Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
6898d0959f886a753bcb8f86b6b6dae8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6898d0959f886a753bcb8f86b6b6dae8.exe
Resource
win10v2004-20231215-en
General
-
Target
6898d0959f886a753bcb8f86b6b6dae8.exe
-
Size
546KB
-
MD5
6898d0959f886a753bcb8f86b6b6dae8
-
SHA1
c34ef4539390403b2959d990e86b22bcd29175ed
-
SHA256
74e2dc6503ca441c59a59a68be148ee0b746f57b423ea8afad8de35d75973c85
-
SHA512
4ec0fee9162f7e631a903e63988b80620f0ae8a821830af772b347f72c346905e039aa1506812601987fc6a4533a3bb4b0c8ed4f1c294566204b61119cab26b4
-
SSDEEP
6144:UZfec9EbXDk6RkdKJrG1VVE+IwrG1VVE+IwrG1VVE+IRuHOyrG1VVE+IwrG1VVEK:UZWtI6Rkcununu9OWununuV4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 KavUpda.exe -
Loads dropped DLL 2 IoCs
pid Process 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 1480 6898d0959f886a753bcb8f86b6b6dae8.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\Autorun.inf KavUpda.exe File opened for modification C:\Autorun.inf KavUpda.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Option.bat KavUpda.exe File opened for modification C:\Windows\SysWOW64\WordRes 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Windows\SysWOW64\Folderdir 6898d0959f886a753bcb8f86b6b6dae8.exe File created C:\Windows\SysWOW64\Option.bat 6898d0959f886a753bcb8f86b6b6dae8.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\OutClose.doc 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\7-Zip\7z.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe 6898d0959f886a753bcb8f86b6b6dae8.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Sysinf.bat 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Windows\system\KavUpda.exe KavUpda.exe File opened for modification C:\Windows\Sysinf.bat KavUpda.exe File opened for modification C:\Windows\regedt32.sys KavUpda.exe File created C:\Windows\system\KavUpda.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Windows\system\KavUpda.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File created C:\Windows\Help\HelpCat.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File opened for modification C:\Windows\Help\HelpCat.exe 6898d0959f886a753bcb8f86b6b6dae8.exe File created C:\Windows\regedt32.sys 6898d0959f886a753bcb8f86b6b6dae8.exe File created C:\Windows\regedt32.sys KavUpda.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2848 sc.exe 2900 sc.exe 1140 sc.exe 1112 sc.exe 1096 sc.exe 2516 sc.exe 1512 sc.exe 2972 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 1256 regedit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: 33 1480 6898d0959f886a753bcb8f86b6b6dae8.exe Token: SeIncBasePriorityPrivilege 1480 6898d0959f886a753bcb8f86b6b6dae8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 2524 KavUpda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1892 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 20 PID 1480 wrote to memory of 1892 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 20 PID 1480 wrote to memory of 1892 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 20 PID 1480 wrote to memory of 1892 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 20 PID 1480 wrote to memory of 2356 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 130 PID 1480 wrote to memory of 2356 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 130 PID 1480 wrote to memory of 2356 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 130 PID 1480 wrote to memory of 2356 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 130 PID 2356 wrote to memory of 2368 2356 conhost.exe 16 PID 2356 wrote to memory of 2368 2356 conhost.exe 16 PID 2356 wrote to memory of 2368 2356 conhost.exe 16 PID 2356 wrote to memory of 2368 2356 conhost.exe 16 PID 1480 wrote to memory of 2656 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 74 PID 1480 wrote to memory of 2656 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 74 PID 1480 wrote to memory of 2656 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 74 PID 1480 wrote to memory of 2656 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 74 PID 1480 wrote to memory of 2672 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 73 PID 1480 wrote to memory of 2672 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 73 PID 1480 wrote to memory of 2672 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 73 PID 1480 wrote to memory of 2672 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 73 PID 1480 wrote to memory of 2728 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 71 PID 1480 wrote to memory of 2728 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 71 PID 1480 wrote to memory of 2728 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 71 PID 1480 wrote to memory of 2728 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 71 PID 1480 wrote to memory of 2596 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 69 PID 1480 wrote to memory of 2596 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 69 PID 1480 wrote to memory of 2596 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 69 PID 1480 wrote to memory of 2596 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 69 PID 1480 wrote to memory of 3052 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 67 PID 1480 wrote to memory of 3052 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 67 PID 1480 wrote to memory of 3052 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 67 PID 1480 wrote to memory of 3052 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 67 PID 1480 wrote to memory of 780 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 65 PID 1480 wrote to memory of 780 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 65 PID 1480 wrote to memory of 780 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 65 PID 1480 wrote to memory of 780 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 65 PID 1480 wrote to memory of 2484 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 63 PID 1480 wrote to memory of 2484 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 63 PID 1480 wrote to memory of 2484 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 63 PID 1480 wrote to memory of 2484 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 63 PID 2596 wrote to memory of 2620 2596 net.exe 62 PID 2596 wrote to memory of 2620 2596 net.exe 62 PID 2596 wrote to memory of 2620 2596 net.exe 62 PID 2596 wrote to memory of 2620 2596 net.exe 62 PID 1480 wrote to memory of 2624 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 60 PID 1480 wrote to memory of 2624 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 60 PID 1480 wrote to memory of 2624 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 60 PID 1480 wrote to memory of 2624 1480 6898d0959f886a753bcb8f86b6b6dae8.exe 60 PID 2672 wrote to memory of 2568 2672 cmd.exe 59 PID 2672 wrote to memory of 2568 2672 cmd.exe 59 PID 2672 wrote to memory of 2568 2672 cmd.exe 59 PID 2672 wrote to memory of 2568 2672 cmd.exe 59 PID 2728 wrote to memory of 2512 2728 cmd.exe 58 PID 2728 wrote to memory of 2512 2728 cmd.exe 58 PID 2728 wrote to memory of 2512 2728 cmd.exe 58 PID 2728 wrote to memory of 2512 2728 cmd.exe 58 PID 780 wrote to memory of 2528 780 net.exe 135 PID 780 wrote to memory of 2528 780 net.exe 135 PID 780 wrote to memory of 2528 780 net.exe 135 PID 780 wrote to memory of 2528 780 net.exe 135 PID 3052 wrote to memory of 2772 3052 net.exe 54 PID 3052 wrote to memory of 2772 3052 net.exe 54 PID 3052 wrote to memory of 2772 3052 net.exe 54 PID 3052 wrote to memory of 2772 3052 net.exe 54 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 1572 attrib.exe 2476 attrib.exe 1856 attrib.exe 1096 attrib.exe 2652 attrib.exe 2312 attrib.exe 2808 attrib.exe 2208 attrib.exe 2616 attrib.exe 2968 attrib.exe 2648 attrib.exe 2384 attrib.exe 412 attrib.exe 3064 attrib.exe 112 attrib.exe 320 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6898d0959f886a753bcb8f86b6b6dae8.exe"C:\Users\Admin\AppData\Local\Temp\6898d0959f886a753bcb8f86b6b6dae8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:1892
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1172
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2684
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:1256
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2516
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1512
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3048
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:404
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2084
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2900
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1140
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1096
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:1816
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:2552
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:2856
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1436
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:2248
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:51:05 PM C:\Windows\Sysinf.bat3⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:48:05 PM C:\Windows\Sysinf.bat3⤵PID:2980
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:49:03 PM C:\Windows\Help\HelpCat.exe3⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2204
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2528
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2492
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2444
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1260
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2632
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1152
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2332
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2056
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:384
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:968
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1416
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:688
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2604
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1376
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1932
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2036
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2200
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1716
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:800
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:2972
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2848
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2624
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2484
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:780
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:3052
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:51:02 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2728
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:48:02 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2672
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:49:00 PM C:\Windows\Help\HelpCat.exe2⤵PID:2656
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1056
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:568
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:968
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2060
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:2296
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2368
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:1608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y2⤵PID:2984
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:1656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2528
-
C:\Windows\SysWOW64\at.exeat 6:51:02 PM C:\Windows\Sysinf.bat1⤵PID:2512
-
C:\Windows\SysWOW64\at.exeat 6:48:02 PM C:\Windows\Sysinf.bat1⤵PID:2568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2620
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1576
-
C:\Windows\SysWOW64\at.exeat 6:48:05 PM C:\Windows\Sysinf.bat1⤵PID:384
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:1096
-
-
C:\Windows\SysWOW64\at.exeat 6:51:05 PM C:\Windows\Sysinf.bat1⤵PID:2280
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "18557414091635810309-247585742-1198654896-547723617-479533339-4155287231614169762"1⤵
- Suspicious use of WriteProcessMemory
PID:2356
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2648
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2476
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2808
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2384
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:1576
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1856
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:412
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "20441986131393679119-746915820-29698810411876065607206068841925799320-175510814"1⤵PID:2264
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "8038315501336800924619757155-451010909-8330701921633948515559270450-1406973142"1⤵PID:2272
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:112
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2208
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2616
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1594232101-1286920992298564169149536438116885229-1108105320185073842133063698"1⤵PID:1936
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2968
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1572
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:320