Analysis
-
max time kernel
2s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
fb535872bba6dad059ba614ee22b53d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fb535872bba6dad059ba614ee22b53d3.exe
Resource
win10v2004-20231222-en
General
-
Target
fb535872bba6dad059ba614ee22b53d3.exe
-
Size
596KB
-
MD5
fb535872bba6dad059ba614ee22b53d3
-
SHA1
7bb82089ea7e7cea647b05f37215ed93fbfbf71f
-
SHA256
edca7536fe7a5eaad6612c489c7112e05ed05e0a1d13395378847300578c235a
-
SHA512
50d195913cc6f186e393a33e2df1a14430df0719a68db3474885eed79c7a2f0a7d1323c9d31de5b1a8d933aba941f395deb3044a40724c630b7510f06dc23dbd
-
SSDEEP
12288:UZWtI6RkcOPO7OpeZJys73dOvXDpNjNe8r:UuhaXeZJ8NI8r
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat fb535872bba6dad059ba614ee22b53d3.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\system\KavUpda.exe fb535872bba6dad059ba614ee22b53d3.exe File opened for modification C:\Windows\system\KavUpda.exe fb535872bba6dad059ba614ee22b53d3.exe File created C:\Windows\Help\HelpCat.exe fb535872bba6dad059ba614ee22b53d3.exe File opened for modification C:\Windows\Help\HelpCat.exe fb535872bba6dad059ba614ee22b53d3.exe File created C:\Windows\Sysinf.bat fb535872bba6dad059ba614ee22b53d3.exe File created C:\Windows\regedt32.sys fb535872bba6dad059ba614ee22b53d3.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4732 sc.exe 3536 sc.exe 3144 sc.exe 4924 sc.exe 972 sc.exe 1996 sc.exe 3168 sc.exe 1824 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 1228 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4296 fb535872bba6dad059ba614ee22b53d3.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3376 4296 fb535872bba6dad059ba614ee22b53d3.exe 18 PID 4296 wrote to memory of 3376 4296 fb535872bba6dad059ba614ee22b53d3.exe 18 PID 4296 wrote to memory of 3376 4296 fb535872bba6dad059ba614ee22b53d3.exe 18 PID 4296 wrote to memory of 2180 4296 fb535872bba6dad059ba614ee22b53d3.exe 150 PID 4296 wrote to memory of 2180 4296 fb535872bba6dad059ba614ee22b53d3.exe 150 PID 4296 wrote to memory of 2180 4296 fb535872bba6dad059ba614ee22b53d3.exe 150 PID 2180 wrote to memory of 2248 2180 Process not Found 23 PID 2180 wrote to memory of 2248 2180 Process not Found 23 PID 2180 wrote to memory of 2248 2180 Process not Found 23 PID 4296 wrote to memory of 4160 4296 fb535872bba6dad059ba614ee22b53d3.exe 100 PID 4296 wrote to memory of 4160 4296 fb535872bba6dad059ba614ee22b53d3.exe 100 PID 4296 wrote to memory of 4160 4296 fb535872bba6dad059ba614ee22b53d3.exe 100 PID 4296 wrote to memory of 2656 4296 fb535872bba6dad059ba614ee22b53d3.exe 99 PID 4296 wrote to memory of 2656 4296 fb535872bba6dad059ba614ee22b53d3.exe 99 PID 4296 wrote to memory of 2656 4296 fb535872bba6dad059ba614ee22b53d3.exe 99 PID 4296 wrote to memory of 5000 4296 fb535872bba6dad059ba614ee22b53d3.exe 98 PID 4296 wrote to memory of 5000 4296 fb535872bba6dad059ba614ee22b53d3.exe 98 PID 4296 wrote to memory of 5000 4296 fb535872bba6dad059ba614ee22b53d3.exe 98 PID 4296 wrote to memory of 1444 4296 fb535872bba6dad059ba614ee22b53d3.exe 125 PID 4296 wrote to memory of 1444 4296 fb535872bba6dad059ba614ee22b53d3.exe 125 PID 4296 wrote to memory of 1444 4296 fb535872bba6dad059ba614ee22b53d3.exe 125 PID 4296 wrote to memory of 3656 4296 fb535872bba6dad059ba614ee22b53d3.exe 95 PID 4296 wrote to memory of 3656 4296 fb535872bba6dad059ba614ee22b53d3.exe 95 PID 4296 wrote to memory of 3656 4296 fb535872bba6dad059ba614ee22b53d3.exe 95 PID 4296 wrote to memory of 3488 4296 fb535872bba6dad059ba614ee22b53d3.exe 93 PID 4296 wrote to memory of 3488 4296 fb535872bba6dad059ba614ee22b53d3.exe 93 PID 4296 wrote to memory of 3488 4296 fb535872bba6dad059ba614ee22b53d3.exe 93 PID 4296 wrote to memory of 1744 4296 fb535872bba6dad059ba614ee22b53d3.exe 90 PID 4296 wrote to memory of 1744 4296 fb535872bba6dad059ba614ee22b53d3.exe 90 PID 4296 wrote to memory of 1744 4296 fb535872bba6dad059ba614ee22b53d3.exe 90 PID 4296 wrote to memory of 4816 4296 fb535872bba6dad059ba614ee22b53d3.exe 88 PID 4296 wrote to memory of 4816 4296 fb535872bba6dad059ba614ee22b53d3.exe 88 PID 4296 wrote to memory of 4816 4296 fb535872bba6dad059ba614ee22b53d3.exe 88 PID 4296 wrote to memory of 3144 4296 fb535872bba6dad059ba614ee22b53d3.exe 128 PID 4296 wrote to memory of 3144 4296 fb535872bba6dad059ba614ee22b53d3.exe 128 PID 4296 wrote to memory of 3144 4296 fb535872bba6dad059ba614ee22b53d3.exe 128 PID 4296 wrote to memory of 1824 4296 fb535872bba6dad059ba614ee22b53d3.exe 156 PID 4296 wrote to memory of 1824 4296 fb535872bba6dad059ba614ee22b53d3.exe 156 PID 4296 wrote to memory of 1824 4296 fb535872bba6dad059ba614ee22b53d3.exe 156 PID 4296 wrote to memory of 3536 4296 fb535872bba6dad059ba614ee22b53d3.exe 83 PID 4296 wrote to memory of 3536 4296 fb535872bba6dad059ba614ee22b53d3.exe 83 PID 4296 wrote to memory of 3536 4296 fb535872bba6dad059ba614ee22b53d3.exe 83 PID 4296 wrote to memory of 4732 4296 fb535872bba6dad059ba614ee22b53d3.exe 81 PID 4296 wrote to memory of 4732 4296 fb535872bba6dad059ba614ee22b53d3.exe 81 PID 4296 wrote to memory of 4732 4296 fb535872bba6dad059ba614ee22b53d3.exe 81 PID 4296 wrote to memory of 1228 4296 fb535872bba6dad059ba614ee22b53d3.exe 79 PID 4296 wrote to memory of 1228 4296 fb535872bba6dad059ba614ee22b53d3.exe 79 PID 4296 wrote to memory of 1228 4296 fb535872bba6dad059ba614ee22b53d3.exe 79 PID 3656 wrote to memory of 1836 3656 net.exe 78 PID 3656 wrote to memory of 1836 3656 net.exe 78 PID 3656 wrote to memory of 1836 3656 net.exe 78 PID 4296 wrote to memory of 2948 4296 fb535872bba6dad059ba614ee22b53d3.exe 77 PID 4296 wrote to memory of 2948 4296 fb535872bba6dad059ba614ee22b53d3.exe 77 PID 4296 wrote to memory of 2948 4296 fb535872bba6dad059ba614ee22b53d3.exe 77 PID 4296 wrote to memory of 2056 4296 fb535872bba6dad059ba614ee22b53d3.exe 76 PID 4296 wrote to memory of 2056 4296 fb535872bba6dad059ba614ee22b53d3.exe 76 PID 4296 wrote to memory of 2056 4296 fb535872bba6dad059ba614ee22b53d3.exe 76 PID 4816 wrote to memory of 3960 4816 net.exe 73 PID 4816 wrote to memory of 3960 4816 net.exe 73 PID 4816 wrote to memory of 3960 4816 net.exe 73 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 4880 attrib.exe 3888 attrib.exe 668 attrib.exe 4612 attrib.exe 2284 attrib.exe 1120 attrib.exe 2260 attrib.exe 4228 attrib.exe 1912 attrib.exe 1568 attrib.exe 3684 attrib.exe 2896 attrib.exe 3316 attrib.exe 4040 attrib.exe 3092 attrib.exe 1512 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb535872bba6dad059ba614ee22b53d3.exe"C:\Users\Admin\AppData\Local\Temp\fb535872bba6dad059ba614ee22b53d3.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:3376
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵PID:2180
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:4412
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y3⤵PID:2804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat3⤵PID:1772
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y4⤵PID:4696
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:2236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y4⤵PID:3140
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:4568
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3708
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1444
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:3500
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4924
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:972
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1996
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:3168
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:3908
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:3736
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:3316
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:220
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4876
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:440
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:38:40 PM C:\Windows\Sysinf.bat3⤵PID:3612
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:35:40 PM C:\Windows\Sysinf.bat3⤵PID:436
-
-
C:\Windows\SysWOW64\At.exeAt.exe 2:36:38 PM C:\Windows\Help\HelpCat.exe3⤵PID:3136
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1120
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4156
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2196
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:904
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3300
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2300
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2548
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:988
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4832
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:432
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2692
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1436
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1304
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4728
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3736
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4568
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:212
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:5000
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4292
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3828
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2784
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2056
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2948
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:1228
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:4732
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:3536
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3144
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵
- Suspicious use of WriteProcessMemory
PID:4816
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1744
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:3488
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:3656
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:1444
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:38:37 PM C:\Windows\Sysinf.bat2⤵PID:5000
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:35:37 PM C:\Windows\Sysinf.bat2⤵PID:2656
-
-
C:\Windows\SysWOW64\At.exeAt.exe 2:36:35 PM C:\Windows\Help\HelpCat.exe2⤵PID:4160
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1356
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2692
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1128
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2144
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:3976
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2248
-
C:\Windows\SysWOW64\at.exeat 2:35:37 PM C:\Windows\Sysinf.bat1⤵PID:4076
-
C:\Windows\SysWOW64\at.exeat 2:38:37 PM C:\Windows\Sysinf.bat1⤵PID:1104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4988
-
C:\Windows\SysWOW64\at.exeat 2:38:40 PM C:\Windows\Sysinf.bat1⤵PID:2500
-
C:\Windows\SysWOW64\at.exeat 2:35:40 PM C:\Windows\Sysinf.bat1⤵PID:3704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:5020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:3696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4944
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3144
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2180
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1824
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:668
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4612
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1512
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1568
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4880
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2284
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1912
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3684
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4228
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4040
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3092
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3888