Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 03:27
Static task
static1
Behavioral task
behavioral1
Sample
503d5e1209115203196133e5fd2d239c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
503d5e1209115203196133e5fd2d239c.exe
Resource
win10v2004-20231215-en
General
-
Target
503d5e1209115203196133e5fd2d239c.exe
-
Size
2.1MB
-
MD5
503d5e1209115203196133e5fd2d239c
-
SHA1
ab57cb00ea4b88e1cd9910ad076bb3939e7e0305
-
SHA256
2775c1b803dbf926b91038d66d15a6ae1322a33f655a0626ad4c23b376850e95
-
SHA512
70e2ebb1f3dd91f9e6ad0ec913032069a259dc0059da96c9da77fb50e16432301ba4a07d0aeec29b7099b2aa5316fc94b5e5b9d69600b586a764576ca4b40fab
-
SSDEEP
24576:UuhaSOA2eZJ8NI8NahrOWrTxHrTxOPln2teZlqmT2qmTpJqsaS2ROv:bb8NKT/B/2lnoQqC2qC7lqROv
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Executes dropped EXE 2 IoCs
pid Process 3704 KavUpda.exe 2408 503d5e1209115203196133e5fd2d239c~4.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\Autorun.inf KavUpda.exe File opened for modification C:\Autorun.inf KavUpda.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Option.bat KavUpda.exe File created C:\Windows\SysWOW64\Option.bat 503d5e1209115203196133e5fd2d239c.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\7-Zip\7z.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 503d5e1209115203196133e5fd2d239c.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system\KavUpda.exe 503d5e1209115203196133e5fd2d239c.exe File created C:\Windows\Help\HelpCat.exe 503d5e1209115203196133e5fd2d239c.exe File created C:\Windows\Sysinf.bat 503d5e1209115203196133e5fd2d239c.exe File created C:\Windows\regedt32.sys 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Windows\regedt32.sys KavUpda.exe File opened for modification C:\Windows\Help\HelpCat.exe 503d5e1209115203196133e5fd2d239c.exe File opened for modification C:\Windows\system\KavUpda.exe KavUpda.exe File opened for modification C:\Windows\Sysinf.bat KavUpda.exe File created C:\Windows\regedt32.sys KavUpda.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2900 sc.exe 3212 sc.exe 1556 sc.exe 4960 sc.exe 4772 sc.exe 2844 sc.exe 4116 sc.exe 1980 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2460 regedit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 3704 KavUpda.exe Token: SeIncBasePriorityPrivilege 3704 KavUpda.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe Token: 33 1680 503d5e1209115203196133e5fd2d239c.exe Token: SeIncBasePriorityPrivilege 1680 503d5e1209115203196133e5fd2d239c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1680 503d5e1209115203196133e5fd2d239c.exe 3704 KavUpda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1688 1680 503d5e1209115203196133e5fd2d239c.exe 28 PID 1680 wrote to memory of 1688 1680 503d5e1209115203196133e5fd2d239c.exe 28 PID 1680 wrote to memory of 1688 1680 503d5e1209115203196133e5fd2d239c.exe 28 PID 1680 wrote to memory of 5112 1680 503d5e1209115203196133e5fd2d239c.exe 31 PID 1680 wrote to memory of 5112 1680 503d5e1209115203196133e5fd2d239c.exe 31 PID 1680 wrote to memory of 5112 1680 503d5e1209115203196133e5fd2d239c.exe 31 PID 5112 wrote to memory of 3156 5112 net.exe 30 PID 5112 wrote to memory of 3156 5112 net.exe 30 PID 5112 wrote to memory of 3156 5112 net.exe 30 PID 1680 wrote to memory of 4960 1680 503d5e1209115203196133e5fd2d239c.exe 155 PID 1680 wrote to memory of 4960 1680 503d5e1209115203196133e5fd2d239c.exe 155 PID 1680 wrote to memory of 4960 1680 503d5e1209115203196133e5fd2d239c.exe 155 PID 1680 wrote to memory of 2104 1680 503d5e1209115203196133e5fd2d239c.exe 111 PID 1680 wrote to memory of 2104 1680 503d5e1209115203196133e5fd2d239c.exe 111 PID 1680 wrote to memory of 2104 1680 503d5e1209115203196133e5fd2d239c.exe 111 PID 1680 wrote to memory of 3464 1680 503d5e1209115203196133e5fd2d239c.exe 109 PID 1680 wrote to memory of 3464 1680 503d5e1209115203196133e5fd2d239c.exe 109 PID 1680 wrote to memory of 3464 1680 503d5e1209115203196133e5fd2d239c.exe 109 PID 1680 wrote to memory of 2040 1680 503d5e1209115203196133e5fd2d239c.exe 71 PID 1680 wrote to memory of 2040 1680 503d5e1209115203196133e5fd2d239c.exe 71 PID 1680 wrote to memory of 2040 1680 503d5e1209115203196133e5fd2d239c.exe 71 PID 1680 wrote to memory of 2932 1680 503d5e1209115203196133e5fd2d239c.exe 107 PID 1680 wrote to memory of 2932 1680 503d5e1209115203196133e5fd2d239c.exe 107 PID 1680 wrote to memory of 2932 1680 503d5e1209115203196133e5fd2d239c.exe 107 PID 1680 wrote to memory of 208 1680 503d5e1209115203196133e5fd2d239c.exe 106 PID 1680 wrote to memory of 208 1680 503d5e1209115203196133e5fd2d239c.exe 106 PID 1680 wrote to memory of 208 1680 503d5e1209115203196133e5fd2d239c.exe 106 PID 1680 wrote to memory of 4036 1680 503d5e1209115203196133e5fd2d239c.exe 139 PID 1680 wrote to memory of 4036 1680 503d5e1209115203196133e5fd2d239c.exe 139 PID 1680 wrote to memory of 4036 1680 503d5e1209115203196133e5fd2d239c.exe 139 PID 1680 wrote to memory of 1412 1680 503d5e1209115203196133e5fd2d239c.exe 140 PID 1680 wrote to memory of 1412 1680 503d5e1209115203196133e5fd2d239c.exe 140 PID 1680 wrote to memory of 1412 1680 503d5e1209115203196133e5fd2d239c.exe 140 PID 1680 wrote to memory of 1556 1680 503d5e1209115203196133e5fd2d239c.exe 99 PID 1680 wrote to memory of 1556 1680 503d5e1209115203196133e5fd2d239c.exe 99 PID 1680 wrote to memory of 1556 1680 503d5e1209115203196133e5fd2d239c.exe 99 PID 1680 wrote to memory of 3212 1680 503d5e1209115203196133e5fd2d239c.exe 98 PID 1680 wrote to memory of 3212 1680 503d5e1209115203196133e5fd2d239c.exe 98 PID 1680 wrote to memory of 3212 1680 503d5e1209115203196133e5fd2d239c.exe 98 PID 1680 wrote to memory of 2900 1680 503d5e1209115203196133e5fd2d239c.exe 96 PID 1680 wrote to memory of 2900 1680 503d5e1209115203196133e5fd2d239c.exe 96 PID 1680 wrote to memory of 2900 1680 503d5e1209115203196133e5fd2d239c.exe 96 PID 1680 wrote to memory of 1980 1680 503d5e1209115203196133e5fd2d239c.exe 74 PID 1680 wrote to memory of 1980 1680 503d5e1209115203196133e5fd2d239c.exe 74 PID 1680 wrote to memory of 1980 1680 503d5e1209115203196133e5fd2d239c.exe 74 PID 1680 wrote to memory of 2460 1680 503d5e1209115203196133e5fd2d239c.exe 75 PID 1680 wrote to memory of 2460 1680 503d5e1209115203196133e5fd2d239c.exe 75 PID 1680 wrote to memory of 2460 1680 503d5e1209115203196133e5fd2d239c.exe 75 PID 2932 wrote to memory of 2464 2932 net.exe 92 PID 2932 wrote to memory of 2464 2932 net.exe 92 PID 2932 wrote to memory of 2464 2932 net.exe 92 PID 2040 wrote to memory of 3700 2040 net.exe 76 PID 2040 wrote to memory of 3700 2040 net.exe 76 PID 2040 wrote to memory of 3700 2040 net.exe 76 PID 1680 wrote to memory of 2140 1680 503d5e1209115203196133e5fd2d239c.exe 91 PID 1680 wrote to memory of 2140 1680 503d5e1209115203196133e5fd2d239c.exe 91 PID 1680 wrote to memory of 2140 1680 503d5e1209115203196133e5fd2d239c.exe 91 PID 1680 wrote to memory of 3136 1680 503d5e1209115203196133e5fd2d239c.exe 90 PID 1680 wrote to memory of 3136 1680 503d5e1209115203196133e5fd2d239c.exe 90 PID 1680 wrote to memory of 3136 1680 503d5e1209115203196133e5fd2d239c.exe 90 PID 208 wrote to memory of 5108 208 net.exe 89 PID 208 wrote to memory of 5108 208 net.exe 89 PID 208 wrote to memory of 5108 208 net.exe 89 PID 4036 wrote to memory of 3068 4036 net.exe 87 -
Views/modifies file attributes 1 TTPs 14 IoCs
pid Process 3168 attrib.exe 4976 attrib.exe 4384 attrib.exe 1972 attrib.exe 3616 attrib.exe 2516 attrib.exe 2948 attrib.exe 1320 attrib.exe 4772 attrib.exe 2124 attrib.exe 2632 attrib.exe 2776 attrib.exe 1972 attrib.exe 3116 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\503d5e1209115203196133e5fd2d239c.exe"C:\Users\Admin\AppData\Local\Temp\503d5e1209115203196133e5fd2d239c.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:1688
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:5112
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y3⤵PID:3700
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1980
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:2460
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3704 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y3⤵PID:376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat3⤵PID:968
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:3612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y4⤵PID:4128
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4316
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:3124
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1792
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4960
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:4772
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4116
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:3668
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:3436
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2980
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:4996
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:17:12 AM C:\Windows\Sysinf.bat3⤵PID:5008
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:14:12 AM C:\Windows\Sysinf.bat3⤵PID:3980
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:15:10 AM C:\Windows\Help\HelpCat.exe3⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4124
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:220
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3808
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2144
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2052
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3780
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2456
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4248
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1776
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3364
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1424
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3616
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3232
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2332
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4772
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3852
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4920
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4492
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1856
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3292
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:3168
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:488
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3464
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3452
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2660
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4136
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1416
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:3136
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2140
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2900
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:3212
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1556
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1412
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:4036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:208
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:17:08 AM C:\Windows\Sysinf.bat2⤵PID:3464
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:14:08 AM C:\Windows\Sysinf.bat2⤵PID:2104
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:15:06 AM C:\Windows\Help\HelpCat.exe2⤵PID:4960
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:3780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y3⤵PID:3340
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2124
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:5116
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:4036
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:4440
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\503d5e1209115203196133e5fd2d239c~4.exe503d5e1209115203196133e5fd2d239c~4.exe2⤵
- Executes dropped EXE
PID:2408
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:3156
-
C:\Windows\SysWOW64\at.exeat 6:17:08 AM C:\Windows\Sysinf.bat1⤵PID:2236
-
C:\Windows\SysWOW64\at.exeat 6:14:08 AM C:\Windows\Sysinf.bat1⤵PID:3760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:5108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4604
-
C:\Windows\SysWOW64\at.exeat 6:14:12 AM C:\Windows\Sysinf.bat1⤵PID:3432
-
C:\Windows\SysWOW64\at.exeat 6:17:12 AM C:\Windows\Sysinf.bat1⤵PID:4844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:828
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4324
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4772
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2980
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3616
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 5x1K9O3JT02mMFeCUQQ7dQ.0.21⤵PID:3340
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2516
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4380
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6