Analysis
-
max time kernel
149s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe
Resource
win7-20240708-en
General
-
Target
9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe
-
Size
164KB
-
MD5
8ec91fc6bf847cf20018483ae9a62497
-
SHA1
2dfb3d334833d3a7ca2025e37746e38f6e3e4fe8
-
SHA256
9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6
-
SHA512
4049d932563c5b75733bca3c6a6c087b8128e3d666c98a2e63a062fed624abaaaca2c905c05e424604dc626d6e371697d13d00e1bf2f4437f2f2417019c18299
-
SSDEEP
3072:BGhfZ4ZHUI899djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:ohMHyYWBW1Wu3rOOuOVr8
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 1840 Logo1_.exe 2540 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\uk-ua\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe File created C:\Windows\Logo1_.exe 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe 1840 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 2540 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1408 wrote to memory of 740 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 84 PID 1408 wrote to memory of 740 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 84 PID 1408 wrote to memory of 740 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 84 PID 740 wrote to memory of 3172 740 net.exe 86 PID 740 wrote to memory of 3172 740 net.exe 86 PID 740 wrote to memory of 3172 740 net.exe 86 PID 1408 wrote to memory of 2004 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 90 PID 1408 wrote to memory of 2004 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 90 PID 1408 wrote to memory of 2004 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 90 PID 1408 wrote to memory of 1840 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 91 PID 1408 wrote to memory of 1840 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 91 PID 1408 wrote to memory of 1840 1408 9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe 91 PID 1840 wrote to memory of 2968 1840 Logo1_.exe 93 PID 1840 wrote to memory of 2968 1840 Logo1_.exe 93 PID 1840 wrote to memory of 2968 1840 Logo1_.exe 93 PID 2004 wrote to memory of 2540 2004 cmd.exe 95 PID 2004 wrote to memory of 2540 2004 cmd.exe 95 PID 2968 wrote to memory of 4752 2968 net.exe 96 PID 2968 wrote to memory of 4752 2968 net.exe 96 PID 2968 wrote to memory of 4752 2968 net.exe 96 PID 1840 wrote to memory of 4488 1840 Logo1_.exe 97 PID 1840 wrote to memory of 4488 1840 Logo1_.exe 97 PID 1840 wrote to memory of 4488 1840 Logo1_.exe 97 PID 4488 wrote to memory of 4864 4488 net.exe 100 PID 4488 wrote to memory of 4864 4488 net.exe 100 PID 4488 wrote to memory of 4864 4488 net.exe 100 PID 1840 wrote to memory of 3548 1840 Logo1_.exe 56 PID 1840 wrote to memory of 3548 1840 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe"C:\Users\Admin\AppData\Local\Temp\9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8935.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe"C:\Users\Admin\AppData\Local\Temp\9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD55342b57842074900a2479ecc31b0c887
SHA1a059b6ed9a47faa806d7dc33f158fd014feeb526
SHA256991c5be6f687a53532b633e3c33a0781ca1a7903648823e96c65b86861672f25
SHA512d1c0a3aa0e9f2d421dbfea1ca50d4879b6d666dc34e0f3894d763aded3d1258472fad2bf9370de6eb3bf52c46a246425519365e0c3cade178cdfb1e377f73345
-
Filesize
577KB
MD5b275b1350fca950358cfbc9abb0d5238
SHA1c76500b05acf1788dd7ebea6a1cbcc3bed816ed2
SHA256c058c96c5ea79103b1a97ed87ac8a7a298d9bb393da87158ea8aaad44c336f69
SHA512d53c5411f0387dafbb0bb7c2a935952b4d37e3e766ba378d6f475b255eb0e0c7117f18d894af3f3395538526a9a9720f508abaa7b2c25eebfa2ca8c5e29b602e
-
Filesize
722B
MD545b3c7d4a7cd6b146ef6da973984ee88
SHA19dc80849d6fc9d130904f42f2c94bc0368330eea
SHA2565b6e3dd615e50ac547efa7748de0592400d4d75cd3442fcc1f7ab4f258666b81
SHA5120ce244b6d7de2de3893dd52475d527fa8380047c94323d29f8ae5c52762784b29a0de7f0ed325961447fe8f0e6413be08c05f1a02b0c0b6982f966a9c59a06d1
-
C:\Users\Admin\AppData\Local\Temp\9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6.exe.exe
Filesize131KB
MD516438a96a8adb85472ca72da04701b29
SHA1b1f5ee8bc083804de4de820255107f6541c84735
SHA2569291cd97d2f1b119438f16e97ea75119f19fd959ec5414e84b337530d692e289
SHA51258f659a29cb34245a261b7666b1cda4b76f2df1039f3713dda6ff5a97c33b4cc273b110d10b4131a6a5c13897efcfa9a5ef3031e0e5fb14db1adc0ac1ef25dcd
-
Filesize
33KB
MD59a635d7742531770203f6f2410d8a57d
SHA17b268f2e70322d4e58ef582f47a972438662357e
SHA25693d3872020dc715ef5310a2ae5a00fc97f421c54150ef022383b28ce039a5211
SHA5129fb2aefd4f9b9214f9b5cce5e7f604886992cf5b035c440ab0a2402497127e989b1f3200ded74679caa08b5c9c72f276ee186742ad86838e3265c26ee307963f
-
Filesize
9B
MD59810b812fea5407a7c6a6b912eab6de9
SHA1653710a103c34c6d87e85d547de48561b1579927
SHA256497dc92fb09ed6740a1e704ddf5f45daf1d330f0977aaf1142604be15753e7ef
SHA512a23126d1624a391a08931a8f98ec9c26bc5bbe75de0f111bcdbf17b5bbe9bc6e748ca58e52c96fb9ea80509d5ad1c90bf1d92e472b08b2532321106ba1aca2cd