Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
68a7f7254e778e3719834e86bf8762eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68a7f7254e778e3719834e86bf8762eb.exe
Resource
win10v2004-20231215-en
General
-
Target
68a7f7254e778e3719834e86bf8762eb.exe
-
Size
866KB
-
MD5
68a7f7254e778e3719834e86bf8762eb
-
SHA1
52335a7833f3ecad74cb493fb9eab944b0d5d3a3
-
SHA256
3b7f5a4cb75f8f27b0ab96efef3a613925ec3e47a73de991f64117186cc980a6
-
SHA512
aa4d258227e0e0ceddab98bbedc98f1c77e813e9733732a626d6b5a1265579aacf0907c8204a3370fe6bac3ac7bddeec573af6913fb32dcb90cbb89391b840ed
-
SSDEEP
12288:UZWtI6RkUuV2eZJys73dOvXDpNjNe8RuhwerQZb+md4w1UM:Uuha92eZJ8NI8QwerQZb+md4wmM
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 68a7f7254e778e3719834e86bf8762eb.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Sysinf.bat 68a7f7254e778e3719834e86bf8762eb.exe File created C:\Windows\system\KavUpda.exe 68a7f7254e778e3719834e86bf8762eb.exe File opened for modification C:\Windows\system\KavUpda.exe 68a7f7254e778e3719834e86bf8762eb.exe File created C:\Windows\Help\HelpCat.exe 68a7f7254e778e3719834e86bf8762eb.exe File opened for modification C:\Windows\Help\HelpCat.exe 68a7f7254e778e3719834e86bf8762eb.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1732 sc.exe 1284 sc.exe 2972 sc.exe 2964 sc.exe 2820 sc.exe 2780 sc.exe 916 sc.exe 1228 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2500 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1904 68a7f7254e778e3719834e86bf8762eb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1976 1904 68a7f7254e778e3719834e86bf8762eb.exe 20 PID 1904 wrote to memory of 1976 1904 68a7f7254e778e3719834e86bf8762eb.exe 20 PID 1904 wrote to memory of 1976 1904 68a7f7254e778e3719834e86bf8762eb.exe 20 PID 1904 wrote to memory of 1976 1904 68a7f7254e778e3719834e86bf8762eb.exe 20 PID 1904 wrote to memory of 2732 1904 68a7f7254e778e3719834e86bf8762eb.exe 18 PID 1904 wrote to memory of 2732 1904 68a7f7254e778e3719834e86bf8762eb.exe 18 PID 1904 wrote to memory of 2732 1904 68a7f7254e778e3719834e86bf8762eb.exe 18 PID 1904 wrote to memory of 2732 1904 68a7f7254e778e3719834e86bf8762eb.exe 18 PID 2732 wrote to memory of 2788 2732 net.exe 16 PID 2732 wrote to memory of 2788 2732 net.exe 16 PID 2732 wrote to memory of 2788 2732 net.exe 16 PID 2732 wrote to memory of 2788 2732 net.exe 16 PID 1904 wrote to memory of 2812 1904 68a7f7254e778e3719834e86bf8762eb.exe 74 PID 1904 wrote to memory of 2812 1904 68a7f7254e778e3719834e86bf8762eb.exe 74 PID 1904 wrote to memory of 2812 1904 68a7f7254e778e3719834e86bf8762eb.exe 74 PID 1904 wrote to memory of 2812 1904 68a7f7254e778e3719834e86bf8762eb.exe 74 PID 1904 wrote to memory of 2700 1904 68a7f7254e778e3719834e86bf8762eb.exe 73 PID 1904 wrote to memory of 2700 1904 68a7f7254e778e3719834e86bf8762eb.exe 73 PID 1904 wrote to memory of 2700 1904 68a7f7254e778e3719834e86bf8762eb.exe 73 PID 1904 wrote to memory of 2700 1904 68a7f7254e778e3719834e86bf8762eb.exe 73 PID 1904 wrote to memory of 2168 1904 68a7f7254e778e3719834e86bf8762eb.exe 71 PID 1904 wrote to memory of 2168 1904 68a7f7254e778e3719834e86bf8762eb.exe 71 PID 1904 wrote to memory of 2168 1904 68a7f7254e778e3719834e86bf8762eb.exe 71 PID 1904 wrote to memory of 2168 1904 68a7f7254e778e3719834e86bf8762eb.exe 71 PID 1904 wrote to memory of 2624 1904 68a7f7254e778e3719834e86bf8762eb.exe 69 PID 1904 wrote to memory of 2624 1904 68a7f7254e778e3719834e86bf8762eb.exe 69 PID 1904 wrote to memory of 2624 1904 68a7f7254e778e3719834e86bf8762eb.exe 69 PID 1904 wrote to memory of 2624 1904 68a7f7254e778e3719834e86bf8762eb.exe 69 PID 2700 wrote to memory of 2584 2700 cmd.exe 66 PID 2700 wrote to memory of 2584 2700 cmd.exe 66 PID 2700 wrote to memory of 2584 2700 cmd.exe 66 PID 2700 wrote to memory of 2584 2700 cmd.exe 66 PID 1904 wrote to memory of 2640 1904 68a7f7254e778e3719834e86bf8762eb.exe 136 PID 1904 wrote to memory of 2640 1904 68a7f7254e778e3719834e86bf8762eb.exe 136 PID 1904 wrote to memory of 2640 1904 68a7f7254e778e3719834e86bf8762eb.exe 136 PID 1904 wrote to memory of 2640 1904 68a7f7254e778e3719834e86bf8762eb.exe 136 PID 1904 wrote to memory of 2548 1904 68a7f7254e778e3719834e86bf8762eb.exe 135 PID 1904 wrote to memory of 2548 1904 68a7f7254e778e3719834e86bf8762eb.exe 135 PID 1904 wrote to memory of 2548 1904 68a7f7254e778e3719834e86bf8762eb.exe 135 PID 1904 wrote to memory of 2548 1904 68a7f7254e778e3719834e86bf8762eb.exe 135 PID 2624 wrote to memory of 2556 2624 net.exe 63 PID 2624 wrote to memory of 2556 2624 net.exe 63 PID 2624 wrote to memory of 2556 2624 net.exe 63 PID 2624 wrote to memory of 2556 2624 net.exe 63 PID 1904 wrote to memory of 2600 1904 68a7f7254e778e3719834e86bf8762eb.exe 62 PID 1904 wrote to memory of 2600 1904 68a7f7254e778e3719834e86bf8762eb.exe 62 PID 1904 wrote to memory of 2600 1904 68a7f7254e778e3719834e86bf8762eb.exe 62 PID 1904 wrote to memory of 2600 1904 68a7f7254e778e3719834e86bf8762eb.exe 62 PID 1904 wrote to memory of 2660 1904 68a7f7254e778e3719834e86bf8762eb.exe 60 PID 1904 wrote to memory of 2660 1904 68a7f7254e778e3719834e86bf8762eb.exe 60 PID 1904 wrote to memory of 2660 1904 68a7f7254e778e3719834e86bf8762eb.exe 60 PID 1904 wrote to memory of 2660 1904 68a7f7254e778e3719834e86bf8762eb.exe 60 PID 2168 wrote to memory of 2608 2168 cmd.exe 61 PID 2168 wrote to memory of 2608 2168 cmd.exe 61 PID 2168 wrote to memory of 2608 2168 cmd.exe 61 PID 2168 wrote to memory of 2608 2168 cmd.exe 61 PID 2640 wrote to memory of 2596 2640 attrib.exe 57 PID 2640 wrote to memory of 2596 2640 attrib.exe 57 PID 2640 wrote to memory of 2596 2640 attrib.exe 57 PID 2640 wrote to memory of 2596 2640 attrib.exe 57 PID 1904 wrote to memory of 2780 1904 68a7f7254e778e3719834e86bf8762eb.exe 141 PID 1904 wrote to memory of 2780 1904 68a7f7254e778e3719834e86bf8762eb.exe 141 PID 1904 wrote to memory of 2780 1904 68a7f7254e778e3719834e86bf8762eb.exe 141 PID 1904 wrote to memory of 2780 1904 68a7f7254e778e3719834e86bf8762eb.exe 141 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 1692 attrib.exe 1724 attrib.exe 2224 attrib.exe 1256 attrib.exe 2192 attrib.exe 712 attrib.exe 376 attrib.exe 876 attrib.exe 2640 attrib.exe 1580 attrib.exe 648 attrib.exe 2744 attrib.exe 2784 attrib.exe 1564 attrib.exe 1960 attrib.exe 1592 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a7f7254e778e3719834e86bf8762eb.exe"C:\Users\Admin\AppData\Local\Temp\68a7f7254e778e3719834e86bf8762eb.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:2732
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:1976
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:2500
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1600
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1048
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2972
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:1956
-
C:\Windows\SysWOW64\At.exeAt.exe 6:51:43 PM C:\Windows\Help\HelpCat.exe3⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2088
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:560
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1496
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2152
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:916
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1228
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1732
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1284
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:1064
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:1680
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:2228
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:3012
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:53:45 PM C:\Windows\Sysinf.bat3⤵PID:1000
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:50:45 PM C:\Windows\Sysinf.bat3⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1652
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1552
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2604
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1880
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2612
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2536
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:880
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:712
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2632
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1188
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1020
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1120
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3052
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:892
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2720
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2316
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2640
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2600
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:288
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1248
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2668
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:2820
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2660
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2600
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2192
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2548
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2640
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2624
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:53:42 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2168
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:50:42 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2700
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:51:40 PM C:\Windows\Help\HelpCat.exe2⤵PID:2812
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1328
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2916
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2492
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2244
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:3032
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1244
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:788
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2596
-
C:\Windows\SysWOW64\at.exeat 6:53:42 PM C:\Windows\Sysinf.bat1⤵PID:2608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2556
-
C:\Windows\SysWOW64\at.exeat 6:50:42 PM C:\Windows\Sysinf.bat1⤵PID:2584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1628
-
C:\Windows\SysWOW64\at.exeat 6:50:45 PM C:\Windows\Sysinf.bat1⤵PID:2320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2012
-
C:\Windows\SysWOW64\at.exeat 6:53:45 PM C:\Windows\Sysinf.bat1⤵PID:2200
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2784
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-137870626-6934224419418701691712035557-164390242672744791-1172212844-453285085"1⤵PID:2548
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:2640
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1564
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "727108072674344351-623571727-2108165471-1128993896-991680251-17448506601601077393"1⤵PID:2780
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1580
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2224
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1256
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:376
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1960
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2744
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1592
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1040295435-1327171006-382273710-1708377743-296145680768446386-3012321941880132179"1⤵PID:2972
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:712
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD53f7fbd2eb34892646e93fd5e6e343512
SHA1265ac1061b54f62350fb7a5f57e566454d013a66
SHA256e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7
SHA51253d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140
-
Filesize
460B
MD57db3d565d6ddbe65a8b0e093910e7dcd
SHA1d4804e6180c6e74ba79d3343f2f2ccb15e502f12
SHA256a2778cb87fd88c7508ffd506a8ff8d58d0ffc02156f846956e5e99c6cb3d2f3f
SHA5120b3d1d0f44feba9dd78903ff77fdeaea834d930990a86641fb2e4ce04da280d33f6bee0ae0b1320e4070cbe20824062e45b52e5cad797c5985d8e31dce1ef82b
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6
-
Filesize
103KB
MD524c9a3e1e7f6a1623bb91bb88bc9957a
SHA1c38d2f5fa4e724871e413b57b684dc331262376a
SHA256d2e56d2647b6977ea042a3b6457028f807c8ea4000a254c4c6ec6bcf650cbb9a
SHA512e2784fa160f35eb5ac1617970bbd716a31d674288161638df9ca5a9b96a6391bfcf42182f257f0ec62397ea3272281091660be727102a792f85fc4b36de1dcb9
-
Filesize
92KB
MD59253be46af98a0b40c26d6bdd6a13107
SHA1e5c93a9d400921734c8ef43472432f5735d9a429
SHA256af5b86a2ec44ebd362552ba20cf8bdcaceab76c83d962a54b4c36b59dc9eb759
SHA512b6e2b37e962c2e17c38a519203e8817252cb53f812fb0722f52029dafa50ccc3a921db9707d7249d732d30b8359ecfa74c18e998b985792d265eb76c2c7b8589
-
Filesize
96KB
MD521fa50d34d4af316f5e99f97ff403287
SHA1e6a0df3c4a5ab1a1fb5a3ef9d86c0786552e166a
SHA256383821da667294c1f8a261040b478810e96149a04418c92ffb4c3733a9baafe1
SHA512bdf8c7cfee3df8b42937097ce1984d2d66a840f8a7cb69c6cd4e95b5bd94a451664e8bced4d57964b01ec6cae2e3b4c0bf8c56e4d1f7eba698ed91550185543c