Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe
Resource
win7-20240708-en
General
-
Target
7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe
-
Size
67KB
-
MD5
e3bac44d78f58b0bdebbeeed924f66cc
-
SHA1
b695a49effd2e98a93113f38639eb60bae35dad7
-
SHA256
7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef
-
SHA512
5cd9dcad02572e244c2449a895433abcc5d6886f2ab8b20e10d2bfe356ba4a75821d85ecbfbaa1fe3f795d9b02073af45a53e3615a2641ffe023c7c98312f543
-
SSDEEP
1536:2HvaYzMXqtGNttyeiZnZLYm1DvVfqzlledcTJzz:2HvaY46tGNttyeQLYm1DvVfqzlvTJ3
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 232 Logo1_.exe 3360 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Calculator\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe File created C:\Windows\Logo1_.exe 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe 232 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4624 wrote to memory of 2272 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 84 PID 4624 wrote to memory of 2272 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 84 PID 4624 wrote to memory of 2272 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 84 PID 2272 wrote to memory of 3648 2272 net.exe 86 PID 2272 wrote to memory of 3648 2272 net.exe 86 PID 2272 wrote to memory of 3648 2272 net.exe 86 PID 4624 wrote to memory of 2844 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 90 PID 4624 wrote to memory of 2844 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 90 PID 4624 wrote to memory of 2844 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 90 PID 4624 wrote to memory of 232 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 91 PID 4624 wrote to memory of 232 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 91 PID 4624 wrote to memory of 232 4624 7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe 91 PID 232 wrote to memory of 1576 232 Logo1_.exe 93 PID 232 wrote to memory of 1576 232 Logo1_.exe 93 PID 232 wrote to memory of 1576 232 Logo1_.exe 93 PID 1576 wrote to memory of 1232 1576 net.exe 95 PID 1576 wrote to memory of 1232 1576 net.exe 95 PID 1576 wrote to memory of 1232 1576 net.exe 95 PID 2844 wrote to memory of 3360 2844 cmd.exe 96 PID 2844 wrote to memory of 3360 2844 cmd.exe 96 PID 2844 wrote to memory of 3360 2844 cmd.exe 96 PID 232 wrote to memory of 4388 232 Logo1_.exe 97 PID 232 wrote to memory of 4388 232 Logo1_.exe 97 PID 232 wrote to memory of 4388 232 Logo1_.exe 97 PID 4388 wrote to memory of 4968 4388 net.exe 99 PID 4388 wrote to memory of 4968 4388 net.exe 99 PID 4388 wrote to memory of 4968 4388 net.exe 99 PID 232 wrote to memory of 3612 232 Logo1_.exe 56 PID 232 wrote to memory of 3612 232 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe"C:\Users\Admin\AppData\Local\Temp\7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA577.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe"C:\Users\Admin\AppData\Local\Temp\7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe"4⤵
- Executes dropped EXE
PID:3360
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ad49cc293adc3202b706d4f7127d628d
SHA14660eed68d5c97632885a8bd75890aca547cbee0
SHA2565591244c79a8e0e04bbc4e36e6bf4a55ec59b3d3f4b20d027a668c7f60125dcb
SHA512bf1923dfbcb6657d1c6a2a7d7043f51232ae7e148f02f15bc99f458b60c8a3080a1882c8232f598b259b953f8a8ef019d0fc9268af802e42de216645cd3ad1b0
-
Filesize
577KB
MD53ef47512091981bb9d1603c421a688d9
SHA172eba11625662084d535aa4fa2fc4bc86da61fd6
SHA256980fec6a47516939fa753290022964acb7a90e205d0ea14af1d94ca20b37c570
SHA512ac16134d4c065ed8770c8ded8c60a6a142c21fb52a1e7f05f4534a7ff1bae4e27380785231b954b1c6b7f5e91eed18bb81df340912368b264129a82bc76f89f2
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD574f614352141ac4f78c3e59955ed2258
SHA1179465d798ce029d20b16601530037ca9d87563f
SHA256e33cff13b2b5307aaa06fc8f6d15ebe31eeb5ac6ad8d12b4b5c877eb34cca70c
SHA512af736346b2a298b653dccc43a44d852001584bc22c5e00cb959246a0544044587e27ae3af6c253bf68b3dbe24a0badbe0bf55784f704d8e2f703afaed49ae6ae
-
Filesize
722B
MD55e3b6c8462c9c7627ab0609758db1ebd
SHA1ae59a11e1b9fd172433d995913604c0f10afd7e9
SHA256475e0870bfb423372f3cebfa214ca1503841dbb7b42b556efdd8598aeede7b26
SHA5120ed20cb6dfa5ae83d9e25fb5175e73a39617c65ef5f0d758dec8f732af3ad0fd7eee32a0d4bccaf566d3e980d3a8dbf7ef1dfd098e00234909e261b052db06f2
-
C:\Users\Admin\AppData\Local\Temp\7840a14789419b38f59a1349227bb56fc4d60ced4e739cb948a6e30238e13bef.exe.exe
Filesize33KB
MD564f8db30b16d1c755d033d069c70d2d1
SHA104e8f26c383027cc63531f48477424bda65b14e5
SHA2560823bf7a2c453892ffa4328a970a417e0907d584bfb7f819ed0f4bb139d12e55
SHA512f461b40de656e6df6360a1ba393b000720c0ffa91147b00ee42aefccb4122da4314ce4de00364e692a0517f5e6643fe061b232fb316e993642f2d43b393b38aa
-
Filesize
33KB
MD5bee6df131a9c9bccab2c2e85139f6842
SHA1d7d095b827384b3b5f4e0cf9b8afb543998f1796
SHA2561a8911fd47aa3e98991935402374717b26afeed5d8eb431edcd4625f1a16f962
SHA5122457aa406a3010ce789237d55fa17fc0f5694c847699af8044f21ea935179ffc69056c0c2ba4ba3eee3158c51afb2d11d2c372eca3e1ca77c44545cb74cd4812
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf