Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 16:14
Static task
static1
General
-
Target
36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe
-
Size
165KB
-
MD5
4054d1a69137d186b061739682f98454
-
SHA1
f1f4cab595252a76bd6c6ac065aa3996e5e18b41
-
SHA256
36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536
-
SHA512
0701224c301d86b8f2f092b11a10f49f17de32ba62b329e60a8a65b42729b14dc64f95a151d36146050bb3b6d97abe61fdfeaa59398f87a131c18d2d8572d89c
-
SSDEEP
3072:2EaY46tGNttyeQLYm1s99djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:T46tGdye41WYWBW1Wu3rOOuOVr8
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 5520 Logo1_.exe 4700 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77156\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\Crashpad\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Trust Protection Lists\Sigma\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Office Setup Controller\Office.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EBWebView\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe File created C:\Windows\Logo1_.exe 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe 5520 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4700 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 4700 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 5784 wrote to memory of 744 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 86 PID 5784 wrote to memory of 744 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 86 PID 5784 wrote to memory of 744 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 86 PID 744 wrote to memory of 4200 744 net.exe 88 PID 744 wrote to memory of 4200 744 net.exe 88 PID 744 wrote to memory of 4200 744 net.exe 88 PID 5784 wrote to memory of 3752 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 92 PID 5784 wrote to memory of 3752 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 92 PID 5784 wrote to memory of 3752 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 92 PID 5784 wrote to memory of 5520 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 94 PID 5784 wrote to memory of 5520 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 94 PID 5784 wrote to memory of 5520 5784 36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe 94 PID 5520 wrote to memory of 4656 5520 Logo1_.exe 95 PID 5520 wrote to memory of 4656 5520 Logo1_.exe 95 PID 5520 wrote to memory of 4656 5520 Logo1_.exe 95 PID 4656 wrote to memory of 4768 4656 net.exe 97 PID 4656 wrote to memory of 4768 4656 net.exe 97 PID 4656 wrote to memory of 4768 4656 net.exe 97 PID 3752 wrote to memory of 4700 3752 cmd.exe 98 PID 3752 wrote to memory of 4700 3752 cmd.exe 98 PID 5520 wrote to memory of 4836 5520 Logo1_.exe 99 PID 5520 wrote to memory of 4836 5520 Logo1_.exe 99 PID 5520 wrote to memory of 4836 5520 Logo1_.exe 99 PID 4836 wrote to memory of 2580 4836 net.exe 101 PID 4836 wrote to memory of 2580 4836 net.exe 101 PID 4836 wrote to memory of 2580 4836 net.exe 101 PID 5520 wrote to memory of 3564 5520 Logo1_.exe 56 PID 5520 wrote to memory of 3564 5520 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe"C:\Users\Admin\AppData\Local\Temp\36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5784 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6D8F.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe"C:\Users\Admin\AppData\Local\Temp\36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4700
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5520 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5dc01a6ab4cf6e84d10d802d41c268220
SHA13b45ebeb7158cf667b125efbd2e417071bb2819d
SHA256024c028dcc86ae283878cfe848b86f5539d1c14ebc9f3ef9ee46510c4a30e407
SHA512a7d6f1120067ba5fc44d3fb57dc42f93cb6c08310c3dd3a11fdc42b01dd2931168e0dd0a42f6b8e4b55f6300ce28aae2a96e9d6ebf1498aff56ac305f4fc554d
-
Filesize
582KB
MD5f610140e8045de75c009b0817ec73c97
SHA1c6d4da7f61f9f37c2e136a2c21b3f875c8cbe74e
SHA256a2bdb669d734dd9b58c8012f459bc49e1aa9a539b6adc11d8ad1e31a3ca594b6
SHA5127c634b39c6be95ec8be5861e6cc53cd9e32137b8588da259465f8acf2f7c6c90f475ac143b23ba3c2c27ee7a8265c02485d5dd42ca5b5d94a3cf2bd3240547da
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize644KB
MD5aa1f66c378cbdbcb7882e245c07b9def
SHA1e50b4c0b495f97317f96ae0c42ca452b504e3970
SHA2561aa4de231335138bca74aa29fdf52f58adbe09b68e8d717e6549a0ad400c6f8f
SHA5129894d2bae12941be81164f3d00f9d90b69b421f9dbbd4436937ef667783a70d70c640e3fd5e7855bcb9e9ece0e04d2866140692dadffc19a3de1e8bf661ed9ed
-
Filesize
722B
MD590424d1a2be0facca04d39d1cac6189b
SHA18d006bc7b8538d4149034b820e0a69dd4b0b0db0
SHA256e2e4ef659bec49134e568d8f0f55c56b75606085fb617095eb1d32f9b1c60bf1
SHA512a29a80cd5f090f84e49883a30a7a475fee6d98596187d9f0e732db849475357b6ee77d36e35267263ca3804f15d80bf2222bac3d3ee0bef09e1982cbb5b667c6
-
C:\Users\Admin\AppData\Local\Temp\36a8b512482e6d84cd5ff4b21634cd18ec097778ef09b1f69abd105566250536.exe.exe
Filesize131KB
MD516438a96a8adb85472ca72da04701b29
SHA1b1f5ee8bc083804de4de820255107f6541c84735
SHA2569291cd97d2f1b119438f16e97ea75119f19fd959ec5414e84b337530d692e289
SHA51258f659a29cb34245a261b7666b1cda4b76f2df1039f3713dda6ff5a97c33b4cc273b110d10b4131a6a5c13897efcfa9a5ef3031e0e5fb14db1adc0ac1ef25dcd
-
Filesize
33KB
MD51aeb31ee1d951ea2e78a19f5b23cd7e4
SHA13dd09718e9e4bcc2a03d11456815d56b4e2587c4
SHA256537daec8665ada5375e0c87619d5d0992bfe0e7d9c976702554e20ae857eb6f9
SHA51206cbed6a3557d9f57d0e2e4ace95ff43501dc8a83262db49ce6d4feba98026c5453432048ba3bb55a4c339479d34384c3081d0e2b27daa09a00be0226daed2a1
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
8B
MD5b7ec1da49148e97bf44f32e8f6d562b0
SHA1957456b7a1d8c1f9b7bdfb5105d0d92005e74159
SHA256aba4a691666b271da9aa9ccb8261bb6c7bbf763942555ff56423e46e00d032bb
SHA51230cd415a858163446330517079193e6c9a50f5dd1b08b4536546e508a0f40c7f9da83649a4dd6579b714d27f797ba075fd043be31e6ee6fd44c51a479fb710ae