Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe
Resource
win7-20240903-en
General
-
Target
484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe
-
Size
33KB
-
MD5
5b653ac1a80f0bf1d5f481b3f26870ec
-
SHA1
88da99a3a16369cdeeb3ce0b5e7278480e804fdc
-
SHA256
484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09
-
SHA512
38948a310b13ca4f0117b263973b0aef9fbe20dfee8d76d1bcba5be0149d6d9a31d7cff03b7e615c442ab3fd3e9410a3ab512f42377660782cb6a56947a71ac6
-
SSDEEP
768:2gQm2kElOIEvzMXqtwp/lttaL7HP4EUi91acSWGoYoLVCm1:2g4kaYzMXqtGNttyeiZnZLYm1
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\Y: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\L: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\K: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\I: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\H: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\G: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\U: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\O: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\M: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\J: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\E: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\X: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\W: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\V: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\T: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\R: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\Q: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\P: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\S: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened (read-only) \??\N: 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sv-se\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-ma\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ICE\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\da-dk\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Java\jre-1.8\bin\dtplugin\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Microsoft Office\root\Licenses\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ro-ro\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\de-DE\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ro-ro\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-ae\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Google\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\LC_MESSAGES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ca-es\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ja-jp\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-ae\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hr-hr\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-ae\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\he-il\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\LC_MESSAGES\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-fr\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nl-nl\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-sl\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sl-si\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STRTEDGE\_desktop.ini 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundl132.exe 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe File created C:\Windows\Dll.dll 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 452 wrote to memory of 5060 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 83 PID 452 wrote to memory of 5060 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 83 PID 452 wrote to memory of 5060 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 83 PID 5060 wrote to memory of 3628 5060 net.exe 85 PID 5060 wrote to memory of 3628 5060 net.exe 85 PID 5060 wrote to memory of 3628 5060 net.exe 85 PID 452 wrote to memory of 2300 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 86 PID 452 wrote to memory of 2300 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 86 PID 452 wrote to memory of 2300 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 86 PID 2300 wrote to memory of 1460 2300 net.exe 88 PID 2300 wrote to memory of 1460 2300 net.exe 88 PID 2300 wrote to memory of 1460 2300 net.exe 88 PID 452 wrote to memory of 3436 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 56 PID 452 wrote to memory of 3436 452 484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe"C:\Users\Admin\AppData\Local\Temp\484e005403ef562ce8676f4a6669ce9e5fbef9db52766c96c0228f53af237d09.exe"2⤵
- Drops file in Drivers directory
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5dbfb2c1fa2f8a1b766bf84bf8bf2b1eb
SHA159844666fe5caac477328ed0a7f19dedcbc7949e
SHA2562d27c03ba6eef6e353ae0f9b8d004b76e6c80368b9af3a98ce98da7e2eb75cc8
SHA512617b48be373f2276c9f84e133b9e0dde498ae27644e503d06ff353b03e2a7cd0395dde8083c6ee474fdcdce38c5bfd417069267e68e9a77ca4e43d87d9d1f21f
-
Filesize
177KB
MD587149c9c7623b05df47e405a061df836
SHA1f8b1fdc2912c157706f55e5f7b4d8878a5b650b5
SHA25651ef220c737919e280a8816633ffafe4984d2276ca0c8a1b9a8a121e53d92922
SHA512e3ffe9fded5e69010f003175dba217d9f094252484e9aeffb0430b643bf9e04b7e9ea76f1545294e20944cb5f3bec36c1a084b7adfe5c5a47ee14428e932eb68
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD5d3f7a4609bee92e23ccb350fb23b9a7b
SHA1c543400938d8f8843c31089afea9a3e73bb5919a
SHA2567f1318a0912a33c7f571912a1f41e060167e64684fe1e4b45d2fc7a6add89d04
SHA512c5e16ba4a754d48b64b8b5eac36271e9449c682d2a44f14e7fb6aa7ecde3e30836573097fc79de6679d1f0e73ba80f9cfa8bbcf584698412bd1175e8823f74d4
-
Filesize
10B
MD567a49ff5f9f7d1aa068672249a49c946
SHA179707896b9d33e7189bdaab8280f506d2ac162d1
SHA25605637f6925cac0879a4a76fd521facc96cbaa18ff8f73675814f6218a3226a8f
SHA51243919a1b4db0da1acde17d6f6cd0604e701e2c5d3339edd994f79fa54b09d7323caa9150f6c9b6db7c2aae04a6ade1bc1e9de4a8bd1913381c52f00c26b39a3f