Analysis
-
max time kernel
2s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
71f058812fd2f0fb3dfda27431e9120b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71f058812fd2f0fb3dfda27431e9120b.exe
Resource
win10v2004-20231222-en
General
-
Target
71f058812fd2f0fb3dfda27431e9120b.exe
-
Size
1.3MB
-
MD5
71f058812fd2f0fb3dfda27431e9120b
-
SHA1
2b1ed3176b8802ded6f7d651f7634336b4490ff4
-
SHA256
25577a7bee9c58d8868269fbde16fc4d29426b22f9bd356dd8353c35af252011
-
SHA512
2fc2d9a2024608da44644d95993d74034f35f32322082b137b9aa3b1952b145433518aa63d9400a146bd472c3da76fad10bb3e19d193123c92db2b0220efda7b
-
SSDEEP
24576:UuhaxerQZb+md4wmARerQZb+md4wmAJ4SjrSJ:b4erQZbd28erQZbd2G4SjrSJ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backgroundTaskHost.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" backgroundTaskHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" backgroundTaskHost.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" backgroundTaskHost.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe backgroundTaskHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe backgroundTaskHost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 71f058812fd2f0fb3dfda27431e9120b.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\regedt32.sys 71f058812fd2f0fb3dfda27431e9120b.exe File created C:\Windows\system\KavUpda.exe 71f058812fd2f0fb3dfda27431e9120b.exe File opened for modification C:\Windows\system\KavUpda.exe 71f058812fd2f0fb3dfda27431e9120b.exe File created C:\Windows\Help\HelpCat.exe 71f058812fd2f0fb3dfda27431e9120b.exe File opened for modification C:\Windows\Help\HelpCat.exe 71f058812fd2f0fb3dfda27431e9120b.exe File created C:\Windows\Sysinf.bat 71f058812fd2f0fb3dfda27431e9120b.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1960 sc.exe 668 sc.exe 4448 sc.exe 2548 sc.exe 3988 sc.exe 1868 sc.exe 3428 sc.exe 4852 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 3664 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3320 71f058812fd2f0fb3dfda27431e9120b.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3320 wrote to memory of 1480 3320 71f058812fd2f0fb3dfda27431e9120b.exe 25 PID 3320 wrote to memory of 1480 3320 71f058812fd2f0fb3dfda27431e9120b.exe 25 PID 3320 wrote to memory of 1480 3320 71f058812fd2f0fb3dfda27431e9120b.exe 25 PID 3320 wrote to memory of 1472 3320 71f058812fd2f0fb3dfda27431e9120b.exe 23 PID 3320 wrote to memory of 1472 3320 71f058812fd2f0fb3dfda27431e9120b.exe 23 PID 3320 wrote to memory of 1472 3320 71f058812fd2f0fb3dfda27431e9120b.exe 23 PID 1472 wrote to memory of 4412 1472 net.exe 152 PID 1472 wrote to memory of 4412 1472 net.exe 152 PID 1472 wrote to memory of 4412 1472 net.exe 152 PID 3320 wrote to memory of 2548 3320 71f058812fd2f0fb3dfda27431e9120b.exe 134 PID 3320 wrote to memory of 2548 3320 71f058812fd2f0fb3dfda27431e9120b.exe 134 PID 3320 wrote to memory of 2548 3320 71f058812fd2f0fb3dfda27431e9120b.exe 134 PID 3320 wrote to memory of 1032 3320 71f058812fd2f0fb3dfda27431e9120b.exe 98 PID 3320 wrote to memory of 1032 3320 71f058812fd2f0fb3dfda27431e9120b.exe 98 PID 3320 wrote to memory of 1032 3320 71f058812fd2f0fb3dfda27431e9120b.exe 98 PID 3320 wrote to memory of 4820 3320 71f058812fd2f0fb3dfda27431e9120b.exe 204 PID 3320 wrote to memory of 4820 3320 71f058812fd2f0fb3dfda27431e9120b.exe 204 PID 3320 wrote to memory of 4820 3320 71f058812fd2f0fb3dfda27431e9120b.exe 204 PID 3320 wrote to memory of 2448 3320 71f058812fd2f0fb3dfda27431e9120b.exe 95 PID 3320 wrote to memory of 2448 3320 71f058812fd2f0fb3dfda27431e9120b.exe 95 PID 3320 wrote to memory of 2448 3320 71f058812fd2f0fb3dfda27431e9120b.exe 95 PID 3320 wrote to memory of 3208 3320 71f058812fd2f0fb3dfda27431e9120b.exe 58 PID 3320 wrote to memory of 3208 3320 71f058812fd2f0fb3dfda27431e9120b.exe 58 PID 3320 wrote to memory of 3208 3320 71f058812fd2f0fb3dfda27431e9120b.exe 58 PID 3320 wrote to memory of 1688 3320 71f058812fd2f0fb3dfda27431e9120b.exe 91 PID 3320 wrote to memory of 1688 3320 71f058812fd2f0fb3dfda27431e9120b.exe 91 PID 3320 wrote to memory of 1688 3320 71f058812fd2f0fb3dfda27431e9120b.exe 91 PID 3320 wrote to memory of 1804 3320 71f058812fd2f0fb3dfda27431e9120b.exe 117 PID 3320 wrote to memory of 1804 3320 71f058812fd2f0fb3dfda27431e9120b.exe 117 PID 3320 wrote to memory of 1804 3320 71f058812fd2f0fb3dfda27431e9120b.exe 117 PID 3320 wrote to memory of 3524 3320 71f058812fd2f0fb3dfda27431e9120b.exe 87 PID 3320 wrote to memory of 3524 3320 71f058812fd2f0fb3dfda27431e9120b.exe 87 PID 3320 wrote to memory of 3524 3320 71f058812fd2f0fb3dfda27431e9120b.exe 87 PID 3320 wrote to memory of 4852 3320 71f058812fd2f0fb3dfda27431e9120b.exe 209 PID 3320 wrote to memory of 4852 3320 71f058812fd2f0fb3dfda27431e9120b.exe 209 PID 3320 wrote to memory of 4852 3320 71f058812fd2f0fb3dfda27431e9120b.exe 209 PID 3320 wrote to memory of 3428 3320 71f058812fd2f0fb3dfda27431e9120b.exe 82 PID 3320 wrote to memory of 3428 3320 71f058812fd2f0fb3dfda27431e9120b.exe 82 PID 3320 wrote to memory of 3428 3320 71f058812fd2f0fb3dfda27431e9120b.exe 82 PID 3320 wrote to memory of 1868 3320 71f058812fd2f0fb3dfda27431e9120b.exe 81 PID 3320 wrote to memory of 1868 3320 71f058812fd2f0fb3dfda27431e9120b.exe 81 PID 3320 wrote to memory of 1868 3320 71f058812fd2f0fb3dfda27431e9120b.exe 81 PID 3320 wrote to memory of 3988 3320 71f058812fd2f0fb3dfda27431e9120b.exe 101 PID 3320 wrote to memory of 3988 3320 71f058812fd2f0fb3dfda27431e9120b.exe 101 PID 3320 wrote to memory of 3988 3320 71f058812fd2f0fb3dfda27431e9120b.exe 101 PID 3320 wrote to memory of 3664 3320 71f058812fd2f0fb3dfda27431e9120b.exe 240 PID 3320 wrote to memory of 3664 3320 71f058812fd2f0fb3dfda27431e9120b.exe 240 PID 3320 wrote to memory of 3664 3320 71f058812fd2f0fb3dfda27431e9120b.exe 240 PID 3320 wrote to memory of 2252 3320 71f058812fd2f0fb3dfda27431e9120b.exe 77 PID 3320 wrote to memory of 2252 3320 71f058812fd2f0fb3dfda27431e9120b.exe 77 PID 3320 wrote to memory of 2252 3320 71f058812fd2f0fb3dfda27431e9120b.exe 77 PID 3320 wrote to memory of 2968 3320 71f058812fd2f0fb3dfda27431e9120b.exe 76 PID 3320 wrote to memory of 2968 3320 71f058812fd2f0fb3dfda27431e9120b.exe 76 PID 3320 wrote to memory of 2968 3320 71f058812fd2f0fb3dfda27431e9120b.exe 76 PID 2448 wrote to memory of 2080 2448 net.exe 234 PID 2448 wrote to memory of 2080 2448 net.exe 234 PID 2448 wrote to memory of 2080 2448 net.exe 234 PID 3524 wrote to memory of 4948 3524 net.exe 284 PID 3524 wrote to memory of 4948 3524 net.exe 284 PID 3524 wrote to memory of 4948 3524 net.exe 284 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2824 attrib.exe 4860 attrib.exe 452 attrib.exe 4364 attrib.exe 3688 attrib.exe 5036 attrib.exe 2404 attrib.exe 4244 attrib.exe 4412 attrib.exe 556 attrib.exe 3780 attrib.exe 4928 attrib.exe 1636 attrib.exe 2344 attrib.exe 2928 attrib.exe 4376 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71f058812fd2f0fb3dfda27431e9120b.exe"C:\Users\Admin\AppData\Local\Temp\71f058812fd2f0fb3dfda27431e9120b.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:1472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:1480
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:3208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y3⤵PID:3108
-
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:3664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y3⤵PID:320
-
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:456
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y3⤵PID:4260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat3⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1044
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:4948
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4244
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:4084
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:668
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4448
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2548
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:3664
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:4684
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:1112
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1852
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4636
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3520
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:2916
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:33:51 PM C:\Windows\Sysinf.bat3⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:30:51 PM C:\Windows\Sysinf.bat3⤵PID:2308
-
-
C:\Windows\SysWOW64\At.exeAt.exe 3:31:49 PM C:\Windows\Help\HelpCat.exe3⤵PID:1876
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1744
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4104
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3612
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3780
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1296
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4388
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:804
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1124
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2672
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1512
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:532
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3156
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4376
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4516
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4920
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3368
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4256
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3560
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3016
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2112
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3180
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1968
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4948
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:232
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2968
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2252
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3988
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:3428
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:4852
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵
- Suspicious use of WriteProcessMemory
PID:3524
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1804
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1688
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2448
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:33:48 PM C:\Windows\Sysinf.bat2⤵PID:4820
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:30:48 PM C:\Windows\Sysinf.bat2⤵PID:1032
-
-
C:\Windows\SysWOW64\At.exeAt.exe 3:31:46 PM C:\Windows\Help\HelpCat.exe2⤵PID:2548
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3988
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y3⤵PID:2800
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:4076
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:3032
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:4012
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:212
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:4412
-
C:\Windows\SysWOW64\at.exeat 3:30:48 PM C:\Windows\Sysinf.bat1⤵PID:2556
-
C:\Windows\SysWOW64\at.exeat 3:33:48 PM C:\Windows\Sysinf.bat1⤵PID:4068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:4412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:696
-
C:\Windows\SysWOW64\at.exeat 3:30:51 PM C:\Windows\Sysinf.bat1⤵PID:436
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2176
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:2824
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4852
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1428
-
C:\Windows\SysWOW64\at.exeat 3:33:51 PM C:\Windows\Sysinf.bat1⤵PID:544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1644
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1804
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4412
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4820
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:556
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:5036
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2404
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2080
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3780
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
PID:3664
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4860
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:452
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2344
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4364
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3688
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2928
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4376