Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
Resource
win10v2004-20220901-en
General
-
Target
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
-
Size
32KB
-
MD5
ebd4ff5dd3b586aa279899a33dbc093b
-
SHA1
f861dc94a155c8a3d7952c79eca146ef61123c39
-
SHA256
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e
-
SHA512
973561d45cc8e4b31a91f0daf4504f555b34c352fd0d26750b4e3693ee38161881908598e909beaf2c2616b394f2a9dbdf5091158ae7594c09448329ad96dcf6
-
SSDEEP
192:/Tmxc4FkYQPY7bKTpBVhUkEV/r0rwxk1VY+gkGG2KM/qqleJnJtM3gxU4kzk/xA0:/TAnuAApBVhUfo16oCGvjc8WlD94o6
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time = "c:\\users\\public\\windows\\m.e.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time2 = "c:\\users\\public\\windows\\dl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time = "c:\\users\\public\\windows\\m.e.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time2 = "c:\\users\\public\\windows\\dl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 1532 taskkill.exe 808 taskkill.exe 460 taskkill.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 18 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe2300001000d09ad3fd8f23af46adb46c85480369c700000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 808 taskkill.exe Token: SeDebugPrivilege 460 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exeexplorer.exepid process 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 1804 explorer.exe 1804 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1736 wrote to memory of 1532 1736 cmd.exe taskkill.exe PID 1736 wrote to memory of 1532 1736 cmd.exe taskkill.exe PID 1736 wrote to memory of 1532 1736 cmd.exe taskkill.exe PID 1736 wrote to memory of 1532 1736 cmd.exe taskkill.exe PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1560 wrote to memory of 808 1560 cmd.exe taskkill.exe PID 1560 wrote to memory of 808 1560 cmd.exe taskkill.exe PID 1560 wrote to memory of 808 1560 cmd.exe taskkill.exe PID 1560 wrote to memory of 808 1560 cmd.exe taskkill.exe PID 268 wrote to memory of 832 268 cmd.exe explorer.exe PID 268 wrote to memory of 832 268 cmd.exe explorer.exe PID 268 wrote to memory of 832 268 cmd.exe explorer.exe PID 268 wrote to memory of 832 268 cmd.exe explorer.exe PID 1804 wrote to memory of 2032 1804 cmd.exe attrib.exe PID 1804 wrote to memory of 2032 1804 cmd.exe attrib.exe PID 1804 wrote to memory of 2032 1804 cmd.exe attrib.exe PID 1804 wrote to memory of 2032 1804 cmd.exe attrib.exe PID 1320 wrote to memory of 1764 1320 cmd.exe reg.exe PID 1320 wrote to memory of 1764 1320 cmd.exe reg.exe PID 1320 wrote to memory of 1764 1320 cmd.exe reg.exe PID 1320 wrote to memory of 1764 1320 cmd.exe reg.exe PID 1824 wrote to memory of 1708 1824 cmd.exe reg.exe PID 1824 wrote to memory of 1708 1824 cmd.exe reg.exe PID 1824 wrote to memory of 1708 1824 cmd.exe reg.exe PID 1824 wrote to memory of 1708 1824 cmd.exe reg.exe PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2032 attrib.exe 1648 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im dl.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c explorer C:\users\public\windows\dl.exe2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\users\public\windows\dl.exe3⤵PID:832
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f3⤵
- Adds Run key to start application
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f3⤵
- Adds Run key to start application
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt2⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c attrib +h +r +s c:\Users\public\windows2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s c:\Users\public\windows3⤵
- Views/modifies file attributes
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im file.sys2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im file.sys3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:808 -
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe2⤵PID:1340
-
C:\Windows\SysWOW64\cmd.execmd /c dir C:\ > C:\users\public\windows\Att\abban.txt2⤵PID:1536
-
C:\Windows\SysWOW64\cmd.execmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:968
-
C:\Windows\SysWOW64\cmd.execmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1268
-
C:\Windows\SysWOW64\cmd.execmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1360
-
C:\Windows\SysWOW64\cmd.execmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1956
-
C:\Windows\SysWOW64\cmd.execmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1280
-
C:\Windows\SysWOW64\cmd.execmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1504
-
C:\Windows\SysWOW64\cmd.execmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:620
-
C:\Windows\SysWOW64\cmd.execmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:488
-
C:\Windows\SysWOW64\cmd.execmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1056
-
C:\Windows\SysWOW64\cmd.execmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1492
-
C:\Windows\SysWOW64\cmd.execmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:744
-
C:\Windows\SysWOW64\cmd.execmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1560
-
C:\Windows\SysWOW64\cmd.execmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:772
-
C:\Windows\SysWOW64\cmd.execmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:552
-
C:\Windows\SysWOW64\cmd.execmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1180
-
C:\Windows\SysWOW64\cmd.execmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1420
-
C:\Windows\SysWOW64\cmd.execmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt2⤵PID:1184
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\pic.jpg2⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\log.txt2⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\key.txt2⤵PID:936
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\abban.txt2⤵PID:1408
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f2⤵PID:1700
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f3⤵
- Adds Run key to start application
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f2⤵PID:944
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f3⤵
- Adds Run key to start application
PID:856 -
C:\Windows\SysWOW64\cmd.execmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt2⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c attrib +h +r +s c:\Users\public\windows2⤵PID:1340
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s c:\Users\public\windows3⤵
- Views/modifies file attributes
PID:1648 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im file.sys2⤵PID:1180
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im file.sys3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:460 -
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe2⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd /c dir C:\ > C:\users\public\windows\Att\abban.txt2⤵PID:1964
-
C:\Windows\SysWOW64\cmd.execmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1592
-
C:\Windows\SysWOW64\cmd.execmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:608
-
C:\Windows\SysWOW64\cmd.execmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1408
-
C:\Windows\SysWOW64\cmd.execmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1444
-
C:\Windows\SysWOW64\cmd.execmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:552
-
C:\Windows\SysWOW64\cmd.execmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:988
-
C:\Windows\SysWOW64\cmd.execmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:820
-
C:\Windows\SysWOW64\cmd.execmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:328
-
C:\Windows\SysWOW64\cmd.execmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:880
-
C:\Windows\SysWOW64\cmd.execmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1424
-
C:\Windows\SysWOW64\cmd.execmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1948
-
C:\Windows\SysWOW64\cmd.execmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt2⤵PID:436
-
C:\Windows\SysWOW64\cmd.execmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\pic.jpg2⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\log.txt2⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\key.txt2⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\abban.txt2⤵PID:1532
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1804