Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 04:55
Static task
static1
Behavioral task
behavioral1
Sample
73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe
Resource
win7-20240704-en
General
-
Target
73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe
-
Size
33KB
-
MD5
820143c947ab5434bd7b8c34ba5dc5eb
-
SHA1
a5a2bf184cd3660354e5737bf3fce81b4ad48617
-
SHA256
73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff
-
SHA512
291081637d5f02a2b72d566ebca598b41f5eb080231923523b221f1e2a770341c1b73c3f3115c70018b30fef74e89738db4d670741a4eade1fadd9a5ca9e211e
-
SSDEEP
768:JTJYmMUElOIEvzMXqtwp/lDTJg/MFksCRsd2u9C9MFWoVaZel:JT/aYzMXqtGN/CstC9qVF
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\T: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\R: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\L: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\H: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\G: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\E: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\V: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\S: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\Q: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\J: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\Y: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\X: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\W: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\P: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\N: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\M: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\K: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\I: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\U: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened (read-only) \??\O: 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-tw\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\it-it\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\da-dk\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sv-se\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\de-de\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\he-il\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fi-fi\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\cs-cz\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nl-nl\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ro-ro\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\es-es\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pl-pl\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sk-sk\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sl-si\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hr-hr\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\1033\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ar-ae\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pl-pl\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pl-pl\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\es-es\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-si\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ca-es\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\eu-es\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-ma\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\_desktop.ini 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe File created C:\Windows\Dll.dll 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4496 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 84 PID 4664 wrote to memory of 4496 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 84 PID 4664 wrote to memory of 4496 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 84 PID 4496 wrote to memory of 1072 4496 net.exe 86 PID 4496 wrote to memory of 1072 4496 net.exe 86 PID 4496 wrote to memory of 1072 4496 net.exe 86 PID 4664 wrote to memory of 1280 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 90 PID 4664 wrote to memory of 1280 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 90 PID 4664 wrote to memory of 1280 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 90 PID 1280 wrote to memory of 3840 1280 net.exe 92 PID 1280 wrote to memory of 3840 1280 net.exe 92 PID 1280 wrote to memory of 3840 1280 net.exe 92 PID 4664 wrote to memory of 3396 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 56 PID 4664 wrote to memory of 3396 4664 73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe"C:\Users\Admin\AppData\Local\Temp\73141311c62e269e0c546e341d6c30030defdc3c2d893b0bcb36e77c0ca144ff.exe"2⤵
- Drops file in Drivers directory
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1072
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD547fc6287d9f8df8fe8022bf7161dccac
SHA1eb50ec09e29b34825c6a13b981dbd2bf8853bca1
SHA25695006f2d1a361f3c3265eb6636365da84af51cad00bd36e093b9aafafc74e6ef
SHA51254cc4c49c41d28ea9047258981c41003b400d3bac3851f000e40a5ca65d6e7802100c9deed5faad4bd9d144bf1fb643070fe368a7ce7382d0ba07f0f1c0c774b
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD50eec0543603f7a8ce8e8f5fee478e1d2
SHA1f975d2b0358d8f138bdbaa04e433d85297f29c2f
SHA256636c1c024e59354f13d9bb02fa8f3849112c4557ab790a37146b1c121e597b24
SHA512cbcd9919c79180c43d588c27107dd04c04378da47df03cb27f072ee296e9c23a7690e3196b457dda14bcac96a38617f597c83a47a813a58c813f3affbd6a2a05
-
Filesize
9B
MD51368e4d784ef82633de86fa6bc6e37f9
SHA177c7384e886b27647bb4f2fd364e7947e7b6abc6
SHA25657507bed6cf91d70e66bd4cc287634889ef30b648cb7c44a4edec0e2cb68b772
SHA5123cb7168e776eb564768e30eba43174014a85108ab306a7c07a1522fb42173c381a5bff9ac10944fd345dd5308061cbe2878c60d1e878f8768281c1adcf5dd85b