Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe
Resource
win7-20240903-en
General
-
Target
484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe
-
Size
33KB
-
MD5
5b653ac1a80f0bf1d5f481b3f26870ec
-
SHA1
88da99a3a16369cdeeb3ce0b5e7278480e804fdc
-
SHA256
484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09
-
SHA512
38948a310b13ca4f0117b263973b0aef9fbe20dfee8d76d1bcba5be0149d6d9a31d7cff03b7e615c442ab3fd3e9410a3ab512f42377660782cb6a56947a71ac6
-
SSDEEP
768:2gQm2kElOIEvzMXqtwp/lttaL7HP4EUi91acSWGoYoLVCm1:2g4kaYzMXqtGNttyeiZnZLYm1
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\V: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\S: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\O: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\L: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\G: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\E: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\Z: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\R: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\Q: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\K: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\I: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\W: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\N: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\X: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\U: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\T: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\P: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\M: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\J: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\H: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\amd64\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Windows NT\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\locale\lo\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\DVD Maker\de-DE\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Common Files\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\DVD Maker\en-US\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Windows\Dll.dll 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2100 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 30 PID 2236 wrote to memory of 2100 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 30 PID 2236 wrote to memory of 2100 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 30 PID 2236 wrote to memory of 2100 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 30 PID 2100 wrote to memory of 2204 2100 net.exe 32 PID 2100 wrote to memory of 2204 2100 net.exe 32 PID 2100 wrote to memory of 2204 2100 net.exe 32 PID 2100 wrote to memory of 2204 2100 net.exe 32 PID 2236 wrote to memory of 2496 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 33 PID 2236 wrote to memory of 2496 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 33 PID 2236 wrote to memory of 2496 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 33 PID 2236 wrote to memory of 2496 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 33 PID 2496 wrote to memory of 2860 2496 net.exe 35 PID 2496 wrote to memory of 2860 2496 net.exe 35 PID 2496 wrote to memory of 2860 2496 net.exe 35 PID 2496 wrote to memory of 2860 2496 net.exe 35 PID 2236 wrote to memory of 1192 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 21 PID 2236 wrote to memory of 1192 2236 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe"C:\Users\Admin\AppData\Local\Temp\484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe"2⤵
- Drops file in Drivers directory
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD502a15301854adbc4e8ad37f0d6ac5c03
SHA1760a8ae9e36a40126b558a3b073b1103f4078c29
SHA2562cf57f4d69c7691afee33568160e2247da689d85899306a80ac42016b0177efd
SHA512e41eda8a876abdba6bdffb193a5026ec15f458f70f31680196f5254dc1c72c5fb5dc1dea3d215d9832e99dfadf135ad07e0713734c5f81d4347cdce8086a7a7d
-
Filesize
964KB
MD58459c78088e3071aa1b2f7adee6f2c91
SHA15c618e50eb9fcec163344c88e560f1c630b512cb
SHA256e2e7454cc8da28dd4141886c04d532caa252bf56bd96d9e37b554e8366c58603
SHA51266de0c2d8976e4120f07ecc35bff1b35dc0c4743451c30cc69feb3e03e1e8a0e4de6bd662f3895b02a93ff9a453846eee2e9902405cbf73ea579e67accb9adad
-
Filesize
478KB
MD51706fdf65cef436b46a82b4b41b2fe8c
SHA19abac806be214e186a0fcc890ec19d5b98a58e82
SHA256e32e35c6077821d95c687f149d27a8046d5285397927b9b56f386a860eea02dc
SHA5126a8e5a6092bc2dc6e8bcebaf6dd53c1afb763a8e8dd0419ea848c1c73511675ec61b8070a0211ef68971f8d819910367a4ac14b0dca56598b0ab18e722d70ef2
-
Filesize
10B
MD567a49ff5f9f7d1aa068672249a49c946
SHA179707896b9d33e7189bdaab8280f506d2ac162d1
SHA25605637f6925cac0879a4a76fd521facc96cbaa18ff8f73675814f6218a3226a8f
SHA51243919a1b4db0da1acde17d6f6cd0604e701e2c5d3339edd994f79fa54b09d7323caa9150f6c9b6db7c2aae04a6ade1bc1e9de4a8bd1913381c52f00c26b39a3f