Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe
Resource
win7-20240903-en
General
-
Target
c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe
-
Size
74KB
-
MD5
0fc9efbabada360210f3993b7aa27cae
-
SHA1
46fd964c5efb510b9917dc3ae97abe6196de2d9e
-
SHA256
c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343
-
SHA512
b42d90d13e1e4472501f709ac6532bc3935caafb53049e6c0f4951245105db6b33452f5a6efb564c1aa9ea13e2906294e0a52b7408d325a0af2493fee50916d9
-
SSDEEP
1536:DCG5cx1aeg1vlxJYDf97EToa9D4ZQKbgZi1dst7x9PxQ:+G5f9zYVlZQKbgZi1St7xQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4040 Logo1_.exe 860 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\Heartbeat\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ARCTIC\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe File created C:\Windows\Logo1_.exe c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe 4040 Logo1_.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2636 wrote to memory of 3964 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 84 PID 2636 wrote to memory of 3964 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 84 PID 2636 wrote to memory of 3964 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 84 PID 3964 wrote to memory of 4660 3964 net.exe 86 PID 3964 wrote to memory of 4660 3964 net.exe 86 PID 3964 wrote to memory of 4660 3964 net.exe 86 PID 2636 wrote to memory of 3644 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 90 PID 2636 wrote to memory of 3644 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 90 PID 2636 wrote to memory of 3644 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 90 PID 2636 wrote to memory of 4040 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 91 PID 2636 wrote to memory of 4040 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 91 PID 2636 wrote to memory of 4040 2636 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 91 PID 4040 wrote to memory of 3912 4040 Logo1_.exe 93 PID 4040 wrote to memory of 3912 4040 Logo1_.exe 93 PID 4040 wrote to memory of 3912 4040 Logo1_.exe 93 PID 3912 wrote to memory of 1864 3912 net.exe 95 PID 3912 wrote to memory of 1864 3912 net.exe 95 PID 3912 wrote to memory of 1864 3912 net.exe 95 PID 3644 wrote to memory of 860 3644 cmd.exe 96 PID 3644 wrote to memory of 860 3644 cmd.exe 96 PID 4040 wrote to memory of 3432 4040 Logo1_.exe 97 PID 4040 wrote to memory of 3432 4040 Logo1_.exe 97 PID 4040 wrote to memory of 3432 4040 Logo1_.exe 97 PID 3432 wrote to memory of 5064 3432 net.exe 99 PID 3432 wrote to memory of 5064 3432 net.exe 99 PID 3432 wrote to memory of 5064 3432 net.exe 99 PID 4040 wrote to memory of 3484 4040 Logo1_.exe 56 PID 4040 wrote to memory of 3484 4040 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a787C.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"4⤵
- Executes dropped EXE
PID:860
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5b1f9c1e34d386a573816e1755b55db76
SHA186caece043dd11c89236634e85b0ed836028dd02
SHA25611e2be5c5c948302f0e5e74d2065f7e538d6a95ca5a9c67dcdeeb3b4058d4a33
SHA51203140ee1b6347021a724682ace737bb03318f428c948edde27d390f99838841ccc8ace6d065cb4efcbbc579562e8b32ddbf922d3128f49357907b21d82173e11
-
Filesize
577KB
MD5001d1cac5c838f751117bbfeedd9a893
SHA1b3bb58d621513e049aba63641ee9856f22fb3bcb
SHA2566094df76076d153eb1ae0806187e04f5c2269e4628af32cd1c5dbeced63490a8
SHA51201642b5cb2f912e11628f327c28533ce6e10662fb5a8ca24e4eaec6d90055afeab15620bb9555ad3eadcff3f8acc7f3dd4f72d18769093d3f333bcc3b4e2cd32
-
Filesize
722B
MD5d9d575cb9f249eee3584428d86950b2b
SHA15ebad29dce34cf64e3a0449b4e31f3371efc2f23
SHA256beaaa2bb09732f174fb61c2ea7c84bdf04a696e6dc137b7181c2024b9d7d0dbe
SHA51251fd54f332f14d1cc35df301dea7931318a2ced1c42609c729295f4f967ccc96854f01b33434c71ccdb09f8d1253b56f98d18279f2922f2170cb793e1d138172
-
C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
33KB
MD59fb383006ea88e23b6927523f8ea7a4a
SHA1a408f9bad16cfe8f36bba778a0efb645f901273a
SHA2563c188d42969203e83dad09e7d67c63cfee5a6f7beee1d502108df9797ca08c29
SHA51265d558ece19fcfd206188f05318183ee0919f327d6c2d8a3611edcecd8d602086f2cb209b51d2d66f7de1f2d64213479e983f57693827fcd2d20aa117e586b8b
-
Filesize
10B
MD521df1f2862abbefb19b69ed364a5f968
SHA16e5a47eaef1ac9d9f355a10e4de11de5b252e6fd
SHA256061a173d684fb8122f34b91ded168a81a20864be4dc9ee219ee65f9007d22fe6
SHA5123364df22ff99814a7f520711ff71f3dd96f9611d954f7a11edfdb846f8c6703eea5fcadf5485a35564670bc6a484a3dd0f8a45c746dbc919d478d067e1b80567