Malware Analysis Report

2025-08-06 01:42

Sample ID 241108-2a6r2azqdw
Target 4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9
SHA256 4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9
Tags
discovery spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9

Threat Level: Likely malicious

The file 4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9 was found to be: Likely malicious.

Malicious Activity Summary

discovery spyware stealer

Drops file in Drivers directory

Executes dropped EXE

Reads user/profile data of web browsers

Loads dropped DLL

Deletes itself

Drops startup file

Enumerates connected drives

Drops file in Windows directory

Drops file in Program Files directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Runs net.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-08 22:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-08 22:23

Reported

2024-11-08 22:26

Platform

win7-20240903-en

Max time kernel

150s

Max time network

121s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Logo1_.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 540 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\net.exe
PID 540 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\net.exe
PID 540 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\net.exe
PID 540 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\net.exe
PID 1748 wrote to memory of 2328 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1748 wrote to memory of 2328 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1748 wrote to memory of 2328 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1748 wrote to memory of 2328 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 540 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\cmd.exe
PID 540 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\cmd.exe
PID 540 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\cmd.exe
PID 540 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\cmd.exe
PID 540 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\Logo1_.exe
PID 540 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\Logo1_.exe
PID 540 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\Logo1_.exe
PID 540 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\Logo1_.exe
PID 2604 wrote to memory of 2756 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2604 wrote to memory of 2756 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2604 wrote to memory of 2756 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2604 wrote to memory of 2756 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2820 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe
PID 2820 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe
PID 2820 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe
PID 2820 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe
PID 2756 wrote to memory of 2780 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2756 wrote to memory of 2780 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2756 wrote to memory of 2780 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2756 wrote to memory of 2780 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2604 wrote to memory of 2520 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2604 wrote to memory of 2520 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2604 wrote to memory of 2520 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2604 wrote to memory of 2520 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2520 wrote to memory of 2792 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2520 wrote to memory of 2792 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2520 wrote to memory of 2792 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2520 wrote to memory of 2792 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2604 wrote to memory of 1220 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2604 wrote to memory of 1220 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe

"C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$aD97D.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe

"C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/540-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$aD97D.bat

MD5 7e9388207e7f4a30351f2b46e1c3fc5c
SHA1 0cf566df14f300a8ebfa5c33db1701ea368ff440
SHA256 5af2be398d842ae9917d8994ad4b2a96fc70e54e1420b535d0545875bec8e9f5
SHA512 ebde1193bb03174ca94b194a5edd0dc5078fd0ad150c8180503cb8a47f28c83e8ec6c47c6d4a30a6e6b5baf917d5be58a126a6014fb252a3ebc401739d1ebd9e

memory/540-13-0x0000000000280000-0x00000000002BE000-memory.dmp

memory/540-18-0x0000000000280000-0x00000000002BE000-memory.dmp

C:\Windows\Logo1_.exe

MD5 d007ba1e4eeb2cdfab3ffb93fd6e633e
SHA1 3d115a5172590bc064759862740b3da85f0a53ed
SHA256 cd8fd660f0756f41ee0c16078f6b3d1a5467c6b17d4901e2fa7c8b78e00d394f
SHA512 566eaef62447968bd6bfece924d432655c5860588dc91fd902ca90b09c224c74537d61605d0839409fac915b1a52e2f8b464c7b71a0dc1371026c777950474f5

memory/540-19-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 7e3a0edd0c6cd8316f4b6c159d5167a1
SHA1 753428b4736ffb2c9e3eb50f89255b212768c55a
SHA256 1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA512 9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe

MD5 5f1707646575d375c50155832477a437
SHA1 9bcba378189c2f1cb00f82c0539e0e9b8ff0b6c1
SHA256 75d348a3330bc527b2b2ff8a0789f711bd51461126f8df0c0aa1647e9d976809
SHA512 2f55dd13abfeb5af133ac5afb43c90fd10618e8fb241f50529241cff7987fff382cf151146855c37ad8ae0401b34f6d9aa32cbec03cdd67a224dfe247bad6c99

memory/1220-31-0x0000000002600000-0x0000000002601000-memory.dmp

memory/2604-35-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\_desktop.ini

MD5 f7d2b8208aeaba3c31668cdcaae5c0d7
SHA1 dbf13d797480dc1a10de2a6164557103660e81c9
SHA256 70e7188042cdd89d0c810f2efbce72a86afd08d50aaa4b527f96a802a1e139b9
SHA512 972ff3f39a2693026bb2b8baacb54564b9ceb80e9073ed338ec80d413a7cd6b126969068f44f196b93864ea82e6dbeada0ffc94c65754b7bba82469386161c40

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 3a2ce084ea775ff944454f32ca6a26d8
SHA1 f9ca6da1eeb2830121d029e580c766579e86094d
SHA256 a966b2e0c440ce0f35192ba7d696b9a145a83c49a832422de5f48c74d7dae090
SHA512 af907b3087a6bddf80158fb06ff4853e70e3fec6d97dbf2666e3e506fb8a2afafb45f11b5b429538674b5c40004fe8354c87759e62ec7198750453dc72448446

memory/2604-2748-0x0000000000400000-0x000000000043E000-memory.dmp

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 019082f498c0949c6aa31e64b11322a0
SHA1 cca050e889ae63f6ebe78062d5f270358e315901
SHA256 9e8d3b9a6ebc8b557e726d77543293be0774b3aaf4c6047dcdc56cd31c4288ed
SHA512 4df702ad235babd4b450370e8a82a385e543e411393a5f4b095a705b6522143fb85bdeb7c8a8306d016369ecf2d28eb4694917840d7f593622c39c637666ed65

memory/2604-4153-0x0000000000400000-0x000000000043E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-08 22:23

Reported

2024-11-08 22:26

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

139s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ar-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\tr-tr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sk-sk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\dark\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\ja-JP\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\root\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\bin\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre-1.8\bin\dtplugin\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\he-il\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\da-dk\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pt-br\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\tr-tr\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\eu-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ru-ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ro-ro\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Crashpad\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ja-jp\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-fr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\7-Zip\7z.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\lib\management\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ro-ro\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Logo1_.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4772 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\net.exe
PID 4772 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\net.exe
PID 4772 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\net.exe
PID 4840 wrote to memory of 2788 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4840 wrote to memory of 2788 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4840 wrote to memory of 2788 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4772 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\cmd.exe
PID 4772 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\cmd.exe
PID 4772 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\SysWOW64\cmd.exe
PID 4772 wrote to memory of 4144 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\Logo1_.exe
PID 4772 wrote to memory of 4144 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\Logo1_.exe
PID 4772 wrote to memory of 4144 N/A C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe C:\Windows\Logo1_.exe
PID 4144 wrote to memory of 3204 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4144 wrote to memory of 3204 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4144 wrote to memory of 3204 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 3204 wrote to memory of 4124 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3204 wrote to memory of 4124 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3204 wrote to memory of 4124 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4956 wrote to memory of 4472 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe
PID 4956 wrote to memory of 4472 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe
PID 4144 wrote to memory of 1972 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4144 wrote to memory of 1972 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 4144 wrote to memory of 1972 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1972 wrote to memory of 4708 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1972 wrote to memory of 4708 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1972 wrote to memory of 4708 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4144 wrote to memory of 3536 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 4144 wrote to memory of 3536 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe

"C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD2B1.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe

"C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 101.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 66.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 103.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp

Files

memory/4772-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\Logo1_.exe

MD5 d007ba1e4eeb2cdfab3ffb93fd6e633e
SHA1 3d115a5172590bc064759862740b3da85f0a53ed
SHA256 cd8fd660f0756f41ee0c16078f6b3d1a5467c6b17d4901e2fa7c8b78e00d394f
SHA512 566eaef62447968bd6bfece924d432655c5860588dc91fd902ca90b09c224c74537d61605d0839409fac915b1a52e2f8b464c7b71a0dc1371026c777950474f5

memory/4144-9-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4772-12-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 6f4adf207ef402d9ef40c6aa52ffd245
SHA1 4b05b495619c643f02e278dede8f5b1392555a57
SHA256 d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512 a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

C:\Users\Admin\AppData\Local\Temp\$$aD2B1.bat

MD5 71c43b888a4995939c4a473dc81e3463
SHA1 48f66b43eeb8bb1f4b4100e6281760cb395bee04
SHA256 ac77ccd962ccfce57697e5fa8d8d95621cd7f2f33ea582f2ab51a856d790c297
SHA512 dc29f8a8e75988217bb7729e4747ac18448ea2aa30d1930aba127db9c8e4a0e08588c40ed5948b82303928e3bd6d34c65de30a55c8a61dda965b74384df4f6cd

C:\Users\Admin\AppData\Local\Temp\4b1eef4267c3e8cba2b61c5f3e4d852b9dc3909c8a386754595852d723cc05e9.exe.exe

MD5 5f1707646575d375c50155832477a437
SHA1 9bcba378189c2f1cb00f82c0539e0e9b8ff0b6c1
SHA256 75d348a3330bc527b2b2ff8a0789f711bd51461126f8df0c0aa1647e9d976809
SHA512 2f55dd13abfeb5af133ac5afb43c90fd10618e8fb241f50529241cff7987fff382cf151146855c37ad8ae0401b34f6d9aa32cbec03cdd67a224dfe247bad6c99

memory/4144-20-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\_desktop.ini

MD5 f7d2b8208aeaba3c31668cdcaae5c0d7
SHA1 dbf13d797480dc1a10de2a6164557103660e81c9
SHA256 70e7188042cdd89d0c810f2efbce72a86afd08d50aaa4b527f96a802a1e139b9
SHA512 972ff3f39a2693026bb2b8baacb54564b9ceb80e9073ed338ec80d413a7cd6b126969068f44f196b93864ea82e6dbeada0ffc94c65754b7bba82469386161c40

C:\Program Files\7-Zip\7z.exe

MD5 9e57676bee124a201cc6639076ad64c9
SHA1 848d04885996b731f219c5783a46dd712db365bc
SHA256 d559b99e49b1536f79070887562b74105b592030b8cfd52e02d2d10cf3686123
SHA512 c985a839e252a907927dccc806c1bae8059cb714f1d70553f5d4e95c11e9b4fc9e284be4460e0815fb9817d971e78b18cf332b513b777ca9c8f38a0453b349f2

memory/4144-2664-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

MD5 b680c181f5048bd3d4a305c549d55115
SHA1 3bbd421e29c80be0e9c2569c7fc4c587f9fca351
SHA256 312aacd186d667385d29069f550a87ee8b913b15d9db8e0c09b598e7016f1164
SHA512 1e18b84430e6cd3f63c4273c36374c4ac21ae65e58c0dc9d631c94e88c933e78880db6a51c0ca06dee204d663ee6ca61a01fc350ffe95ad0162eca98cd847f88

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 8e5b627bb5f78df2e26625f8636040fd
SHA1 eb92391d842cb343d42472b1e900b2f08aaacbbc
SHA256 538fb15bde83e854625335dcfbf98ad8ca7f58e327ea8ca45467f319ad197d52
SHA512 6ff9f06bdbee6039d61e57963f551835120ed285f0ef3b07d8091619d1804ac9e780fba396941b96391292af77ee52b4a0bf3945bf7b1c4a6886f06ab22ada9c

memory/4144-8865-0x0000000000400000-0x000000000043E000-memory.dmp