Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe
Resource
win7-20240903-en
General
-
Target
18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe
-
Size
11.1MB
-
MD5
370f2453f520c4e6d76ae5366e3cb22d
-
SHA1
65e7cfe6c0b39bdff3dff4bffc15331496a64025
-
SHA256
18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516
-
SHA512
10f05f0f1ce550f2d8f05eb630e87a6edfee5ef12f5926f1ff9feff7e4e4ea773b5ea6f30e38d293cdc4e70d017b6105dbfd40edf52405dd9ce46ef31759a00e
-
SSDEEP
98304:Rb+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz9Y:h+kIGv3y/x+KTbfjJ+kdnAlejY
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 3 IoCs
pid Process 3936 Logo1_.exe 184 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 880 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\ADOMD.NET\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe File created C:\Windows\Logo1_.exe 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe 3936 Logo1_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 184 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 184 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3128 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 82 PID 4792 wrote to memory of 3128 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 82 PID 4792 wrote to memory of 3128 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 82 PID 3128 wrote to memory of 2760 3128 net.exe 84 PID 3128 wrote to memory of 2760 3128 net.exe 84 PID 3128 wrote to memory of 2760 3128 net.exe 84 PID 4792 wrote to memory of 4464 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 85 PID 4792 wrote to memory of 4464 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 85 PID 4792 wrote to memory of 4464 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 85 PID 4792 wrote to memory of 3936 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 86 PID 4792 wrote to memory of 3936 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 86 PID 4792 wrote to memory of 3936 4792 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 86 PID 3936 wrote to memory of 4228 3936 Logo1_.exe 88 PID 3936 wrote to memory of 4228 3936 Logo1_.exe 88 PID 3936 wrote to memory of 4228 3936 Logo1_.exe 88 PID 4228 wrote to memory of 4060 4228 net.exe 90 PID 4228 wrote to memory of 4060 4228 net.exe 90 PID 4228 wrote to memory of 4060 4228 net.exe 90 PID 4464 wrote to memory of 184 4464 cmd.exe 91 PID 4464 wrote to memory of 184 4464 cmd.exe 91 PID 184 wrote to memory of 880 184 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 92 PID 184 wrote to memory of 880 184 18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe 92 PID 3936 wrote to memory of 1092 3936 Logo1_.exe 93 PID 3936 wrote to memory of 1092 3936 Logo1_.exe 93 PID 3936 wrote to memory of 1092 3936 Logo1_.exe 93 PID 1092 wrote to memory of 2044 1092 net.exe 95 PID 1092 wrote to memory of 2044 1092 net.exe 95 PID 1092 wrote to memory of 2044 1092 net.exe 95 PID 3936 wrote to memory of 3500 3936 Logo1_.exe 56 PID 3936 wrote to memory of 3500 3936 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe"C:\Users\Admin\AppData\Local\Temp\18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9CBD.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe"C:\Users\Admin\AppData\Local\Temp\18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Local\Temp\18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe"C:\Users\Admin\AppData\Local\Temp\18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe" --type=collab-renderer --proc=1845⤵
- Executes dropped EXE
PID:880
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD535d697f22154517431bff4aef9cbeba9
SHA14c58ffced9006c2dca9df53859eef7281b6fcbf1
SHA256a1a7363d2c4656166395fb0f1cf02dee63b1124731fa33ed2d3858dfa5a46c8b
SHA512eff00154b810f4ae59f099c419c0828e1dd992a31fc677c11ceb4702cc250b025226c76e8ca217acb4e3637d18884edeaee5004c9f73701160f17e5a187d1dcc
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize643KB
MD5c08994604c02bf7431e4c46295a779d5
SHA17f526582e292083589253bbc8b2cd093b2229ff2
SHA256218bfecab8804a634b05ebcedc30eab7aa8fa8ed5775495ba9545517c311f00e
SHA51213d9b746d0fe6922ecff9b5bf0ac896a63da11610341d4a7701e2a8d8fc5c0511d7bd9f4f54d3756b770998601b4f7b39b7e5c36d824dd42470fb0b499065c34
-
Filesize
722B
MD5d71599e29101b3e39b782c8e23f5a09b
SHA1eb265e7e8f5ad51199f52c9bac9214c37d8945c9
SHA256faada73cc1084cd7401778b2480acc32b637e014fb8d04f457b183a79d53879f
SHA51268ae386d160ab3962f07b2d33c57e7ad79b6304daa7de3fdf9b4098fd2e4cdc1128829036f04e1e2cf845b8447d4049b9b38145b3c90f9b15dbae7ae8a367cc8
-
C:\Users\Admin\AppData\Local\Temp\18add224d40d3c19f4656c8865d0d70cd8fcbdd09f5363853ed843544a255516.exe.exe
Filesize11.0MB
MD5b45b7bd6eb92c5b65378d8d0a0964747
SHA15ca6f198ac83c90496110259b57ff4a5f47b64bb
SHA2565f1d9218f9735a763ffecc47c7b6f0c342b7f1a5da835733e0b3b73903f864a0
SHA512bde39c4b6d04caae8280bdd53e6036c53ed394a72f0d4d1273c149175570e8a87f87c8963869c96834fef7e82893da38c49ce4aaa1851e65c055dbbcac7c1708
-
Filesize
33KB
MD5d0d93baf58f7cc1c190714eb1e01de67
SHA16f08ef9e2427e845eb7d94187d8beea81db3f623
SHA2561e582660108e00a93b4b3d29eeca01300f61d8bae6ea84a28f03acb45e9ec557
SHA512ef68509aa8032ff1e2cc25ddc34c0fbe69b3bd18c35c915362cbe10a699dfae9e279b586346bfade0b88960c99726dcf984fddaf7b0e91d2861472fb237d22ba
-
Filesize
9B
MD5e92b0dcf7d27eb997606ca871d866c93
SHA169b76ef532ec922985b95329dbc5133f8d9fa994
SHA256d0caa78610c77bb9fda1e6430ae7d9859d955dd9b19d26d12e409c8a39e24053
SHA5128ea4006e99155f3821e05771cd80a7b2172078f77f2d1fe5daac4089809d94bad706d11a1af95ee3ea8d66959e65fe415dee8199ea7e1bf17d0b9f578cdb25ee