Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe
Resource
win7-20240903-en
General
-
Target
0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe
-
Size
136KB
-
MD5
22dec3659f1dd9ea4c882b981706283a
-
SHA1
6ee4036616789bd254b359ec2a3a28f68afa9ffa
-
SHA256
0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8
-
SHA512
2f6882a4f1bedd77e9d8d3d2cc61c556aa61c7afe00f7b4a0c90b8da99ec6a3cd1fb6612c8d67cb9421e9506a5bc72484da123ca31b87b3ffef43bd15b990923
-
SSDEEP
3072:8le+azbRPrlr9RXFfvgmJAIlwPxX/ZWOFrb:V+azbRZvuvI+PxBWOFn
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 920 Logo1_.exe 972 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_CA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe File created C:\Windows\Logo1_.exe 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe 920 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 972 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 972 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1904 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 82 PID 1252 wrote to memory of 1904 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 82 PID 1252 wrote to memory of 1904 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 82 PID 1904 wrote to memory of 4720 1904 net.exe 84 PID 1904 wrote to memory of 4720 1904 net.exe 84 PID 1904 wrote to memory of 4720 1904 net.exe 84 PID 1252 wrote to memory of 2204 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 85 PID 1252 wrote to memory of 2204 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 85 PID 1252 wrote to memory of 2204 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 85 PID 1252 wrote to memory of 920 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 86 PID 1252 wrote to memory of 920 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 86 PID 1252 wrote to memory of 920 1252 0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe 86 PID 920 wrote to memory of 396 920 Logo1_.exe 88 PID 920 wrote to memory of 396 920 Logo1_.exe 88 PID 920 wrote to memory of 396 920 Logo1_.exe 88 PID 396 wrote to memory of 892 396 net.exe 90 PID 396 wrote to memory of 892 396 net.exe 90 PID 396 wrote to memory of 892 396 net.exe 90 PID 2204 wrote to memory of 972 2204 cmd.exe 91 PID 2204 wrote to memory of 972 2204 cmd.exe 91 PID 2204 wrote to memory of 972 2204 cmd.exe 91 PID 920 wrote to memory of 4560 920 Logo1_.exe 92 PID 920 wrote to memory of 4560 920 Logo1_.exe 92 PID 920 wrote to memory of 4560 920 Logo1_.exe 92 PID 4560 wrote to memory of 1552 4560 net.exe 94 PID 4560 wrote to memory of 1552 4560 net.exe 94 PID 4560 wrote to memory of 1552 4560 net.exe 94 PID 920 wrote to memory of 3472 920 Logo1_.exe 56 PID 920 wrote to memory of 3472 920 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe"C:\Users\Admin\AppData\Local\Temp\0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9FF9.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe"C:\Users\Admin\AppData\Local\Temp\0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:972
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
583KB
MD5947a60db2a42794d0901a22e4c7bfb56
SHA197bc341381e7b5880ae856fcc27ce1905d47b972
SHA256bb80ce796ee128b6672a646c23a765db4b068103431f40a06eea323545b56849
SHA512a5ed31c30bda0023156818d4c30b35083a7c0d82f14095ec525ae8e5fe9c1764e2dcc2cac60ffecaf5adace71243af40ba31785a822be002ba8ec194e4f2740b
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize649KB
MD53e7cc0550b3e262224a01196dcffca48
SHA184b97784946a4f4edc8528690aee26cff4a5c35d
SHA256df205fe7ab5dd6c98547afe872f5b3bb66028f2cb14696fbc45610b0ef4723bf
SHA512864943da2a29d2e8aaca17a10ed791f22b3387c85fe19c19dea1ab3b89b3d6540dbd187f867742967a696ba0b76ce6e576a2825cc9147d77ab79f3a4f2a4ab6a
-
Filesize
722B
MD5daf6ff49193dbf5aa581f34017023331
SHA1383b59ba330fad0b277a3305e34bdcab5e915a67
SHA2568d0311ea9cfac66953fe5a47aca6811f05801e98d26c961691214cd165f74e0b
SHA512e5870b3e47066a6ba4ef6e3389b3399e2777125ee90c9aa7323f2bed8dfc44060650b597a23dfdbde284916527a21b36d5ad9c74ee15c05d46b9f2632461bfab
-
C:\Users\Admin\AppData\Local\Temp\0d7928976a87aca2e705761e5b88b2c031266494af6f40c4a7840d6d3e807ec8.exe.exe
Filesize97KB
MD5713a30695b671b6e3b19b7d09f9d8409
SHA183916537c86d7dc1043c752f195f04fa42813afe
SHA2566b42e2e9822b99f5f13a6d1f639fa64cc93001266ceb7a7d342da1bce84d5c08
SHA512a450c691e0c8d16519b418b366a260360a57e8511c6975f2e3029c41f30a68d83448126c3d57c9fb36b3a44e839d4bbcaa73e0adfe305a71e04def2fd990cbf7
-
Filesize
39KB
MD5abb9a80df3006b0d301bdc994ed2c37f
SHA130946837d9bf8c65151ef22dd27416249087de89
SHA25600b8befe4eb2c186c359ff3d0ac5257c740d950037741e847eac917789e2a6e2
SHA512dc8aea8d76ed69814651d734492e4d1c0f1d9236d4098fa7dae2bf76070338e96e4e1e316bdc77be06109b203b2b1f340fb820660ab82e04b3d7375504d577f1
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf