Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe
Resource
win7-20240903-en
General
-
Target
c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe
-
Size
285KB
-
MD5
7ddcb9f08defed78ade5024d31f1f920
-
SHA1
d2475d6350f94b1ec60e755d3aa46840abfba784
-
SHA256
c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f
-
SHA512
d811f60d9b3a92c370dbd5d8683661b4f32e7be0394e6c84ce9458d116de6f6466987b5b3f991c481007b01c7640b82a30854e5b60336ff07114b7e277d0fa19
-
SSDEEP
6144:Tl+aKMTi0+lfh+L5qe9T5q4GAFzWTBPMmC1UC6fOaU:Tl+aKMTi0uhMqe9ts2zWTpMmCG7W
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 3124 Logo1_.exe 3196 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\ADOMD.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\cef\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ca-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe File created C:\Windows\Logo1_.exe c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3628 wrote to memory of 2892 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 83 PID 3628 wrote to memory of 2892 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 83 PID 3628 wrote to memory of 2892 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 83 PID 2892 wrote to memory of 1288 2892 net.exe 85 PID 2892 wrote to memory of 1288 2892 net.exe 85 PID 2892 wrote to memory of 1288 2892 net.exe 85 PID 3628 wrote to memory of 4208 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 89 PID 3628 wrote to memory of 4208 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 89 PID 3628 wrote to memory of 4208 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 89 PID 3628 wrote to memory of 3124 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 91 PID 3628 wrote to memory of 3124 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 91 PID 3628 wrote to memory of 3124 3628 c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe 91 PID 3124 wrote to memory of 4440 3124 Logo1_.exe 93 PID 3124 wrote to memory of 4440 3124 Logo1_.exe 93 PID 3124 wrote to memory of 4440 3124 Logo1_.exe 93 PID 4440 wrote to memory of 2312 4440 net.exe 95 PID 4440 wrote to memory of 2312 4440 net.exe 95 PID 4440 wrote to memory of 2312 4440 net.exe 95 PID 4208 wrote to memory of 3196 4208 cmd.exe 96 PID 4208 wrote to memory of 3196 4208 cmd.exe 96 PID 4208 wrote to memory of 3196 4208 cmd.exe 96 PID 3124 wrote to memory of 752 3124 Logo1_.exe 97 PID 3124 wrote to memory of 752 3124 Logo1_.exe 97 PID 3124 wrote to memory of 752 3124 Logo1_.exe 97 PID 752 wrote to memory of 4576 752 net.exe 99 PID 752 wrote to memory of 4576 752 net.exe 99 PID 752 wrote to memory of 4576 752 net.exe 99 PID 3124 wrote to memory of 3480 3124 Logo1_.exe 55 PID 3124 wrote to memory of 3480 3124 Logo1_.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe"C:\Users\Admin\AppData\Local\Temp\c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6755.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe"C:\Users\Admin\AppData\Local\Temp\c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3196
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD52d550858ef40975332a11d37c322fd9d
SHA12b8dae63545cf5a8aeaa3db37b2e1fa67c3b43cc
SHA256b97690f24fe742ce51326dd520f580b5798c35e023c63fea6416a756c356a6b1
SHA512a46d8fabdaa99e2db4f8f3c2d88aafea655ef544cc2301466e8a09b0c626ea8aac2a9b382e938f90460044306c73005a1cf3f51e7c63dcf8e16f37ec570b49f6
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize643KB
MD529bab5fa7dbfd951e1c8290a8f4c2ba7
SHA17b86728d64cef9686bd45f2ff6fdc818c11a1bbb
SHA256dda333d8aed86ba750f669280e458ad2fb8d8ad5700a5fe0df584a1c818c481b
SHA5125bb37bffffe297653f91e0601f17b507659bcfe78567e6e1d10506d3c3bea737e7d6374224ecc01f421cff8f74b299eba8fe3152742b2b1c228966a630de1339
-
Filesize
722B
MD5b2c3a59da9ba75c6f5f89ef6224edf48
SHA11f65a99220c20c186ade9512015f03673f991a5e
SHA256fe3d81378d7ad88738e40a5bbcba1bab2196858223c8ce56c36e07951c87e72e
SHA51214f4a73b40b511c2db04db7cc415b4bc9ef36bbf381cf290a7ac0178b406b29140eb15c627e0c1c521ec71af19d25d88277c54e16ed3441a303ff66d223ff5a0
-
C:\Users\Admin\AppData\Local\Temp\c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f.exe.exe
Filesize252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
33KB
MD51c1a54d9be781116b0eeb13e29df2877
SHA127bf3d81ae73403cff58875a67d86e9cd4b83aea
SHA256b05922fc1a2cf17f5d94a22c68dfff012367469cfc4c601eeba26e9622de0308
SHA5127490c11f6e66164fe42a8bcc2488fb6d92d492b6eb7b1548d221fe61c9495cad8b740a613041c6bac91c4bc88d4c40155057c03315b5d4c7fe3241b37364703e
-
Filesize
8B
MD524cfb7e9169e3ecbcdf34395dff5aed0
SHA164061d8b0afd788fb3d2990e90e61f14010896dd
SHA256e11477f26e6139dabba6ad5dab927732c6a3785db78f82194ad7ae20323c6578
SHA512a315d4ab14f15f8df115e35134f0a1eff8018b0c35c5a0283928f2d3f3014215d683973b9aeba1bc74c49437cc929ea4e2fb847b4305da6d5abca235c750e299