Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe
Resource
win7-20240729-en
General
-
Target
c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe
-
Size
66KB
-
MD5
b82e20543e7d77a7b9436607ab363980
-
SHA1
ee9b8bcd20b412e1f11d8d1a0abc5b597ddd118c
-
SHA256
c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62
-
SHA512
434af06d5659676e0b0ec7207aaa337bd199ef085f0bd53ce8e4c361c0adf9d093c04dbd11bf56c1545d0061fb22d6a909b543ae9038fcc5f080b830793066f7
-
SSDEEP
768:mYBCe+Vxr1x5cE9Fl5pz8UOutDlMXaoSunjXWNNEC4OMMwP3Sy6EGyI4t6a9AkHu:/BCesrz8VuJlMXaDuiNGC4ayFGyHNXk
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 3544 Logo1_.exe 4840 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Notifications\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\Integration\Addons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\MicrosoftEdgeComRegisterShellARM64.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\GettingStarted16\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe File created C:\Windows\Logo1_.exe c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe 3544 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1820 wrote to memory of 4956 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 82 PID 1820 wrote to memory of 4956 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 82 PID 1820 wrote to memory of 4956 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 82 PID 4956 wrote to memory of 4748 4956 net.exe 84 PID 4956 wrote to memory of 4748 4956 net.exe 84 PID 4956 wrote to memory of 4748 4956 net.exe 84 PID 1820 wrote to memory of 2608 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 85 PID 1820 wrote to memory of 2608 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 85 PID 1820 wrote to memory of 2608 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 85 PID 1820 wrote to memory of 3544 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 86 PID 1820 wrote to memory of 3544 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 86 PID 1820 wrote to memory of 3544 1820 c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe 86 PID 3544 wrote to memory of 4500 3544 Logo1_.exe 87 PID 3544 wrote to memory of 4500 3544 Logo1_.exe 87 PID 3544 wrote to memory of 4500 3544 Logo1_.exe 87 PID 4500 wrote to memory of 1396 4500 net.exe 90 PID 4500 wrote to memory of 1396 4500 net.exe 90 PID 4500 wrote to memory of 1396 4500 net.exe 90 PID 2608 wrote to memory of 4840 2608 cmd.exe 91 PID 2608 wrote to memory of 4840 2608 cmd.exe 91 PID 2608 wrote to memory of 4840 2608 cmd.exe 91 PID 3544 wrote to memory of 5036 3544 Logo1_.exe 92 PID 3544 wrote to memory of 5036 3544 Logo1_.exe 92 PID 3544 wrote to memory of 5036 3544 Logo1_.exe 92 PID 5036 wrote to memory of 4308 5036 net.exe 94 PID 5036 wrote to memory of 4308 5036 net.exe 94 PID 5036 wrote to memory of 4308 5036 net.exe 94 PID 3544 wrote to memory of 3340 3544 Logo1_.exe 56 PID 3544 wrote to memory of 3340 3544 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe"C:\Users\Admin\AppData\Local\Temp\c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7772.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe"C:\Users\Admin\AppData\Local\Temp\c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe"4⤵
- Executes dropped EXE
PID:4840
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4308
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD535288488f6844cc1ba2d1f93d3d2afa2
SHA14e957e4093a1cc019562dd12f216c42e9845b157
SHA256a5f2e4990597f1e12f71ba6c9d9c3b9dc59f174bfd30a81454856bf5f847d708
SHA512bc8a6584ac69de15e7a506af89903bc49650a258eacec81d4695ef963d5e40fdff4e97f51fb7bebf72ee684546242227a65bfebadcc4f39461e09dcba27a334b
-
Filesize
369KB
MD5490b042d3f39326bf254cba880238cc9
SHA15523ec903511e54508180764f9efcb9b264c9e2f
SHA256da283793c0268d14f0985de9756f119c71d331808420ff7f8ea5dc37e5563ecb
SHA512f9f600048efd0b0214847d45488a2bc0a46cc21193c9f91fab6f543fe99415173bd7cab547d6504cfbe0da182d483b44e8ddd74c1928646ae026e019d6686848
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD5f9bda517f882e3c2636d44cfa30c8ef0
SHA106822afcd175307e76db635fa14c80b4708458ba
SHA256cb3149e29fc3c22b6ed7a427146780eb251e10b54153139535f6999b33037de8
SHA512e6c867020f86944f79cb768de9a01c60c36bbbf2937cf8cecb096ad578d06a2a37a3976665f2063da1e3e3be62ff26b520abe26d442e084e0b496d5ab08e1050
-
Filesize
728B
MD555746cb59121946f610352c14566d975
SHA17ecefc7525ecabc3728ac1c50aa8836d1e29cd46
SHA256b43b50e85b473ac5ae24b273227b6fe34be49d966819efa2d844d3d934c8304e
SHA5123be4deac76ce443a86a351b4c6199c1615c2513c8b5e47a749cf7700a06fe928e0d0f0f51b2a10a210c3bc2bfd1e594158b331bfc89a5c2a4632343b1ab7d6ec
-
C:\Users\Admin\AppData\Local\Temp\c4fffaa7775c21c57c137124c03e73305cfc27422e1c07295d5c6a7c4ea81a62N.exe.exe
Filesize33KB
MD5bdbce90ce74990df3b2c7c8484dde146
SHA1ae6aadaf5467b97779d4c1a81b5cd3dfb9d8ecb4
SHA256f4a3c012f2859ead10af1298d9b20fbd8ca2257f73d530a2b0c25937cb16f6eb
SHA51278e2f31759ce490f38e898ef17a700dd0898cc32b526325e8d7230b4ff119c39124cd2abf30038f70318931cc995abee523b334a29812bf875302dc126c9f958
-
Filesize
33KB
MD5f61a8a91475d606cd19c2f03a361e6ce
SHA12976acd1ac2575b502728efe439704601b557815
SHA256437fd36e20117c428203bc55483e849988d21a7a1b58756f95c45ff2fc550cb8
SHA512502cd1a3361f1a3ae96f3a598e8aa5bc87fb8724686911b5409f1a5df1996695b2d41a29d3593c32166225fe6f424d945c209cec52014d53b4117665fa1fc0c9
-
Filesize
9B
MD582fa69b12ac2df558c85e86426eb13eb
SHA1ad90b8756e3bebe04450f6950419c761844d7b7e
SHA256f7622a3740b818722e46a36b5aeb1c0ba6bec25bec811e3dcfe0b5ba1d728775
SHA5123c4da39d3b0d68ade3ff8ded69bf1e78a1ef88f7ed70c85572ae06e6be78155ffc2f557f577208e579191be2d8be2a1fa833b9ca74a35bb69cf9c32c23f4d99f