Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe
Resource
win7-20240903-en
General
-
Target
10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe
-
Size
165KB
-
MD5
febbce4a4884011c8203571018a6db1b
-
SHA1
3906e1612c2d67463d991fbf87053e2efbed005b
-
SHA256
10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272
-
SHA512
61beac16bb56b2bd79b9e629c0448d01fbcadafb2ef0e014b415a0c8123147195b164c33f29ce122d3ddd85f00e464e492336e6189627b999ed8786b156a9ebe
-
SSDEEP
3072:PAaY46tGNttyJQ7KRZ99djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:Y46tGdytYWBW1Wu3rOOuOVr8
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2068 Logo1_.exe 5044 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PIXEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe File created C:\Windows\Logo1_.exe 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe 2068 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5044 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 5044 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1400 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 82 PID 1452 wrote to memory of 1400 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 82 PID 1452 wrote to memory of 1400 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 82 PID 1400 wrote to memory of 2344 1400 net.exe 84 PID 1400 wrote to memory of 2344 1400 net.exe 84 PID 1400 wrote to memory of 2344 1400 net.exe 84 PID 1452 wrote to memory of 3960 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 85 PID 1452 wrote to memory of 3960 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 85 PID 1452 wrote to memory of 3960 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 85 PID 1452 wrote to memory of 2068 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 86 PID 1452 wrote to memory of 2068 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 86 PID 1452 wrote to memory of 2068 1452 10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe 86 PID 2068 wrote to memory of 3980 2068 Logo1_.exe 88 PID 2068 wrote to memory of 3980 2068 Logo1_.exe 88 PID 2068 wrote to memory of 3980 2068 Logo1_.exe 88 PID 3980 wrote to memory of 3608 3980 net.exe 90 PID 3980 wrote to memory of 3608 3980 net.exe 90 PID 3980 wrote to memory of 3608 3980 net.exe 90 PID 3960 wrote to memory of 5044 3960 cmd.exe 91 PID 3960 wrote to memory of 5044 3960 cmd.exe 91 PID 2068 wrote to memory of 2436 2068 Logo1_.exe 92 PID 2068 wrote to memory of 2436 2068 Logo1_.exe 92 PID 2068 wrote to memory of 2436 2068 Logo1_.exe 92 PID 2436 wrote to memory of 4624 2436 net.exe 94 PID 2436 wrote to memory of 4624 2436 net.exe 94 PID 2436 wrote to memory of 4624 2436 net.exe 94 PID 2068 wrote to memory of 3348 2068 Logo1_.exe 56 PID 2068 wrote to memory of 3348 2068 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe"C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aC890.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe"C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5044
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3608
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4624
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD561df7a95330214312aaa9099fd631f21
SHA15c6f5a22cbd1525ff951566e72f6129fb8c11560
SHA256734023a9633031e915b216ba54f65929438838d46d194e47c413cc0ff02e5e20
SHA5120c441efae345891a4c65d3cb4336a2bfeb2a623e6f5f144e3c86e56e858688ee8a3071dc05db1feb98f03e665c60ac011451028c9c7eedf9ca93170214edb796
-
Filesize
577KB
MD51eb506486ea33ba644a0113e46b4966c
SHA13920ec8a454463920908ae9d7b9969994b916f93
SHA2566b50f6c68d4575cf9acf30b972433d12e5ebe6a8c6eee73c0c203a2b00d8589c
SHA5128371120b1dcd4820929a1f0a73416484a6d0e1c84e8a41c5d4727c9166dd399d6b521145255e40d473c4ad308ab4c68b99f7e3888c43194660b7c5907f049a19
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize643KB
MD5c812cad58e4a4cedd3373f5125ed73dc
SHA148cb77381e1c81f5f75e13ee39e35ced130fc784
SHA2561c27223874f6c587ed068134e66e9a0588de3776370bf5f14bfdd246c860d9cf
SHA51272af90d02def9f922ca8d4e621bea562718c8e530039eb22f44e8fc9089ccc4990e0a20b1f2d5761e46af0e579bbd5a666c9176d07b096c751b754a476e6626f
-
Filesize
722B
MD54f89ddc4b333f89eb90c0a991411a6eb
SHA1a2be934e68b5f304b3aae0ee4225c155ec3ecae0
SHA25662a3a1d873aa07234564c963cf9653a7c2fc59422268d0b62146604fcfa0d651
SHA512ac6b134d29aab2842ac57c8ab60857851cab8413e630e9c587eb710c9be10e1d4026e3933071e5b503c343647f2a88b0cc049f6498f9976e717f7805f2f6f299
-
C:\Users\Admin\AppData\Local\Temp\10c8c4aa62d6c6c54548311bda7c392b49fb70a507184e3fac8b2666d43c6272.exe.exe
Filesize131KB
MD516438a96a8adb85472ca72da04701b29
SHA1b1f5ee8bc083804de4de820255107f6541c84735
SHA2569291cd97d2f1b119438f16e97ea75119f19fd959ec5414e84b337530d692e289
SHA51258f659a29cb34245a261b7666b1cda4b76f2df1039f3713dda6ff5a97c33b4cc273b110d10b4131a6a5c13897efcfa9a5ef3031e0e5fb14db1adc0ac1ef25dcd
-
Filesize
33KB
MD53d9c952267a9a305ef5d062d58fd34c7
SHA18aa433b4b2c265827dab122d3f3a170770077811
SHA2567672a8f08195d21919c254b8d4f493c3df281c91a880601baaadc749b8d5b8ae
SHA51292f74261778082ffa25869a64b630a5ac5651614cccd0ef6840c605b53f24bc3e451c628809a1f254bf49eb85726d40be4d56137200f8bb636a714eac306fd5c
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf