Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
22cde1adfa90a561aca5a369a79d1a02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22cde1adfa90a561aca5a369a79d1a02.exe
Resource
win10v2004-20231215-en
General
-
Target
22cde1adfa90a561aca5a369a79d1a02.exe
-
Size
522KB
-
MD5
22cde1adfa90a561aca5a369a79d1a02
-
SHA1
a87b02d908006086a862680b7d3f11660fb9b34d
-
SHA256
6d092eaa322e786a2c9cbad2df949070846199a4782e6cd79d32318aadaa653b
-
SHA512
c5d20e44242c9e9259bdfc4362a4a9b47f7b9dce3cf24d8aa1cf14870b8e225bf4197f7f1ea1238c179e8382535f4b640eae35db90da844bcb9c6ca6196083dc
-
SSDEEP
6144:UZfec9EbXDk6RkdKJrG1VVE+IVE2EBE2EZ/UOPSe570Szp34UF40E2E4:UZWtI6RkcudMyOB0pa4r4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 22cde1adfa90a561aca5a369a79d1a02.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Help\HelpCat.exe 22cde1adfa90a561aca5a369a79d1a02.exe File created C:\Windows\Sysinf.bat 22cde1adfa90a561aca5a369a79d1a02.exe File created C:\Windows\regedt32.sys 22cde1adfa90a561aca5a369a79d1a02.exe File created C:\Windows\system\KavUpda.exe 22cde1adfa90a561aca5a369a79d1a02.exe File opened for modification C:\Windows\system\KavUpda.exe 22cde1adfa90a561aca5a369a79d1a02.exe File created C:\Windows\Help\HelpCat.exe 22cde1adfa90a561aca5a369a79d1a02.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3552 sc.exe 3500 sc.exe 1244 sc.exe 3124 sc.exe 4316 sc.exe 936 sc.exe 4836 sc.exe 4312 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 4712 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3208 22cde1adfa90a561aca5a369a79d1a02.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3208 wrote to memory of 3244 3208 22cde1adfa90a561aca5a369a79d1a02.exe 25 PID 3208 wrote to memory of 3244 3208 22cde1adfa90a561aca5a369a79d1a02.exe 25 PID 3208 wrote to memory of 3244 3208 22cde1adfa90a561aca5a369a79d1a02.exe 25 PID 3208 wrote to memory of 3712 3208 22cde1adfa90a561aca5a369a79d1a02.exe 207 PID 3208 wrote to memory of 3712 3208 22cde1adfa90a561aca5a369a79d1a02.exe 207 PID 3208 wrote to memory of 3712 3208 22cde1adfa90a561aca5a369a79d1a02.exe 207 PID 3712 wrote to memory of 4016 3712 Conhost.exe 21 PID 3712 wrote to memory of 4016 3712 Conhost.exe 21 PID 3712 wrote to memory of 4016 3712 Conhost.exe 21 PID 3208 wrote to memory of 3552 3208 22cde1adfa90a561aca5a369a79d1a02.exe 129 PID 3208 wrote to memory of 3552 3208 22cde1adfa90a561aca5a369a79d1a02.exe 129 PID 3208 wrote to memory of 3552 3208 22cde1adfa90a561aca5a369a79d1a02.exe 129 PID 3208 wrote to memory of 3644 3208 22cde1adfa90a561aca5a369a79d1a02.exe 98 PID 3208 wrote to memory of 3644 3208 22cde1adfa90a561aca5a369a79d1a02.exe 98 PID 3208 wrote to memory of 3644 3208 22cde1adfa90a561aca5a369a79d1a02.exe 98 PID 3208 wrote to memory of 4688 3208 22cde1adfa90a561aca5a369a79d1a02.exe 220 PID 3208 wrote to memory of 4688 3208 22cde1adfa90a561aca5a369a79d1a02.exe 220 PID 3208 wrote to memory of 4688 3208 22cde1adfa90a561aca5a369a79d1a02.exe 220 PID 3208 wrote to memory of 3744 3208 22cde1adfa90a561aca5a369a79d1a02.exe 95 PID 3208 wrote to memory of 3744 3208 22cde1adfa90a561aca5a369a79d1a02.exe 95 PID 3208 wrote to memory of 3744 3208 22cde1adfa90a561aca5a369a79d1a02.exe 95 PID 3208 wrote to memory of 968 3208 22cde1adfa90a561aca5a369a79d1a02.exe 94 PID 3208 wrote to memory of 968 3208 22cde1adfa90a561aca5a369a79d1a02.exe 94 PID 3208 wrote to memory of 968 3208 22cde1adfa90a561aca5a369a79d1a02.exe 94 PID 3208 wrote to memory of 1228 3208 22cde1adfa90a561aca5a369a79d1a02.exe 210 PID 3208 wrote to memory of 1228 3208 22cde1adfa90a561aca5a369a79d1a02.exe 210 PID 3208 wrote to memory of 1228 3208 22cde1adfa90a561aca5a369a79d1a02.exe 210 PID 3208 wrote to memory of 2092 3208 22cde1adfa90a561aca5a369a79d1a02.exe 90 PID 3208 wrote to memory of 2092 3208 22cde1adfa90a561aca5a369a79d1a02.exe 90 PID 3208 wrote to memory of 2092 3208 22cde1adfa90a561aca5a369a79d1a02.exe 90 PID 3208 wrote to memory of 4388 3208 22cde1adfa90a561aca5a369a79d1a02.exe 87 PID 3208 wrote to memory of 4388 3208 22cde1adfa90a561aca5a369a79d1a02.exe 87 PID 3208 wrote to memory of 4388 3208 22cde1adfa90a561aca5a369a79d1a02.exe 87 PID 3208 wrote to memory of 4312 3208 22cde1adfa90a561aca5a369a79d1a02.exe 86 PID 3208 wrote to memory of 4312 3208 22cde1adfa90a561aca5a369a79d1a02.exe 86 PID 3208 wrote to memory of 4312 3208 22cde1adfa90a561aca5a369a79d1a02.exe 86 PID 3208 wrote to memory of 4836 3208 22cde1adfa90a561aca5a369a79d1a02.exe 83 PID 3208 wrote to memory of 4836 3208 22cde1adfa90a561aca5a369a79d1a02.exe 83 PID 3208 wrote to memory of 4836 3208 22cde1adfa90a561aca5a369a79d1a02.exe 83 PID 3208 wrote to memory of 936 3208 22cde1adfa90a561aca5a369a79d1a02.exe 222 PID 3208 wrote to memory of 936 3208 22cde1adfa90a561aca5a369a79d1a02.exe 222 PID 3208 wrote to memory of 936 3208 22cde1adfa90a561aca5a369a79d1a02.exe 222 PID 3208 wrote to memory of 4316 3208 22cde1adfa90a561aca5a369a79d1a02.exe 79 PID 3208 wrote to memory of 4316 3208 22cde1adfa90a561aca5a369a79d1a02.exe 79 PID 3208 wrote to memory of 4316 3208 22cde1adfa90a561aca5a369a79d1a02.exe 79 PID 3208 wrote to memory of 4712 3208 22cde1adfa90a561aca5a369a79d1a02.exe 78 PID 3208 wrote to memory of 4712 3208 22cde1adfa90a561aca5a369a79d1a02.exe 78 PID 3208 wrote to memory of 4712 3208 22cde1adfa90a561aca5a369a79d1a02.exe 78 PID 968 wrote to memory of 396 968 net.exe 60 PID 968 wrote to memory of 396 968 net.exe 60 PID 968 wrote to memory of 396 968 net.exe 60 PID 3744 wrote to memory of 4576 3744 net.exe 76 PID 3744 wrote to memory of 4576 3744 net.exe 76 PID 3744 wrote to memory of 4576 3744 net.exe 76 PID 3208 wrote to memory of 60 3208 22cde1adfa90a561aca5a369a79d1a02.exe 224 PID 3208 wrote to memory of 60 3208 22cde1adfa90a561aca5a369a79d1a02.exe 224 PID 3208 wrote to memory of 60 3208 22cde1adfa90a561aca5a369a79d1a02.exe 224 PID 3208 wrote to memory of 3724 3208 22cde1adfa90a561aca5a369a79d1a02.exe 74 PID 3208 wrote to memory of 3724 3208 22cde1adfa90a561aca5a369a79d1a02.exe 74 PID 3208 wrote to memory of 3724 3208 22cde1adfa90a561aca5a369a79d1a02.exe 74 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 3276 attrib.exe 3720 attrib.exe 1376 attrib.exe 220 attrib.exe 4300 attrib.exe 3888 attrib.exe 3268 attrib.exe 2260 attrib.exe 4832 attrib.exe 4300 attrib.exe 4688 attrib.exe 1284 attrib.exe 3616 attrib.exe 1432 attrib.exe 3228 attrib.exe 4324 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22cde1adfa90a561aca5a369a79d1a02.exe"C:\Users\Admin\AppData\Local\Temp\22cde1adfa90a561aca5a369a79d1a02.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵PID:3712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:3244
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:4872
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3560
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:964
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:836
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:3336
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:3552
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:3500
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1244
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:3124
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:2696
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:4128
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:1864
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2488
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:548
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:4416
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:54:10 AM C:\Windows\Sysinf.bat3⤵PID:4028
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:51:10 AM C:\Windows\Sysinf.bat3⤵PID:4692
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:52:08 AM C:\Windows\Help\HelpCat.exe3⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1228
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:5068
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3376
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4008
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:824
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1284
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3064
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:400
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3596
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:708
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1432
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4500
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2300
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4864
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3916
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3800
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3932
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1360
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3076
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1980
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:3724
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:60
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:4712
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:4316
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:936
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:4836
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:4312
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:4388
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2092
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of WriteProcessMemory
PID:3712
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:968
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:3744
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:54:07 AM C:\Windows\Sysinf.bat2⤵PID:4688
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:51:07 AM C:\Windows\Sysinf.bat2⤵PID:3644
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:52:05 AM C:\Windows\Help\HelpCat.exe2⤵PID:3552
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:868
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1232
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:224
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:4392
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:3768
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:4016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4104
-
C:\Windows\SysWOW64\at.exeat 6:54:07 AM C:\Windows\Sysinf.bat1⤵PID:904
-
C:\Windows\SysWOW64\at.exeat 6:51:07 AM C:\Windows\Sysinf.bat1⤵PID:2108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1776
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat1⤵PID:1608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4452
-
C:\Windows\SysWOW64\at.exeat 6:54:10 AM C:\Windows\Sysinf.bat1⤵PID:4420
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:220
-
C:\Windows\SysWOW64\at.exeat 6:51:10 AM C:\Windows\Sysinf.bat1⤵PID:3256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4776
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1432
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3276
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4300
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:60
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3228
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4300
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4324
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1284
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3720
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3888
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3268
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2260
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4832
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1376
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD53f7fbd2eb34892646e93fd5e6e343512
SHA1265ac1061b54f62350fb7a5f57e566454d013a66
SHA256e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7
SHA51253d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140
-
Filesize
98KB
MD52c960b93fc9a79cc19ebc42695f988bd
SHA17ae7e41237224d0343c3597967b7092bd39c1d38
SHA256644cfe7083e5b90c8803049d84ee72d83e9f2571bad469017e1cdda640b450c9
SHA512b5400424ceb191163bf5feb24982a75e43158ad2a5a01da081ad6d80707c207505333b2c8c5c60097ca810751f8206ad6136eccc1a5a909dfd4f543e2e5d0a7e