SHA1 0e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256 482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA512 0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

memory/4388-17-0x0000000000400000-0x000000000043D000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-1162180587-977231257-2194346871-1000\_desktop.ini

MD5 378d822ce12583d0d584184af22d1d77
SHA1 c062ac770b028df6db676099e02f09fc2f77b171
SHA256 1ad01f8e46c86dfa34468e306eabe54b58d56134130b53ea7677961e3baaf6c7
SHA512 23cf7b916de734c6bb6fd3b2beee21f3e82bc95e93d8662dca818d7cf13602706f22671dce61388b2a7e0b613c07c70512331c4132759b16cf438cb1750bc397

C:\Program Files\7-Zip\7z.exe

MD5 447c2cc1d1c31d3beda8c37c6ea8fb29
SHA1 9aee3aeb7b734fcbce6483f0c127897a34229a21
SHA256 9f1cf772de334ec803a4d6da70c9ae0a2b5028f75ee2e3cdc52a10b09ad1b854
SHA512 31cb45cbeb908247e1de671de35363e032cd40276d564bed3fd305fd8c87c9f4476bdd39563978cb1854e28f180499654d5ab5b98aa6c6762674b0df8ac4f05d

memory/4388-3291-0x0000000000400000-0x000000000043D000-memory.dmp

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 9363a720e098b38389b25a7b18cfbcdd
SHA1 7b5e835b22262b47e6042e7aadecc67dac05f7db
SHA256 10579b661dade8697f252204f241952eb2029ea6978165f9336fd60a72b3205e
SHA512 564b873358ebe4d4d194b924e9934cb5c1666df901db2556e8cbab8276f8c4380a5bee157cc8eb2063fe0f48a1d0dc1cf339d3d3040d764c974e1c46b0870f88

memory/4388-8649-0x0000000000400000-0x000000000043D000-memory.dmp