Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
079a6b7ec6a7311dd8845286678c76f5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
079a6b7ec6a7311dd8845286678c76f5.exe
Resource
win10v2004-20231215-en
General
-
Target
079a6b7ec6a7311dd8845286678c76f5.exe
-
Size
877KB
-
MD5
079a6b7ec6a7311dd8845286678c76f5
-
SHA1
dd67cb9b94fbef1d57b3eacd3d3487183b9ccf72
-
SHA256
37486e6a37ceeafc4acbb6300b4fc97ec4961f58fa479982b4bfa389bd643df5
-
SHA512
b8be27e226392b1b7877a0c2a3f9788b78d27b49aed0996ebc890a13a4a030ad9fb42c204b2b80fcc6f82bd684b99e55878e801e7e76abefa6be174b2aac24fa
-
SSDEEP
12288:UZWtI6RkE+erQZb+md4w1UWOB0JupOB0H:UuhaE+erQZb+md4wmWO9OM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 KavUpda.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 079a6b7ec6a7311dd8845286678c76f5.exe 2240 079a6b7ec6a7311dd8845286678c76f5.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Autorun.inf KavUpda.exe File opened for modification F:\Autorun.inf KavUpda.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Windows\SysWOW64\Option.bat KavUpda.exe File opened for modification C:\Windows\SysWOW64\Folderdir 079a6b7ec6a7311dd8845286678c76f5.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\7-Zip\7z.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 079a6b7ec6a7311dd8845286678c76f5.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Sysinf.bat KavUpda.exe File opened for modification C:\Windows\regedt32.sys KavUpda.exe File created C:\Windows\system\KavUpda.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Windows\system\KavUpda.exe 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Windows\Help\HelpCat.exe 079a6b7ec6a7311dd8845286678c76f5.exe File created C:\Windows\Sysinf.bat 079a6b7ec6a7311dd8845286678c76f5.exe File created C:\Windows\regedt32.sys 079a6b7ec6a7311dd8845286678c76f5.exe File opened for modification C:\Windows\system\KavUpda.exe KavUpda.exe File created C:\Windows\regedt32.sys KavUpda.exe File created C:\Windows\Help\HelpCat.exe 079a6b7ec6a7311dd8845286678c76f5.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2488 sc.exe 2452 sc.exe 1880 sc.exe 1860 sc.exe 968 sc.exe 1556 sc.exe 2820 sc.exe 2536 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2804 regedit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2036 KavUpda.exe Token: SeIncBasePriorityPrivilege 2036 KavUpda.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: 33 2240 079a6b7ec6a7311dd8845286678c76f5.exe Token: SeIncBasePriorityPrivilege 2240 079a6b7ec6a7311dd8845286678c76f5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 079a6b7ec6a7311dd8845286678c76f5.exe 2036 KavUpda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2232 2240 079a6b7ec6a7311dd8845286678c76f5.exe 20 PID 2240 wrote to memory of 2232 2240 079a6b7ec6a7311dd8845286678c76f5.exe 20 PID 2240 wrote to memory of 2232 2240 079a6b7ec6a7311dd8845286678c76f5.exe 20 PID 2240 wrote to memory of 2232 2240 079a6b7ec6a7311dd8845286678c76f5.exe 20 PID 2240 wrote to memory of 1148 2240 079a6b7ec6a7311dd8845286678c76f5.exe 18 PID 2240 wrote to memory of 1148 2240 079a6b7ec6a7311dd8845286678c76f5.exe 18 PID 2240 wrote to memory of 1148 2240 079a6b7ec6a7311dd8845286678c76f5.exe 18 PID 2240 wrote to memory of 1148 2240 079a6b7ec6a7311dd8845286678c76f5.exe 18 PID 1148 wrote to memory of 2880 1148 net.exe 16 PID 1148 wrote to memory of 2880 1148 net.exe 16 PID 1148 wrote to memory of 2880 1148 net.exe 16 PID 1148 wrote to memory of 2880 1148 net.exe 16 PID 2240 wrote to memory of 2660 2240 079a6b7ec6a7311dd8845286678c76f5.exe 74 PID 2240 wrote to memory of 2660 2240 079a6b7ec6a7311dd8845286678c76f5.exe 74 PID 2240 wrote to memory of 2660 2240 079a6b7ec6a7311dd8845286678c76f5.exe 74 PID 2240 wrote to memory of 2660 2240 079a6b7ec6a7311dd8845286678c76f5.exe 74 PID 2240 wrote to memory of 2680 2240 079a6b7ec6a7311dd8845286678c76f5.exe 73 PID 2240 wrote to memory of 2680 2240 079a6b7ec6a7311dd8845286678c76f5.exe 73 PID 2240 wrote to memory of 2680 2240 079a6b7ec6a7311dd8845286678c76f5.exe 73 PID 2240 wrote to memory of 2680 2240 079a6b7ec6a7311dd8845286678c76f5.exe 73 PID 2240 wrote to memory of 2616 2240 079a6b7ec6a7311dd8845286678c76f5.exe 71 PID 2240 wrote to memory of 2616 2240 079a6b7ec6a7311dd8845286678c76f5.exe 71 PID 2240 wrote to memory of 2616 2240 079a6b7ec6a7311dd8845286678c76f5.exe 71 PID 2240 wrote to memory of 2616 2240 079a6b7ec6a7311dd8845286678c76f5.exe 71 PID 2240 wrote to memory of 2704 2240 079a6b7ec6a7311dd8845286678c76f5.exe 69 PID 2240 wrote to memory of 2704 2240 079a6b7ec6a7311dd8845286678c76f5.exe 69 PID 2240 wrote to memory of 2704 2240 079a6b7ec6a7311dd8845286678c76f5.exe 69 PID 2240 wrote to memory of 2704 2240 079a6b7ec6a7311dd8845286678c76f5.exe 69 PID 2240 wrote to memory of 2640 2240 079a6b7ec6a7311dd8845286678c76f5.exe 66 PID 2240 wrote to memory of 2640 2240 079a6b7ec6a7311dd8845286678c76f5.exe 66 PID 2240 wrote to memory of 2640 2240 079a6b7ec6a7311dd8845286678c76f5.exe 66 PID 2240 wrote to memory of 2640 2240 079a6b7ec6a7311dd8845286678c76f5.exe 66 PID 2240 wrote to memory of 2492 2240 079a6b7ec6a7311dd8845286678c76f5.exe 141 PID 2240 wrote to memory of 2492 2240 079a6b7ec6a7311dd8845286678c76f5.exe 141 PID 2240 wrote to memory of 2492 2240 079a6b7ec6a7311dd8845286678c76f5.exe 141 PID 2240 wrote to memory of 2492 2240 079a6b7ec6a7311dd8845286678c76f5.exe 141 PID 2240 wrote to memory of 2596 2240 079a6b7ec6a7311dd8845286678c76f5.exe 62 PID 2240 wrote to memory of 2596 2240 079a6b7ec6a7311dd8845286678c76f5.exe 62 PID 2240 wrote to memory of 2596 2240 079a6b7ec6a7311dd8845286678c76f5.exe 62 PID 2240 wrote to memory of 2596 2240 079a6b7ec6a7311dd8845286678c76f5.exe 62 PID 2240 wrote to memory of 2500 2240 079a6b7ec6a7311dd8845286678c76f5.exe 60 PID 2240 wrote to memory of 2500 2240 079a6b7ec6a7311dd8845286678c76f5.exe 60 PID 2240 wrote to memory of 2500 2240 079a6b7ec6a7311dd8845286678c76f5.exe 60 PID 2240 wrote to memory of 2500 2240 079a6b7ec6a7311dd8845286678c76f5.exe 60 PID 2240 wrote to memory of 2452 2240 079a6b7ec6a7311dd8845286678c76f5.exe 57 PID 2240 wrote to memory of 2452 2240 079a6b7ec6a7311dd8845286678c76f5.exe 57 PID 2240 wrote to memory of 2452 2240 079a6b7ec6a7311dd8845286678c76f5.exe 57 PID 2240 wrote to memory of 2452 2240 079a6b7ec6a7311dd8845286678c76f5.exe 57 PID 2704 wrote to memory of 2456 2704 net.exe 58 PID 2704 wrote to memory of 2456 2704 net.exe 58 PID 2704 wrote to memory of 2456 2704 net.exe 58 PID 2704 wrote to memory of 2456 2704 net.exe 58 PID 2680 wrote to memory of 2516 2680 cmd.exe 54 PID 2680 wrote to memory of 2516 2680 cmd.exe 54 PID 2680 wrote to memory of 2516 2680 cmd.exe 54 PID 2680 wrote to memory of 2516 2680 cmd.exe 54 PID 2240 wrote to memory of 2488 2240 079a6b7ec6a7311dd8845286678c76f5.exe 55 PID 2240 wrote to memory of 2488 2240 079a6b7ec6a7311dd8845286678c76f5.exe 55 PID 2240 wrote to memory of 2488 2240 079a6b7ec6a7311dd8845286678c76f5.exe 55 PID 2240 wrote to memory of 2488 2240 079a6b7ec6a7311dd8845286678c76f5.exe 55 PID 2240 wrote to memory of 2536 2240 079a6b7ec6a7311dd8845286678c76f5.exe 53 PID 2240 wrote to memory of 2536 2240 079a6b7ec6a7311dd8845286678c76f5.exe 53 PID 2240 wrote to memory of 2536 2240 079a6b7ec6a7311dd8845286678c76f5.exe 53 PID 2240 wrote to memory of 2536 2240 079a6b7ec6a7311dd8845286678c76f5.exe 53 -
Views/modifies file attributes 1 TTPs 17 IoCs
pid Process 2404 attrib.exe 2192 attrib.exe 2944 attrib.exe 2360 attrib.exe 2888 attrib.exe 2656 attrib.exe 2492 attrib.exe 892 attrib.exe 1840 attrib.exe 1668 attrib.exe 1132 attrib.exe 2388 attrib.exe 2792 attrib.exe 696 attrib.exe 2044 attrib.exe 1260 attrib.exe 2512 attrib.exe
Processes
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2880
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵
- Suspicious use of WriteProcessMemory
PID:1148
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\079a6b7ec6a7311dd8845286678c76f5.exe"C:\Users\Admin\AppData\Local\Temp\079a6b7ec6a7311dd8845286678c76f5.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2364
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1880
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1524
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2428
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2252
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1184
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1860
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:968
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1556
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:1816
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:892
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:536
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1424
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:828
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:13:22 PM C:\Windows\Sysinf.bat3⤵PID:1072
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:10:22 PM C:\Windows\Sysinf.bat3⤵PID:2864
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:11:20 PM C:\Windows\Help\HelpCat.exe3⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2208
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2728
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2788
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2264
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2300
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1644
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1032
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:964
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2408
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:868
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1868
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1916
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1100
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2652
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1336
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2548
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2860
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2868
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1140
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2264
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2812
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2104
-
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:2804
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2820
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2536
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:2488
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2452
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2500
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2596
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2492
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2640
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2704
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:13:19 PM C:\Windows\Sysinf.bat2⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:10:19 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2680
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:11:17 PM C:\Windows\Help\HelpCat.exe2⤵PID:2660
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:1060
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1216
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:576
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:3020
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:1708
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2728
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:2492
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:3008
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:1684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2972
-
C:\Windows\SysWOW64\at.exeat 6:10:19 PM C:\Windows\Sysinf.bat1⤵PID:2516
-
C:\Windows\SysWOW64\at.exeat 6:13:19 PM C:\Windows\Sysinf.bat1⤵PID:2472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1540
-
C:\Windows\SysWOW64\at.exeat 6:13:22 PM C:\Windows\Sysinf.bat1⤵PID:832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1928
-
C:\Windows\SysWOW64\at.exeat 6:10:22 PM C:\Windows\Sysinf.bat1⤵PID:3024
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2656
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2192
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "17695447111502178908-1259429313-1698858420-2085273634-292246685-2088285882-627824169"1⤵PID:2820
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2792
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "108396565218021610191808352243-1134534971-1074442137-1992508115-463150578335610059"1⤵PID:2364
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2944
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2360
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-65707153210391766781216760277-1270066965755150277-144887851-7848646832015349594"1⤵PID:576
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:696
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1259673901625255047140501374-980004851-1538045540-11803655616193683161391517499"1⤵PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52bbfd1a841d7e11aacd0cdff9db1f849
SHA1be1bb90667786d5d67e486b17a04d8ecc1df3da4
SHA256a9f0460dfa74b50ec28af0512424c7e003242dfbfd713dc6dcee29afe4ae72d9
SHA5129b04bda20d3dfdb3cbaec0b28bbfb277375503633d1e47836c7df4b67e56a355d22737f808b60cac6fd94a1536704f86a8f90630e3d1d7c48561676101b51cea