Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe
Resource
win7-20240708-en
General
-
Target
f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe
-
Size
717KB
-
MD5
2233607fd7b1ba5067a3f69f88c2d715
-
SHA1
cf8a0ae2d350d17e5c0c52b37a06749b06c62022
-
SHA256
f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81
-
SHA512
4eb96bd98a1478022f107f705ba3f71f8479f2621d037563faee97c64645640d8bfb39b27ea6b567166b93527159c04c56319396687388b3e6a6a659405a096f
-
SSDEEP
12288:23WFjJfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:23M9LOS2opPIXV
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 1784 Logo1_.exe 2176 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe Logo1_.exe File created C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\cef\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft.NET\ADOMD.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe 1784 Logo1_.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4932 wrote to memory of 2496 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 85 PID 4932 wrote to memory of 2496 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 85 PID 4932 wrote to memory of 2496 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 85 PID 2496 wrote to memory of 1100 2496 net.exe 87 PID 2496 wrote to memory of 1100 2496 net.exe 87 PID 2496 wrote to memory of 1100 2496 net.exe 87 PID 4932 wrote to memory of 5072 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 91 PID 4932 wrote to memory of 5072 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 91 PID 4932 wrote to memory of 5072 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 91 PID 4932 wrote to memory of 1784 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 93 PID 4932 wrote to memory of 1784 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 93 PID 4932 wrote to memory of 1784 4932 f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe 93 PID 1784 wrote to memory of 1512 1784 Logo1_.exe 94 PID 1784 wrote to memory of 1512 1784 Logo1_.exe 94 PID 1784 wrote to memory of 1512 1784 Logo1_.exe 94 PID 5072 wrote to memory of 2176 5072 cmd.exe 96 PID 5072 wrote to memory of 2176 5072 cmd.exe 96 PID 1512 wrote to memory of 4380 1512 net.exe 97 PID 1512 wrote to memory of 4380 1512 net.exe 97 PID 1512 wrote to memory of 4380 1512 net.exe 97 PID 1784 wrote to memory of 1692 1784 Logo1_.exe 101 PID 1784 wrote to memory of 1692 1784 Logo1_.exe 101 PID 1784 wrote to memory of 1692 1784 Logo1_.exe 101 PID 1692 wrote to memory of 2808 1692 net.exe 103 PID 1692 wrote to memory of 2808 1692 net.exe 103 PID 1692 wrote to memory of 2808 1692 net.exe 103 PID 1784 wrote to memory of 3424 1784 Logo1_.exe 56 PID 1784 wrote to memory of 3424 1784 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe"C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD532.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe"C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe"4⤵
- Executes dropped EXE
PID:2176
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD536d559f567b4758e41335a8a07add622
SHA1c177f05ce3499d14bb28a665c98e99c5e26ad325
SHA2566df860484f22b33b2b362509947621211eabf0a6c0624c775a861e92f7b10769
SHA512e96c89dd1c2a151093422028b8b12acc039c73bde60cd17feccd468efd4878a51c99699946a22cb3c0aa98df82e5a4879683c47636c43b8e5eff63bddd1f8de2
-
Filesize
577KB
MD5a5d59bdc9dbf84ad14da7a4b5353648b
SHA12c36132d43fb6eaf053b5e313469d09831b5a86a
SHA25604020c6a2e54217c73d13bb0868a5adf96d36f353eb1b7e8423245ca20d520be
SHA512efba7cb81d2f8f7207d5c448c688cf95358d22028f7c064e5ca36c484b294ef1e7035a8bfdd25c1c3061759531a0dca2f7c0509bd6e98fb2ae5999fd0e1d9b62
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD5b683d08031e54ea6942378775fcacdf7
SHA1a2e7e8911ab44ce6e768058d02e2d68a8b093c7d
SHA2567d2c375e7c1e52dfb0254cab9fb3816c5a1ba987b44910dcbbc5f0b3b8294070
SHA51268d53577071249f8e4a5a70713c9b82a295bde488e00cb5c5287ed7c78a5195829eb65c83ddee6f64f6da085d3c0b0723249464044f20088b76aa631dff72599
-
Filesize
722B
MD5db96dd535cee6326f9cc9b8e88535803
SHA13757f7cc4fe502a1a4a9f5f0fe85c2a171fc0b8c
SHA256d0ae60a3a0ee563c4fadee0e14eafb186726a8253bb214ac1d5674505f9f8284
SHA512399baa0b7b7af7bcb2d7e8984b1e76acdf0cdeb29aeb21fb31820a15c76e913105154a2b911ae8a058f195ef838d6ec0e7281bc558852cb44eb4c92fd95a79b0
-
C:\Users\Admin\AppData\Local\Temp\f1f057cf0b75cf8077045f90e8b1939ce54c5cec5b35d0f853948ea3cdd4ee81.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
33KB
MD56d586ac2bb64f07330035c899711c07b
SHA1514323c069ae4d4d6993c0eea9bec585476cf8c5
SHA256875ebcd4a1bab1fc1bb872ff320de3f4e9e86cc92c9bfc7715378c3248f88df5
SHA5121f51607712145a9c19bc7b5d4859f9329619576f7be6d87d69d3d36cac7462f887e5a8af0311e4fd192eec53afd34e45ade76077b329241c956f897b07670f80
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD59f88a7249d726e0d4ebea8ef2b661d98
SHA1f68a9700c917086c68acd41e85887dc8fcc4c2c3
SHA256969f39ddb9e19420959783eb412b391e2c49b99261750aa2716b781fabcc0f3b
SHA512f68c4e069aeefc665d8c92f0c734098e4de0f4b1bea40dd72510827a49f9bd2ef6dd5b606d05cb0716630f1f27f471c3cf7d036442f34c3faa4f905d6101e21f