Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe
Resource
win7-20240903-en
General
-
Target
d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe
-
Size
306KB
-
MD5
815f4dd630dc087db94ebe56dff7ed40
-
SHA1
7a21c31affd50241cb19de3c807cc6c63bbd34af
-
SHA256
d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3
-
SHA512
78b4e5110944f8a9e31d041b269a65e4e492fba4e44c3c8e40e211094ed4f36a0aa11fd570ceb165f1ddb10328212a3643795c57f10355b2d8878060700e54ea
-
SSDEEP
6144:c+aX383ObiZKDAX0jH0o2zq9DmQ3LOotL4gr:c+a8ebiZKm4H8zq9Fjtdr
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2644 Logo1_.exe 2956 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Extensions\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\DESIGNER\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eo\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\uk-ua\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe File created C:\Windows\Logo1_.exe d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe 2644 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2032 wrote to memory of 4396 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 83 PID 2032 wrote to memory of 4396 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 83 PID 2032 wrote to memory of 4396 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 83 PID 4396 wrote to memory of 2312 4396 net.exe 85 PID 4396 wrote to memory of 2312 4396 net.exe 85 PID 4396 wrote to memory of 2312 4396 net.exe 85 PID 2032 wrote to memory of 4988 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 86 PID 2032 wrote to memory of 4988 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 86 PID 2032 wrote to memory of 4988 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 86 PID 2032 wrote to memory of 2644 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 88 PID 2032 wrote to memory of 2644 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 88 PID 2032 wrote to memory of 2644 2032 d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe 88 PID 2644 wrote to memory of 3616 2644 Logo1_.exe 89 PID 2644 wrote to memory of 3616 2644 Logo1_.exe 89 PID 2644 wrote to memory of 3616 2644 Logo1_.exe 89 PID 3616 wrote to memory of 3404 3616 net.exe 92 PID 3616 wrote to memory of 3404 3616 net.exe 92 PID 3616 wrote to memory of 3404 3616 net.exe 92 PID 4988 wrote to memory of 2956 4988 cmd.exe 91 PID 4988 wrote to memory of 2956 4988 cmd.exe 91 PID 4988 wrote to memory of 2956 4988 cmd.exe 91 PID 2644 wrote to memory of 2348 2644 Logo1_.exe 93 PID 2644 wrote to memory of 2348 2644 Logo1_.exe 93 PID 2644 wrote to memory of 2348 2644 Logo1_.exe 93 PID 2348 wrote to memory of 3248 2348 net.exe 95 PID 2348 wrote to memory of 3248 2348 net.exe 95 PID 2348 wrote to memory of 3248 2348 net.exe 95 PID 2644 wrote to memory of 3340 2644 Logo1_.exe 56 PID 2644 wrote to memory of 3340 2644 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe"C:\Users\Admin\AppData\Local\Temp\d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a783D.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe"C:\Users\Admin\AppData\Local\Temp\d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe"4⤵
- Executes dropped EXE
PID:2956
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5e02a26d5c40ba99e0dd41bf5283f0a89
SHA1974aed12b49db8fd18494a80d2de9a73dd98e594
SHA2562f8f7e0cb11eac3e0ed40c10d931d225e43e8a7b47d2043c1126709b809f1f05
SHA51268566c219e68a07608a7ce9d2cd1124ecc82fe5272087637c61393e51c9afb60d939f84c0c2b03bab6ac239fcdbcfb93fa1b0ff80c2e6531cfbf55452b3bb49f
-
Filesize
368KB
MD5d446195c7bc37fbdd3e329c0b737d50f
SHA1ea437300d74845ec3aef4822ae0790584d0af5c6
SHA256e7310b51bb7032dc3515b8402a382691cd3a22d4baa602310a08083dd6c01b0d
SHA512b1483479a441bc49c6a3f03fab0a232439866ea1f2139ebdd3711e6b3e1eaa9bea8c1bac3618dd874b7cf695cb1f148612fe2998d8728a431b012c64b870eab5
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize643KB
MD5c0057db68dfd75cccab3b14a084dd427
SHA175f6f857332903754df4c73bb1a22201a0f5fa94
SHA256a248fabffb80434c968c6878a53560b86c15015b2a567ecc26d7405786b665ab
SHA512369739ca80ba57d97a3c3a15fc1b5b30d1b111a8450510c8dd32e7768a68426e10bcece74754b3826a437cd05b6eb70ad882a092aafb85f72b9072779d485854
-
Filesize
722B
MD540600809440c83509096b197546b52b6
SHA1dfa69a3cb6eca996086bf2571db08170e48d3f3b
SHA256f8a07a1710b6458eda22e450f7ffffcec2333475db3938c0ce0811a67c517063
SHA5129167f9d20551a7ca3371ef03577c14b8fbf75572621c589f9e9a8787ccd047f9304e5b143a6d0038f0ddcb58a713acab69476f2895e0d395575f5689be8390ee
-
C:\Users\Admin\AppData\Local\Temp\d37035e45a26283ef6a130c3f6fedd4eee3afde22dab3b441950cd1e8ec305b3.exe.exe
Filesize273KB
MD555e392d1bd55a1292b6ce766225416e5
SHA106d8134a3002e6974407fb5da0a59ab43415a52a
SHA256db42cb95904cfc6891df2aa736506fb34a26cf9a26e88ab0ef262e0459344a3e
SHA5120c55062cf8debbdf1a7a4f41527e43cd124fb7777e9b930de9cc900abf9c27a1956a536200e23dddc9a4068ac5bc9a8052299a4f2cf010cffd205a32d99581a2
-
Filesize
33KB
MD5fac489180a927456fde29aa70b6c863c
SHA1b7638615678d7137f7c9a8ab01952fd6266730d0
SHA256e888702980111bdea63056293f56946432701aac652c474a5f8614a137e021d7
SHA512cbe953def68f48b32003143d8980b0443c46373395d31ceab62192cb0d2a97d45428e950f54f03b507b9e39b12770c9701e2b5de6e1fda1ce763a9aede7e6682
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf