Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe
Resource
win7-20240903-en
General
-
Target
781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe
-
Size
33KB
-
MD5
faf17362f397288804d2aa5a189d0292
-
SHA1
100796d42d6f36966ca44e3a25d7492badf6ddb2
-
SHA256
781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1
-
SHA512
10cf37699195c0e132eaf9d9789266a50b5ddbfa181bf035695b313146bbfae637193b5176de727ce8d0957b7714f41fe7bf6ec3ffd9a454f61ee993134c90e8
-
SSDEEP
768:I/QRO5RroZJ767395uINnEfDKBbUCp1OTZ+/V:I/ue+Zk77RNzLiTO
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\R: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\K: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\G: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\M: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\L: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\X: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\U: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\T: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\O: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\N: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\W: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\P: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\J: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\H: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\E: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\Z: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\Y: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\V: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\Q: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened (read-only) \??\I: 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\Microsoft Office\root\loc\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ro-ro\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pl-pl\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\root\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sv-se\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ja-jp\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-sl\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hu-hu\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\uk-UA\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\cs-cz\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ar-ae\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\cs-cz\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-ma\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\uk-ua\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nl-nl\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\cs-cz\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-ae\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\eu-es\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-cn\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pl-pl\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sl-sl\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\1033\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ar-ae\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-gb\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\_desktop.ini 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe File created C:\Windows\Dll.dll 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3348 wrote to memory of 1932 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 86 PID 3348 wrote to memory of 1932 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 86 PID 3348 wrote to memory of 1932 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 86 PID 1932 wrote to memory of 4752 1932 net.exe 88 PID 1932 wrote to memory of 4752 1932 net.exe 88 PID 1932 wrote to memory of 4752 1932 net.exe 88 PID 3348 wrote to memory of 4872 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 92 PID 3348 wrote to memory of 4872 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 92 PID 3348 wrote to memory of 4872 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 92 PID 4872 wrote to memory of 3288 4872 net.exe 94 PID 4872 wrote to memory of 3288 4872 net.exe 94 PID 4872 wrote to memory of 3288 4872 net.exe 94 PID 3348 wrote to memory of 3368 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 56 PID 3348 wrote to memory of 3368 3348 781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe"C:\Users\Admin\AppData\Local\Temp\781a6cb6dbd2063fef29f230ab38b49e0a934a377ae4d41ac8ca65c830cf95d1.exe"2⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:3288
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5b23b92f5de676e08c3141919828c6fcc
SHA133d86ae4215cf00001b40cb7be48cb60a383bf72
SHA256298dd136453304f6b16f8eb0b8dd2680e9a65555119a2676784c16e895770a19
SHA512054100bc7256843864bcc7790475611746732c713419551ba34fda7ee84f981e2bae5544e7ccf781e945d4e282b6e0b336a53be6e4f16575c2b01efe634a2fbe
-
Filesize
176KB
MD5372fc2a36164fac094bf9fdc79f781ea
SHA1918e77e0612023c23b5053b8a587e83c8b474bc3
SHA256639fe340686660918384500d0deba1dac29901c7376c31f9c7ea21a38d175a12
SHA51285ae5cfe629abdb8567b6e5084d9fdbac9bfffaa841dc122045493d185759145c950591eb34233083e0b1b117de6cb33404b45624ff919c34be628466d9816cb
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize643KB
MD5e0725f04ef2eb236cf23dbdc14d512a5
SHA1ef9875c8bd15d6c9cdcb0a4025470fae9e0d00b2
SHA256ca3e9560c3c22fbb4efc142647d6918fe315dda96b5e00c9f0431f55ca97bcaa
SHA5122dacc3b71e320017826ef563affec0c895cdda9cd293b6814df20aefa5d936e6fbed1d387f9224e533f473243ecb6ea5865d0919f56459c6c3e014e07d241a4e
-
Filesize
10B
MD5688d58fa5756a393f9472937ef284c25
SHA118ee07a5ee8de4fbd046763cd4a55ef2e6c3f808
SHA256e21f27bdf2d90c77d75658b5217d5af4519a6c1bfc326a109eb4a085a2b83302
SHA512c84930eb323c71ffc1edac543a2f60e366de40b39a88b18dba09c1272fae0b12262f4fae496bc9546598507fc37729d829f93b101bbec4739a05be33e0010a3f