Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe
Resource
win7-20240903-en
General
-
Target
733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe
-
Size
33KB
-
MD5
ac4d54500ddcf012f66bc5ba7530beb1
-
SHA1
375bfcd1b95696f4b1c5f93dd5621e5c16fcda98
-
SHA256
733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09
-
SHA512
076bddcb1a579a43ec3714f9396a2b3836bcb86d469c9df56b9bbc94aaf1330069c97c75081e5414faf2160b8904f357fa823c40273e64c8278059c760fa974a
-
SSDEEP
768:KBRO5RroZJ76739sBWs69a7zKHOrEz+mKLtOWD:Kfe+Zk78UKUW
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\H: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\E: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\Q: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\P: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\O: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\M: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\L: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\Y: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\G: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\Z: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\W: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\V: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\T: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\N: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\I: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\X: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\U: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\S: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\R: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened (read-only) \??\J: 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\it-it\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Windows NT\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\Microsoft Office\root\Integration\Addons\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files\Microsoft Office 15\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\css\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\cs-cz\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ko-kr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pt-br\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ko-kr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-cn\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\cs-cz\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app-api\dev\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ar-ae\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\es-es\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\uk-ua\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nb-no\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ko-kr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\zh-tw\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\eu-es\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-gb\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\tr-tr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Google\Update\Download\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Internet Explorer\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-ae\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ko-kr\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\uk-ua\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\eu-es\_desktop.ini 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe File created C:\Windows\Dll.dll 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4228 wrote to memory of 3888 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 83 PID 4228 wrote to memory of 3888 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 83 PID 4228 wrote to memory of 3888 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 83 PID 3888 wrote to memory of 4308 3888 net.exe 85 PID 3888 wrote to memory of 4308 3888 net.exe 85 PID 3888 wrote to memory of 4308 3888 net.exe 85 PID 4228 wrote to memory of 1580 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 89 PID 4228 wrote to memory of 1580 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 89 PID 4228 wrote to memory of 1580 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 89 PID 1580 wrote to memory of 3844 1580 net.exe 91 PID 1580 wrote to memory of 3844 1580 net.exe 91 PID 1580 wrote to memory of 3844 1580 net.exe 91 PID 4228 wrote to memory of 3568 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 56 PID 4228 wrote to memory of 3568 4228 733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe"C:\Users\Admin\AppData\Local\Temp\733b97920694040cf31888669d75229717b34c0e0fe892d10bb5421f0879fc09.exe"2⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:3844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD56bb9d7b6949c25cc2312bcd71b8e4f91
SHA196d199177506b8cc560fbc5bddca9473e9444bbb
SHA256c9b0a0f3da1d9d659f8f1e9fd23403be58b04a4e96c1ee5bab96b7fd84aee5d6
SHA5129eab4cff5138c8d1409e97cb80dd88a190c6984591a15a3c6bef094ecab16856deeee19daba78b34b3b1a27ebf70a487196f3c6d92e4e9645c036b8f4d42e92d
-
Filesize
176KB
MD573d3829bda7873aad89b3e12ffc97f9a
SHA1064bf3c8014ab716ec387ff53e377a4947442604
SHA256c229f2008c8101c7f6490694af2c8eb538c6c2abea578d74d4a94d18243f6111
SHA512155b6fefbd4c8caa59f551f266954941e21b9badf4f493d122ff96a7d937cfcb2cfeb8194890c95487f85ceeffd4bf31c1b313e409afee027ff5bca4b083ee13
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize643KB
MD529bab5fa7dbfd951e1c8290a8f4c2ba7
SHA17b86728d64cef9686bd45f2ff6fdc818c11a1bbb
SHA256dda333d8aed86ba750f669280e458ad2fb8d8ad5700a5fe0df584a1c818c481b
SHA5125bb37bffffe297653f91e0601f17b507659bcfe78567e6e1d10506d3c3bea737e7d6374224ecc01f421cff8f74b299eba8fe3152742b2b1c228966a630de1339
-
Filesize
8B
MD55d65d1288c9ecedfd5f28d17a01a30bc
SHA1e5bb89b8ad5c73516abf7e3baeaf1855154381dc
SHA2563501728ad227b52ce4d4f85ddd0e6d28dfa7acce977ae27f1e337be209825a5f
SHA5126177ce001dd535382c3bae5e8c3cfda85d8d8b76b68bce10fa8e5e1e748fd1512a531ffc93fef1316f2c27d93b5b4a5b60a6391f0e131ccc5cc0a65c2755868e