Analysis
-
max time kernel
2s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
4a5ab9984aa45765c4d711c0fcc630b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a5ab9984aa45765c4d711c0fcc630b3.exe
Resource
win10v2004-20231215-en
General
-
Target
4a5ab9984aa45765c4d711c0fcc630b3.exe
-
Size
808KB
-
MD5
4a5ab9984aa45765c4d711c0fcc630b3
-
SHA1
efcba49331d144f21b5bab9809803767ef19428b
-
SHA256
7bb4ec3007f12be0904b109f273af1f17df0e1785306f70af013f167dcf4fab2
-
SHA512
09196e8b3b568c27a813127dda951af2263ea5ab5d2cee64e24f689f2410a074ef85ff328bc3ebcc847d33421e642b64af07f29441a7a438de88738464d2f61c
-
SSDEEP
12288:UZWtI6RkVVIerQZb+md4w1UieZJys73dOvXDpNjNe8r:UuhaAerQZb+md4wmieZJ8NI8r
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 4a5ab9984aa45765c4d711c0fcc630b3.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\system\KavUpda.exe 4a5ab9984aa45765c4d711c0fcc630b3.exe File opened for modification C:\Windows\system\KavUpda.exe 4a5ab9984aa45765c4d711c0fcc630b3.exe File created C:\Windows\Help\HelpCat.exe 4a5ab9984aa45765c4d711c0fcc630b3.exe File opened for modification C:\Windows\Help\HelpCat.exe 4a5ab9984aa45765c4d711c0fcc630b3.exe File created C:\Windows\Sysinf.bat 4a5ab9984aa45765c4d711c0fcc630b3.exe File created C:\Windows\regedt32.sys 4a5ab9984aa45765c4d711c0fcc630b3.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1392 sc.exe 3264 sc.exe 2660 sc.exe 1096 sc.exe 656 sc.exe 2612 sc.exe 1072 sc.exe 2412 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 4536 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2728 wrote to memory of 396 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 24 PID 2728 wrote to memory of 396 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 24 PID 2728 wrote to memory of 396 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 24 PID 2728 wrote to memory of 3360 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 209 PID 2728 wrote to memory of 3360 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 209 PID 2728 wrote to memory of 3360 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 209 PID 3360 wrote to memory of 1188 3360 cmd.exe 19 PID 3360 wrote to memory of 1188 3360 cmd.exe 19 PID 3360 wrote to memory of 1188 3360 cmd.exe 19 PID 2728 wrote to memory of 656 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 139 PID 2728 wrote to memory of 656 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 139 PID 2728 wrote to memory of 656 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 139 PID 2728 wrote to memory of 4896 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 104 PID 2728 wrote to memory of 4896 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 104 PID 2728 wrote to memory of 4896 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 104 PID 2728 wrote to memory of 1340 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 103 PID 2728 wrote to memory of 1340 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 103 PID 2728 wrote to memory of 1340 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 103 PID 2728 wrote to memory of 4904 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 99 PID 2728 wrote to memory of 4904 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 99 PID 2728 wrote to memory of 4904 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 99 PID 2728 wrote to memory of 2628 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 98 PID 2728 wrote to memory of 2628 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 98 PID 2728 wrote to memory of 2628 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 98 PID 2728 wrote to memory of 4380 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 132 PID 2728 wrote to memory of 4380 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 132 PID 2728 wrote to memory of 4380 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 132 PID 2728 wrote to memory of 3764 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 94 PID 2728 wrote to memory of 3764 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 94 PID 2728 wrote to memory of 3764 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 94 PID 2728 wrote to memory of 3164 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 92 PID 2728 wrote to memory of 3164 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 92 PID 2728 wrote to memory of 3164 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 92 PID 2728 wrote to memory of 3264 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 89 PID 2728 wrote to memory of 3264 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 89 PID 2728 wrote to memory of 3264 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 89 PID 2728 wrote to memory of 1392 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 86 PID 2728 wrote to memory of 1392 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 86 PID 2728 wrote to memory of 1392 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 86 PID 2728 wrote to memory of 2412 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 85 PID 2728 wrote to memory of 2412 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 85 PID 2728 wrote to memory of 2412 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 85 PID 2728 wrote to memory of 1072 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 84 PID 2728 wrote to memory of 1072 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 84 PID 2728 wrote to memory of 1072 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 84 PID 2728 wrote to memory of 4536 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 64 PID 2728 wrote to memory of 4536 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 64 PID 2728 wrote to memory of 4536 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 64 PID 2728 wrote to memory of 736 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 81 PID 2728 wrote to memory of 736 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 81 PID 2728 wrote to memory of 736 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 81 PID 2728 wrote to memory of 3720 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 80 PID 2728 wrote to memory of 3720 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 80 PID 2728 wrote to memory of 3720 2728 4a5ab9984aa45765c4d711c0fcc630b3.exe 80 PID 2628 wrote to memory of 1096 2628 net.exe 135 PID 2628 wrote to memory of 1096 2628 net.exe 135 PID 2628 wrote to memory of 1096 2628 net.exe 135 PID 4380 wrote to memory of 3116 4380 Conhost.exe 163 PID 4380 wrote to memory of 3116 4380 Conhost.exe 163 PID 4380 wrote to memory of 3116 4380 Conhost.exe 163 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2060 attrib.exe 5048 attrib.exe 3004 attrib.exe 4604 attrib.exe 4508 attrib.exe 3136 attrib.exe 4040 attrib.exe 4400 attrib.exe 3624 attrib.exe 2392 attrib.exe 4412 attrib.exe 1672 attrib.exe 116 attrib.exe 2860 attrib.exe 3724 attrib.exe 3440 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a5ab9984aa45765c4d711c0fcc630b3.exe"C:\Users\Admin\AppData\Local\Temp\4a5ab9984aa45765c4d711c0fcc630b3.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵PID:3360
-
C:\Windows\SysWOW64\at.exeat 3:21:00 AM C:\Windows\Sysinf.bat3⤵PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:396
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:4536
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:1764
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y3⤵PID:1724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat3⤵PID:208
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2040
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:4640
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:4748
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2660
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1096
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:656
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2612
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:4824
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:1104
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:1884
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:3424
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4160
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:816
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:24:00 AM C:\Windows\Sysinf.bat3⤵PID:244
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:21:00 AM C:\Windows\Sysinf.bat3⤵PID:3360
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1672
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 3:21:58 AM C:\Windows\Help\HelpCat.exe3⤵PID:3304
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Suspicious use of WriteProcessMemory
PID:3360
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:944
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4068
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3288
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2204
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3572
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1400
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1260
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3552
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:984
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3144
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:556
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3824
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4804
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1908
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:500
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4964
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4752
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:5060
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4156
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:428
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:3720
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:736
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1072
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2412
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1392
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3264
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:3164
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:3764
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:4380
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2628
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:4904
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:23:57 AM C:\Windows\Sysinf.bat2⤵PID:1340
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:20:57 AM C:\Windows\Sysinf.bat2⤵PID:4896
-
-
C:\Windows\SysWOW64\At.exeAt.exe 3:21:55 AM C:\Windows\Help\HelpCat.exe2⤵PID:656
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:4120
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2256
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:5088
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:364
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:3008
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:3116
-
C:\Windows\SysWOW64\at.exeat 3:23:57 AM C:\Windows\Sysinf.bat1⤵PID:2204
-
C:\Windows\SysWOW64\at.exeat 3:20:57 AM C:\Windows\Sysinf.bat1⤵PID:4428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:4908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2152
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2856
-
C:\Windows\SysWOW64\at.exeat 3:24:00 AM C:\Windows\Sysinf.bat1⤵PID:2516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:4620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:608
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:4380
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3116
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:116
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4508
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:5048
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3004
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2860
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3624
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3724
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3136
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3440
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4040
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2392
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4412
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5144cdc8df60e726da03f122f56c33acd
SHA1efa9865bba0a7c4aa87ed68861d40770661f05ce
SHA2563f7f7a0f1bdc57f9e31d012ab5a9e7348ad5079fa29876b31022d89a68ba0d04
SHA512514d6c84518ade2d62a2f1bc4b684682ac65a71c57169472b9a93eea4e9a7d091cd25db64833cd7eb0747969a67983a55f821144bad29cca84716c52845da494
-
Filesize
808KB
MD54a5ab9984aa45765c4d711c0fcc630b3
SHA1efcba49331d144f21b5bab9809803767ef19428b
SHA2567bb4ec3007f12be0904b109f273af1f17df0e1785306f70af013f167dcf4fab2
SHA51209196e8b3b568c27a813127dda951af2263ea5ab5d2cee64e24f689f2410a074ef85ff328bc3ebcc847d33421e642b64af07f29441a7a438de88738464d2f61c
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6
-
Filesize
93KB
MD57082fd6c1ca3259e70887ede5aef4117
SHA13b704a09555b734f416d06f06c75ce3ca28a7cd9
SHA256337854689ef8fb423e34d83072f29596a2ba6d2a07dfd0c135115ac77b234823
SHA512608f05b726f6b95d0674b4ab5c2943d72d7b5b7ef38711c75b59460eecc774766c35604d0e9482fa946ad81a19732b8fefa322afb76c843f4fce96df46176c3f