Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe
Resource
win7-20240704-en
General
-
Target
48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe
-
Size
11.1MB
-
MD5
7135d7c900dd00c4667123138b426040
-
SHA1
cb3d1bf4c8363f7727de0588bb3c609e76149630
-
SHA256
48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4
-
SHA512
3e534fc754afaa8e00e886363f4f28b286a5888056fa4536eb0f0fd33816e2391aa5e803aaf1641a6e34238551c113c398c39574d35d119e1535df22225193fe
-
SSDEEP
98304:8b+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz9Y:2+kIGv3y/x+KTbfjJ+kdnAlejY
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 3 IoCs
pid Process 2572 Logo1_.exe 3796 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 3732 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\swidtag\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STRTEDGE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe File created C:\Windows\Logo1_.exe 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe 2572 Logo1_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3796 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3796 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4852 wrote to memory of 1260 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 84 PID 4852 wrote to memory of 1260 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 84 PID 4852 wrote to memory of 1260 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 84 PID 1260 wrote to memory of 4392 1260 net.exe 87 PID 1260 wrote to memory of 4392 1260 net.exe 87 PID 1260 wrote to memory of 4392 1260 net.exe 87 PID 4852 wrote to memory of 1672 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 90 PID 4852 wrote to memory of 1672 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 90 PID 4852 wrote to memory of 1672 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 90 PID 4852 wrote to memory of 2572 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 92 PID 4852 wrote to memory of 2572 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 92 PID 4852 wrote to memory of 2572 4852 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 92 PID 2572 wrote to memory of 5088 2572 Logo1_.exe 93 PID 2572 wrote to memory of 5088 2572 Logo1_.exe 93 PID 2572 wrote to memory of 5088 2572 Logo1_.exe 93 PID 1672 wrote to memory of 3796 1672 cmd.exe 95 PID 1672 wrote to memory of 3796 1672 cmd.exe 95 PID 5088 wrote to memory of 2420 5088 net.exe 96 PID 5088 wrote to memory of 2420 5088 net.exe 96 PID 5088 wrote to memory of 2420 5088 net.exe 96 PID 3796 wrote to memory of 3732 3796 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 97 PID 3796 wrote to memory of 3732 3796 48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe 97 PID 2572 wrote to memory of 1904 2572 Logo1_.exe 101 PID 2572 wrote to memory of 1904 2572 Logo1_.exe 101 PID 2572 wrote to memory of 1904 2572 Logo1_.exe 101 PID 1904 wrote to memory of 4608 1904 net.exe 103 PID 1904 wrote to memory of 4608 1904 net.exe 103 PID 1904 wrote to memory of 4608 1904 net.exe 103 PID 2572 wrote to memory of 3580 2572 Logo1_.exe 56 PID 2572 wrote to memory of 3580 2572 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe"C:\Users\Admin\AppData\Local\Temp\48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBF87.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe"C:\Users\Admin\AppData\Local\Temp\48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe"C:\Users\Admin\AppData\Local\Temp\48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe" --type=collab-renderer --proc=37965⤵
- Executes dropped EXE
PID:3732
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5cd7d05171d468d967fffbb89347be613
SHA144e0ed558530a96b6489b11990e1b04d46eda699
SHA25625fff69c58779b78bdff60bf25e0396ed487e48dee610833f7427ca293721019
SHA512d9c534f48901f1a70772d06aa1ad119d08e1a6efc8c10f17a7be2a9d76711a3caaaea15da089546ed01cb8c4a4315868bc80dd0dff3567a19f430f8b155256ac
-
Filesize
320KB
MD568f94a2c96aee4c468243e8327532937
SHA1e80cbb31d7e92a365695eedbbcf5bc33ec1bbb0c
SHA25629716855747208ae812f6b31423b8c120240fe566e39bced268ce2aa6b22f324
SHA512161c055e5284d10f4ad74a5c6c14585cf35e853d98af8096c2d626782ed9b572a16f2940a1740e89fe4ceeff52eb5e955c4e259241486911222778d492b1498b
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize643KB
MD5c08994604c02bf7431e4c46295a779d5
SHA17f526582e292083589253bbc8b2cd093b2229ff2
SHA256218bfecab8804a634b05ebcedc30eab7aa8fa8ed5775495ba9545517c311f00e
SHA51213d9b746d0fe6922ecff9b5bf0ac896a63da11610341d4a7701e2a8d8fc5c0511d7bd9f4f54d3756b770998601b4f7b39b7e5c36d824dd42470fb0b499065c34
-
Filesize
722B
MD54540731953f4661370c8a5cfa36981b7
SHA1c205e16c5f50c4663f60264368a064242602b6b0
SHA2561198119b813267a87f824a67fc5f30882d7f6e0545350290c0991b5695ff7063
SHA5121db36da9dd06919aaf4150cdfe37312cd868508dcb4aa37779c9a10dd20ed7c471ce781341f93bd9b4f97c4808efe3d6bc79d3ecedc190bc32a830d524b84a32
-
C:\Users\Admin\AppData\Local\Temp\48e391322c45ee17fedb3390043bc585ba06404c471537ce61fcaee9bd3c2dd4.exe.exe
Filesize11.0MB
MD5b45b7bd6eb92c5b65378d8d0a0964747
SHA15ca6f198ac83c90496110259b57ff4a5f47b64bb
SHA2565f1d9218f9735a763ffecc47c7b6f0c342b7f1a5da835733e0b3b73903f864a0
SHA512bde39c4b6d04caae8280bdd53e6036c53ed394a72f0d4d1273c149175570e8a87f87c8963869c96834fef7e82893da38c49ce4aaa1851e65c055dbbcac7c1708
-
Filesize
33KB
MD5acc875481830dccdda351ec15db601bb
SHA1f03af1ee9a3368c71b0d46586d700ce1d39fe9bb
SHA256ac544e154655a153a03c5f3dd52645c30d12c3ba6886c8b037663694748491ab
SHA512e2564a8a9e7a8ddb78bc7541d0648c2b42185e7c06b63145a07f50871435f97cd6c691180e4ad900646a4a4a936981b6685934f6d289d6f013bca1ff975f1336
-
Filesize
9B
MD5ece8e24737d1957fb4e94d8890ee8d02
SHA16c79bfb99f560a2102a903116f5a0c195f7885e4
SHA256d920366b3c62a677cf0cf1f267a7c2f3dd693f2ff60ee023091bf9c39c5e30b8
SHA512ccf58b4da1ad1379a546f307bca8dc4452a61a3cb443814f4d9566b8d8d35cc9d794ada4d1a13296ed5bc0248ba5ef538e5dc5e22861c2ead3f479beeb5c2d37