Analysis
-
max time kernel
2s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
08a4c61f3d342c426337c04b692ba93f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08a4c61f3d342c426337c04b692ba93f.exe
Resource
win10v2004-20231215-en
General
-
Target
08a4c61f3d342c426337c04b692ba93f.exe
-
Size
1.8MB
-
MD5
08a4c61f3d342c426337c04b692ba93f
-
SHA1
7a93f88deba49137493d45d2a810e02d179d1b35
-
SHA256
d21199130543e4b74d12f58e82d64f7ff8edd11d090bfcb5a564390a7f030f53
-
SHA512
19c42b7455b2039695a899b6e4e61d520d7dbbf809bf69dffe6c638a59c1dec3ab9d41b13accd9ac3f521f71fefb08bf205357826d955ee9c38e94a4a70edf4d
-
SSDEEP
12288:UZWtI6RktOB0vYwOUOB0vYwOUOB0vYwOUOB0vYwOUOB0vYwOUOB0vYVCPZhut:UuhatOAYeOAYeOAYeOAYeOAYeOAYA8
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 08a4c61f3d342c426337c04b692ba93f.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system\KavUpda.exe 08a4c61f3d342c426337c04b692ba93f.exe File created C:\Windows\Help\HelpCat.exe 08a4c61f3d342c426337c04b692ba93f.exe File opened for modification C:\Windows\Help\HelpCat.exe 08a4c61f3d342c426337c04b692ba93f.exe File created C:\Windows\Sysinf.bat 08a4c61f3d342c426337c04b692ba93f.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1976 sc.exe 1484 sc.exe 2384 sc.exe 928 sc.exe 1452 sc.exe 2948 sc.exe 2756 sc.exe 2764 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2168 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2348 08a4c61f3d342c426337c04b692ba93f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2208 2348 08a4c61f3d342c426337c04b692ba93f.exe 18 PID 2348 wrote to memory of 2208 2348 08a4c61f3d342c426337c04b692ba93f.exe 18 PID 2348 wrote to memory of 2208 2348 08a4c61f3d342c426337c04b692ba93f.exe 18 PID 2348 wrote to memory of 2208 2348 08a4c61f3d342c426337c04b692ba93f.exe 18 PID 2348 wrote to memory of 2160 2348 08a4c61f3d342c426337c04b692ba93f.exe 17 PID 2348 wrote to memory of 2160 2348 08a4c61f3d342c426337c04b692ba93f.exe 17 PID 2348 wrote to memory of 2160 2348 08a4c61f3d342c426337c04b692ba93f.exe 17 PID 2348 wrote to memory of 2160 2348 08a4c61f3d342c426337c04b692ba93f.exe 17 PID 2160 wrote to memory of 2296 2160 net.exe 15 PID 2160 wrote to memory of 2296 2160 net.exe 15 PID 2160 wrote to memory of 2296 2160 net.exe 15 PID 2160 wrote to memory of 2296 2160 net.exe 15 PID 2348 wrote to memory of 2660 2348 08a4c61f3d342c426337c04b692ba93f.exe 74 PID 2348 wrote to memory of 2660 2348 08a4c61f3d342c426337c04b692ba93f.exe 74 PID 2348 wrote to memory of 2660 2348 08a4c61f3d342c426337c04b692ba93f.exe 74 PID 2348 wrote to memory of 2660 2348 08a4c61f3d342c426337c04b692ba93f.exe 74 PID 2348 wrote to memory of 2632 2348 08a4c61f3d342c426337c04b692ba93f.exe 73 PID 2348 wrote to memory of 2632 2348 08a4c61f3d342c426337c04b692ba93f.exe 73 PID 2348 wrote to memory of 2632 2348 08a4c61f3d342c426337c04b692ba93f.exe 73 PID 2348 wrote to memory of 2632 2348 08a4c61f3d342c426337c04b692ba93f.exe 73 PID 2348 wrote to memory of 2568 2348 08a4c61f3d342c426337c04b692ba93f.exe 71 PID 2348 wrote to memory of 2568 2348 08a4c61f3d342c426337c04b692ba93f.exe 71 PID 2348 wrote to memory of 2568 2348 08a4c61f3d342c426337c04b692ba93f.exe 71 PID 2348 wrote to memory of 2568 2348 08a4c61f3d342c426337c04b692ba93f.exe 71 PID 2348 wrote to memory of 3040 2348 08a4c61f3d342c426337c04b692ba93f.exe 69 PID 2348 wrote to memory of 3040 2348 08a4c61f3d342c426337c04b692ba93f.exe 69 PID 2348 wrote to memory of 3040 2348 08a4c61f3d342c426337c04b692ba93f.exe 69 PID 2348 wrote to memory of 3040 2348 08a4c61f3d342c426337c04b692ba93f.exe 69 PID 2348 wrote to memory of 2916 2348 08a4c61f3d342c426337c04b692ba93f.exe 66 PID 2348 wrote to memory of 2916 2348 08a4c61f3d342c426337c04b692ba93f.exe 66 PID 2348 wrote to memory of 2916 2348 08a4c61f3d342c426337c04b692ba93f.exe 66 PID 2348 wrote to memory of 2916 2348 08a4c61f3d342c426337c04b692ba93f.exe 66 PID 2348 wrote to memory of 2468 2348 08a4c61f3d342c426337c04b692ba93f.exe 33 PID 2348 wrote to memory of 2468 2348 08a4c61f3d342c426337c04b692ba93f.exe 33 PID 2348 wrote to memory of 2468 2348 08a4c61f3d342c426337c04b692ba93f.exe 33 PID 2348 wrote to memory of 2468 2348 08a4c61f3d342c426337c04b692ba93f.exe 33 PID 2632 wrote to memory of 2440 2632 cmd.exe 62 PID 2632 wrote to memory of 2440 2632 cmd.exe 62 PID 2632 wrote to memory of 2440 2632 cmd.exe 62 PID 2632 wrote to memory of 2440 2632 cmd.exe 62 PID 2348 wrote to memory of 2488 2348 08a4c61f3d342c426337c04b692ba93f.exe 63 PID 2348 wrote to memory of 2488 2348 08a4c61f3d342c426337c04b692ba93f.exe 63 PID 2348 wrote to memory of 2488 2348 08a4c61f3d342c426337c04b692ba93f.exe 63 PID 2348 wrote to memory of 2488 2348 08a4c61f3d342c426337c04b692ba93f.exe 63 PID 2348 wrote to memory of 2456 2348 08a4c61f3d342c426337c04b692ba93f.exe 138 PID 2348 wrote to memory of 2456 2348 08a4c61f3d342c426337c04b692ba93f.exe 138 PID 2348 wrote to memory of 2456 2348 08a4c61f3d342c426337c04b692ba93f.exe 138 PID 2348 wrote to memory of 2456 2348 08a4c61f3d342c426337c04b692ba93f.exe 138 PID 2916 wrote to memory of 2472 2916 net.exe 59 PID 2916 wrote to memory of 2472 2916 net.exe 59 PID 2916 wrote to memory of 2472 2916 net.exe 59 PID 2916 wrote to memory of 2472 2916 net.exe 59 PID 3040 wrote to memory of 2516 3040 net.exe 58 PID 3040 wrote to memory of 2516 3040 net.exe 58 PID 3040 wrote to memory of 2516 3040 net.exe 58 PID 3040 wrote to memory of 2516 3040 net.exe 58 PID 2468 wrote to memory of 2492 2468 net.exe 56 PID 2468 wrote to memory of 2492 2468 net.exe 56 PID 2468 wrote to memory of 2492 2468 net.exe 56 PID 2468 wrote to memory of 2492 2468 net.exe 56 PID 2568 wrote to memory of 2744 2568 cmd.exe 55 PID 2568 wrote to memory of 2744 2568 cmd.exe 55 PID 2568 wrote to memory of 2744 2568 cmd.exe 55 PID 2568 wrote to memory of 2744 2568 cmd.exe 55 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 3040 attrib.exe 1000 attrib.exe 3060 attrib.exe 2668 attrib.exe 608 attrib.exe 2536 attrib.exe 2664 attrib.exe 1964 attrib.exe 1296 attrib.exe 1740 attrib.exe 2452 attrib.exe 2692 attrib.exe 1056 attrib.exe 2680 attrib.exe 2448 attrib.exe 2908 attrib.exe
Processes
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2296
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵
- Suspicious use of WriteProcessMemory
PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\08a4c61f3d342c426337c04b692ba93f.exe"C:\Users\Admin\AppData\Local\Temp\08a4c61f3d342c426337c04b692ba93f.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:2492
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:968
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2760
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:2168
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2756
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2764
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:1752
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y4⤵PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1756
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2416
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:976
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:960
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2384
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:928
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1452
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2948
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:1992
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:784
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2232
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:2108
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3012
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 9:36:06 PM C:\Windows\Sysinf.bat3⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 9:33:06 PM C:\Windows\Sysinf.bat3⤵PID:2972
-
-
C:\Windows\SysWOW64\At.exeAt.exe 9:34:04 PM C:\Windows\Help\HelpCat.exe3⤵PID:2200
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1256
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1384
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:540
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2120
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:780
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1088
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1092
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1176
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2272
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:996
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2588
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1740
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2412
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1124
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1484
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2456
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2488
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2916
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:3040
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 9:36:03 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2568
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 9:33:03 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2632
-
-
C:\Windows\SysWOW64\At.exeAt.exe 9:34:01 PM C:\Windows\Help\HelpCat.exe2⤵PID:2660
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:1840
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:908
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:576
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:632
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\08a4c61f3d342c426337c04b692ba93f~4.exe08a4c61f3d342c426337c04b692ba93f~4.exe2⤵PID:2244
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2536
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:1588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2076
-
C:\Windows\SysWOW64\at.exeat 9:36:03 PM C:\Windows\Sysinf.bat1⤵PID:2744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2472
-
C:\Windows\SysWOW64\at.exeat 9:33:03 PM C:\Windows\Sysinf.bat1⤵PID:2440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1860
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:848
-
C:\Windows\SysWOW64\at.exeat 9:33:06 PM C:\Windows\Sysinf.bat1⤵PID:1472
-
C:\Windows\SysWOW64\at.exeat 9:36:06 PM C:\Windows\Sysinf.bat1⤵PID:580
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2452 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:3040
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1740 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:2664
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2121638262-14765679372132810694-2002653180-1403175063195217438810449544941215663518"1⤵PID:2456
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2692
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2536
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:608
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1000
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3060
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2668
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2680
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2448
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1964
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD594e9a181bdaf92d1d1acb2dc5587efd9
SHA1bec8f13f23d3292a0921aa1876ed24d1e9bc74bb
SHA256c0f3f2f2dfb36dbc1166aa29d8ddd9c2fed38a8509fefb95b3e844c193cab6cc
SHA512dc3c03316c8a5dc256915470555e52eb556639ed0a47661de69d51a4b4dea126cf33fb35e61672bb073c808cfa0572dce23c6eeb9723eccaa6fe589872cd8322