Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe
Resource
win10v2004-20240802-en
General
-
Target
fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe
-
Size
27KB
-
MD5
3bef880e03d2b1c8f6fc24362d07b4be
-
SHA1
ae621aeb03296a07404744121f4ef77da1223b1a
-
SHA256
fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f
-
SHA512
8ff63310d477391c053ab04472d80e87a8e5bf62fd3ceef41e5718f25b9304f92ceab89d2ad2054579a1b8778592520697532e12d56593a251007a45e3fd4655
-
SSDEEP
384:MM/D1Gt5M0zhIV/DZ3KZp7JcTO4yf9KFL/KaUUqd3qR+FlYTj9QTN0wpD9p5Cs:PD16GVRu1yK9fMFLKaTxsujCT7pZpY
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\T: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\R: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\Q: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\P: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\O: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\Y: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\V: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\J: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\I: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\E: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\L: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\K: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\S: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\N: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\X: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\W: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\H: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\G: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\Z: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened (read-only) \??\M: fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-gb\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\he-il\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\tr-tr\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\ThankYou\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pt-br\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\gl-ES\View3d\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\Location\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-PT\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\2.1.15\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\root\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ja-jp\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-il\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Sigma\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lt-LT\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ro-ro\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nl-nl\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fi-fi\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fi-fi\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Sounds\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-ma\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\Windows Defender\uk-UA\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\be-BY\View3d\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hi-IN\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ca-es\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\de-de\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-cn\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-gb\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3428 wrote to memory of 1840 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 83 PID 3428 wrote to memory of 1840 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 83 PID 3428 wrote to memory of 1840 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 83 PID 1840 wrote to memory of 4736 1840 net.exe 85 PID 1840 wrote to memory of 4736 1840 net.exe 85 PID 1840 wrote to memory of 4736 1840 net.exe 85 PID 3428 wrote to memory of 3400 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 55 PID 3428 wrote to memory of 3400 3428 fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe"C:\Users\Admin\AppData\Local\Temp\fb17571ebd54010b5449a86d1946c6e8d15a2ceacd0b90b17548116a6f60cd7f.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD57f6aa516b8cecf1c84da331cd1b09bc3
SHA19a8caecef817ca10437f9da1d3a06235a49bf655
SHA2562b29229026e08dfb0cce169db3aab96b9af78b53307c576eb8fce0d73aeb9c1e
SHA512eb32c070adf8663b288f042717c28d3c7763d7bf4d368446d4d2df695d805fec4227edf23b338f3913fe34684ba6e49a3ce74610c07ecd73be27581d55e9c871
-
Filesize
170KB
MD5cd5ee57c84812161496c497d451596fe
SHA16a8262ee3fb15882032407cf953e9186e0d0d5e2
SHA256ed2627189ed5debff731df4b134ac21ea51be986b3a696a323a25e0b3264af20
SHA51214289ad458d79ade088e938c2f716f95949fc7c1c16c2aaabf32a42168b4f9c755f96201a76e55a6a026cd5701d652057b1a9881127b8787b6c5f8a7dde9fa5c
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize637KB
MD59cba1e86016b20490fff38fb45ff4963
SHA1378720d36869d50d06e9ffeef87488fbc2a8c8f7
SHA256a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19
SHA5122f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765
-
Filesize
9B
MD5475984718232cf008bb73666d834f1f4
SHA112f23c9301c222f599a279e02a811d274d0f4abc
SHA256a5b32591119f87eb3c8a00c0c39e26ea6d6414aa9887d85fcb4903e1c14921b5
SHA51280235dc2560b7991d79f9550cdeca6ac02c00cee6bf186f8f20d4ff3fbd7718be937b73ab768d71c4027e153557b08bbfd95ea88d2e0857a7c70cf1da6fa9937