Malware Analysis Report

2025-01-22 08:16

Sample ID 241026-ets9qa1ckr
Target 296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674
SHA256 296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674
Tags
discovery spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674

Threat Level: Shows suspicious behavior

The file 296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery spyware stealer

Executes dropped EXE

Loads dropped DLL

Deletes itself

Reads user/profile data of web browsers

Drops startup file

Enumerates connected drives

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

System Location Discovery: System Language Discovery

Program crash

Suspicious behavior: EnumeratesProcesses

Runs net.exe

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-26 04:14

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-26 04:14

Reported

2024-10-26 04:17

Platform

win7-20241010-en

Max time kernel

150s

Max time network

19s

Command Line

C:\Windows\Explorer.EXE

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\7-Zip\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\jfr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows NT\Accessories\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre7\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Hearts\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\kab\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\7-Zip\7z.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Logo1_.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2772 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\net.exe
PID 2772 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\net.exe
PID 2772 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\net.exe
PID 2772 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\net.exe
PID 2792 wrote to memory of 2928 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2792 wrote to memory of 2928 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2792 wrote to memory of 2928 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2792 wrote to memory of 2928 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2772 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\cmd.exe
PID 2772 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\cmd.exe
PID 2772 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\cmd.exe
PID 2772 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\cmd.exe
PID 2772 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\Logo1_.exe
PID 2772 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\Logo1_.exe
PID 2772 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\Logo1_.exe
PID 2772 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\Logo1_.exe
PID 2280 wrote to memory of 2708 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2280 wrote to memory of 2708 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2280 wrote to memory of 2708 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2280 wrote to memory of 2708 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2708 wrote to memory of 2676 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2708 wrote to memory of 2676 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2708 wrote to memory of 2676 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2708 wrote to memory of 2676 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2696 wrote to memory of 2724 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe
PID 2696 wrote to memory of 2724 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe
PID 2696 wrote to memory of 2724 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe
PID 2696 wrote to memory of 2724 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe
PID 2724 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\WerFault.exe
PID 2724 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\WerFault.exe
PID 2724 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\WerFault.exe
PID 2724 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\WerFault.exe
PID 2280 wrote to memory of 1876 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2280 wrote to memory of 1876 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2280 wrote to memory of 1876 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2280 wrote to memory of 1876 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1876 wrote to memory of 636 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1876 wrote to memory of 636 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1876 wrote to memory of 636 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1876 wrote to memory of 636 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2280 wrote to memory of 1280 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2280 wrote to memory of 1280 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe

"C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$a67C8.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe

"C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 152

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2772-0-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$a67C8.bat

MD5 9d79200ee3075a0d8ef92eba1a9b18b0
SHA1 2877f9c4945724aeb54295a4418b22e764c7268c
SHA256 7da6da5d6ec4f4f0cf64d53798dbdbebbf2fcee6270b0db6a1fcad9e2f7084f2
SHA512 3cfc158d8cdbf8c529d36f28d676379643614c651f211ee1428c9e96090eedbe5aaca33a4a93bcd64fb2677dbbc291ea8bcb98561739a2dea027283ecd30f720

C:\Windows\Logo1_.exe

MD5 1c53d2c2c1bd364fe7271c3e92d2e3dc
SHA1 0a8092d4f1129d843f16fc6851c11ed6751fcc7f
SHA256 8810ec719639b333cc678599ed64e62c41e94e9998dfd822c8c9d03e542d4c99
SHA512 1792ffb0daa68a799a4f9502fd721895934a46bc99f14539bcafb2923ac43b124138f9efd4346cb6a757c4b8de34c2e0544b0580376a343b2607548087aba578

memory/2772-17-0x0000000000230000-0x000000000026D000-memory.dmp

memory/2772-16-0x0000000000230000-0x000000000026D000-memory.dmp

memory/2772-19-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe.exe

MD5 45e471bd79b7ca6af28422432b9b8f1a
SHA1 9138450ca0af79896d2145a83692c7fb068c541a
SHA256 c539aed1bcff932b77d8d49486156cc0ad5496e6d5480d9ec435d76cad49d73c
SHA512 9af63626b790f63c85ab93d17243dd154f56108931609ffa75d174cde0a5feb540b5e7e24209feb7ca2f87088eb0421e6bed1f94c7a4c893b7b84c440c286f4e

memory/1280-32-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

memory/2280-36-0x0000000000400000-0x000000000043D000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-3692679935-4019334568-335155002-1000\_desktop.ini

MD5 28a582403dbb209b6c5cb7bada9c918d
SHA1 db58560be63032a4cbd738d2d639e5bf764d6277
SHA256 b5a9fa3acde4d9499ea08a6d9ff193fc9cda57f04141f82d2422a4008f451200
SHA512 511b4d3886d671d01c66d2509b784a199e68a00f2597d311d8d0770f0b1030680136ee450343a8d6c4b51d9de8448bafdde44dc1a1c6e62bccde47d5af03fbae

memory/2280-1597-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 d950dc3af3fc1d51258004f4a9c1861f
SHA1 58e95819cb701f78572b883cfbbe3044c79f8620
SHA256 4bd5c1f973d1729c3ff30c05608449cbbde77f9968ece9bc8ff36674f53bf82b
SHA512 1962c170519ed83db8f42106266ee1603ec38c1dc1b772fb64197dcd02d88244e64bafed0f8f4355f4d029713bc15085a2bc44811f44a8445a3868c02b07708b

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 20615c222d66b46d820f440205205ce1
SHA1 ac06df643e8af18a5312d88a6fca54bc737db4fb
SHA256 19286b1fbf621a31ce34f560c63c1a811b17065756759f4523c0c389cf7304bc
SHA512 dd81cd82dcf4d1a9291a118a626c36cb8d9e924f0449e44f87b41c36304f430e3213ab6bcb0bd5c0c56722588a932e69be62c6df7d8af71ba1004d8ccb554348

memory/2280-4097-0x0000000000400000-0x000000000043D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-26 04:14

Reported

2024-10-26 04:16

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ca-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hr-hr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\it-it\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-ma\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\swiftshader\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\updater.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\dark\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hr-hr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ko-kr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre-1.8\lib\jfr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\fre\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ko-kr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\dark\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-gb\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nb-no\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Logo1_.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1460 wrote to memory of 4660 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\net.exe
PID 1460 wrote to memory of 4660 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\net.exe
PID 1460 wrote to memory of 4660 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\net.exe
PID 4660 wrote to memory of 4828 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4660 wrote to memory of 4828 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4660 wrote to memory of 4828 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1460 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\cmd.exe
PID 1460 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\cmd.exe
PID 1460 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\SysWOW64\cmd.exe
PID 1460 wrote to memory of 3132 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\Logo1_.exe
PID 1460 wrote to memory of 3132 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\Logo1_.exe
PID 1460 wrote to memory of 3132 N/A C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe C:\Windows\Logo1_.exe
PID 3132 wrote to memory of 1736 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3132 wrote to memory of 1736 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3132 wrote to memory of 1736 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1736 wrote to memory of 4644 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1736 wrote to memory of 4644 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1736 wrote to memory of 4644 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1732 wrote to memory of 3552 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe
PID 1732 wrote to memory of 3552 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe
PID 1732 wrote to memory of 3552 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe
PID 3132 wrote to memory of 1256 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3132 wrote to memory of 1256 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3132 wrote to memory of 1256 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1256 wrote to memory of 1280 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1256 wrote to memory of 1280 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1256 wrote to memory of 1280 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3132 wrote to memory of 3408 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 3132 wrote to memory of 3408 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe

"C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aACAB.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe

"C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3552 -ip 3552

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 424

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 100.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 103.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 168.253.116.51.in-addr.arpa udp

Files

memory/1460-0-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Windows\Logo1_.exe

MD5 1c53d2c2c1bd364fe7271c3e92d2e3dc
SHA1 0a8092d4f1129d843f16fc6851c11ed6751fcc7f
SHA256 8810ec719639b333cc678599ed64e62c41e94e9998dfd822c8c9d03e542d4c99
SHA512 1792ffb0daa68a799a4f9502fd721895934a46bc99f14539bcafb2923ac43b124138f9efd4346cb6a757c4b8de34c2e0544b0580376a343b2607548087aba578

memory/3132-8-0x0000000000400000-0x000000000043D000-memory.dmp

memory/1460-11-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$aACAB.bat

MD5 312ff4d68570fee46638bce9a6195b58
SHA1 bd46876bf58870490427c6541804dfb6f65600e5
SHA256 edc8114f88e57767b2b338540f9017cce4139fc2b05e68e50c047798a84838b8
SHA512 ede6edf2623903711c717f399fce1024a3312965e977e23d037297735c908dafc0a8423b1fd3412a26af34c075a22e44a927b308782af10203387fb251b592db

C:\Users\Admin\AppData\Local\Temp\296f2807a21a04297d54ffd6ed3930ce06bf959d0e8c7ea7f8d8d2c471b3a674.exe.exe

MD5 45e471bd79b7ca6af28422432b9b8f1a
SHA1 9138450ca0af79896d2145a83692c7fb068c541a
SHA256 c539aed1bcff932b77d8d49486156cc0ad5496e6d5480d9ec435d76cad49d73c
SHA512 9af63626b790f63c85ab93d17243dd154f56108931609ffa75d174cde0a5feb540b5e7e24209feb7ca2f87088eb0421e6bed1f94c7a4c893b7b84c440c286f4e

memory/3132-18-0x0000000000400000-0x000000000043D000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-3442511616-637977696-3186306149-1000\_desktop.ini

MD5 28a582403dbb209b6c5cb7bada9c918d
SHA1 db58560be63032a4cbd738d2d639e5bf764d6277
SHA256 b5a9fa3acde4d9499ea08a6d9ff193fc9cda57f04141f82d2422a4008f451200
SHA512 511b4d3886d671d01c66d2509b784a199e68a00f2597d311d8d0770f0b1030680136ee450343a8d6c4b51d9de8448bafdde44dc1a1c6e62bccde47d5af03fbae

C:\Program Files\OutCompress.exe

MD5 2459ec56df7204c9ea75865f3edaf357
SHA1 1db0c61c9453472f4b137fbf77e21acd6c46d281
SHA256 d434334ba4bd8d947ada8eb1ea0802cb33b316e2a4c400adcbe339385d577ad3
SHA512 283dabbb2360a5cb3cecbf063effded0d0dcbad5372a1ec03269db2c1a490db782187f1191fbfb036853682d223c60e012807f7fd19d2c5552c01d3c751e67ff

memory/3132-3031-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

MD5 cb0376e100c5fabb8fd4a1bc56586aaa
SHA1 a4911bc430a25cc0bc12d8bd1ec3951acb189a93
SHA256 bd9cffa3e795e1bcbf898944e16fc342cd1194013f794bac72e43c96d48c395a
SHA512 61960694907542e18a7bd248fe0c8bd560b0d11c6b2c89fe7516cf6397b6c0f1465956c0c1e7f16515a4331dd6f9c8e305f343bcaf1bde125b92bebbe94bca1a

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 db9bddad546005d48ce18fe972246201
SHA1 b0dd981322e1c1c0b5c252f47fa13264938de8b6
SHA256 9075cd2193d88bc34006b3ca296da52903a6cdcc326f7dc9fbe08d5ce3e653c3
SHA512 08c030dcad263220c4593eae14e5b7c5731df7ed8ae5f4ab454d8b981ef28caf35508ddd1ce93063dea8ad3b47b65780349db4c17bb0abdb4e930749c9c365e0

memory/3132-8914-0x0000000000400000-0x000000000043D000-memory.dmp