Analysis
-
max time kernel
2s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
12d8788d43e807e3e791b26828dbc40c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12d8788d43e807e3e791b26828dbc40c.exe
Resource
win10v2004-20231222-en
General
-
Target
12d8788d43e807e3e791b26828dbc40c.exe
-
Size
2.2MB
-
MD5
12d8788d43e807e3e791b26828dbc40c
-
SHA1
d1ff51bb7f43d4114f10f1c9d6ec973c30ca037b
-
SHA256
39cb598899670afe42281656e2f6898a5645ea35d0497327458b5c1eabcd45f5
-
SHA512
d9591a69293167000b1f5baeb48b98318befc1e6a8056615fad5d9d848853972821aec9dfb03085c848e94bf398eb9134d45d3ba46cf3af859a443ce74e9d21f
-
SSDEEP
12288:UZWtI6RknKu0ayOB0fOVKu0ayOB0fOVKu0ayOB0fOVKu0ayOB0fOVKu0ayOB0fOO:UuhaNyOxyOxyOxyOxyOxyOMB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" reg.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" reg.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" reg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 12d8788d43e807e3e791b26828dbc40c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system\KavUpda.exe 12d8788d43e807e3e791b26828dbc40c.exe File created C:\Windows\Help\HelpCat.exe 12d8788d43e807e3e791b26828dbc40c.exe File opened for modification C:\Windows\Help\HelpCat.exe 12d8788d43e807e3e791b26828dbc40c.exe File created C:\Windows\Sysinf.bat 12d8788d43e807e3e791b26828dbc40c.exe File created C:\Windows\regedt32.sys 12d8788d43e807e3e791b26828dbc40c.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1736 sc.exe 3804 sc.exe 512 sc.exe 1524 sc.exe 1448 sc.exe 3724 sc.exe 1468 sc.exe 2952 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 3244 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 12d8788d43e807e3e791b26828dbc40c.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1472 1532 12d8788d43e807e3e791b26828dbc40c.exe 23 PID 1532 wrote to memory of 1472 1532 12d8788d43e807e3e791b26828dbc40c.exe 23 PID 1532 wrote to memory of 1472 1532 12d8788d43e807e3e791b26828dbc40c.exe 23 PID 1532 wrote to memory of 2680 1532 12d8788d43e807e3e791b26828dbc40c.exe 22 PID 1532 wrote to memory of 2680 1532 12d8788d43e807e3e791b26828dbc40c.exe 22 PID 1532 wrote to memory of 2680 1532 12d8788d43e807e3e791b26828dbc40c.exe 22 PID 2680 wrote to memory of 2216 2680 net.exe 202 PID 2680 wrote to memory of 2216 2680 net.exe 202 PID 2680 wrote to memory of 2216 2680 net.exe 202 PID 1532 wrote to memory of 3712 1532 12d8788d43e807e3e791b26828dbc40c.exe 99 PID 1532 wrote to memory of 3712 1532 12d8788d43e807e3e791b26828dbc40c.exe 99 PID 1532 wrote to memory of 3712 1532 12d8788d43e807e3e791b26828dbc40c.exe 99 PID 1532 wrote to memory of 4344 1532 12d8788d43e807e3e791b26828dbc40c.exe 98 PID 1532 wrote to memory of 4344 1532 12d8788d43e807e3e791b26828dbc40c.exe 98 PID 1532 wrote to memory of 4344 1532 12d8788d43e807e3e791b26828dbc40c.exe 98 PID 1532 wrote to memory of 1004 1532 12d8788d43e807e3e791b26828dbc40c.exe 97 PID 1532 wrote to memory of 1004 1532 12d8788d43e807e3e791b26828dbc40c.exe 97 PID 1532 wrote to memory of 1004 1532 12d8788d43e807e3e791b26828dbc40c.exe 97 PID 1532 wrote to memory of 4200 1532 12d8788d43e807e3e791b26828dbc40c.exe 95 PID 1532 wrote to memory of 4200 1532 12d8788d43e807e3e791b26828dbc40c.exe 95 PID 1532 wrote to memory of 4200 1532 12d8788d43e807e3e791b26828dbc40c.exe 95 PID 1532 wrote to memory of 2640 1532 12d8788d43e807e3e791b26828dbc40c.exe 127 PID 1532 wrote to memory of 2640 1532 12d8788d43e807e3e791b26828dbc40c.exe 127 PID 1532 wrote to memory of 2640 1532 12d8788d43e807e3e791b26828dbc40c.exe 127 PID 1532 wrote to memory of 5116 1532 12d8788d43e807e3e791b26828dbc40c.exe 90 PID 1532 wrote to memory of 5116 1532 12d8788d43e807e3e791b26828dbc40c.exe 90 PID 1532 wrote to memory of 5116 1532 12d8788d43e807e3e791b26828dbc40c.exe 90 PID 1532 wrote to memory of 1888 1532 12d8788d43e807e3e791b26828dbc40c.exe 89 PID 1532 wrote to memory of 1888 1532 12d8788d43e807e3e791b26828dbc40c.exe 89 PID 1532 wrote to memory of 1888 1532 12d8788d43e807e3e791b26828dbc40c.exe 89 PID 1532 wrote to memory of 1372 1532 12d8788d43e807e3e791b26828dbc40c.exe 87 PID 1532 wrote to memory of 1372 1532 12d8788d43e807e3e791b26828dbc40c.exe 87 PID 1532 wrote to memory of 1372 1532 12d8788d43e807e3e791b26828dbc40c.exe 87 PID 1532 wrote to memory of 3724 1532 12d8788d43e807e3e791b26828dbc40c.exe 85 PID 1532 wrote to memory of 3724 1532 12d8788d43e807e3e791b26828dbc40c.exe 85 PID 1532 wrote to memory of 3724 1532 12d8788d43e807e3e791b26828dbc40c.exe 85 PID 1532 wrote to memory of 1448 1532 12d8788d43e807e3e791b26828dbc40c.exe 83 PID 1532 wrote to memory of 1448 1532 12d8788d43e807e3e791b26828dbc40c.exe 83 PID 1532 wrote to memory of 1448 1532 12d8788d43e807e3e791b26828dbc40c.exe 83 PID 1532 wrote to memory of 1524 1532 12d8788d43e807e3e791b26828dbc40c.exe 125 PID 1532 wrote to memory of 1524 1532 12d8788d43e807e3e791b26828dbc40c.exe 125 PID 1532 wrote to memory of 1524 1532 12d8788d43e807e3e791b26828dbc40c.exe 125 PID 1532 wrote to memory of 512 1532 12d8788d43e807e3e791b26828dbc40c.exe 78 PID 1532 wrote to memory of 512 1532 12d8788d43e807e3e791b26828dbc40c.exe 78 PID 1532 wrote to memory of 512 1532 12d8788d43e807e3e791b26828dbc40c.exe 78 PID 1532 wrote to memory of 3244 1532 12d8788d43e807e3e791b26828dbc40c.exe 131 PID 1532 wrote to memory of 3244 1532 12d8788d43e807e3e791b26828dbc40c.exe 131 PID 1532 wrote to memory of 3244 1532 12d8788d43e807e3e791b26828dbc40c.exe 131 PID 1532 wrote to memory of 4808 1532 12d8788d43e807e3e791b26828dbc40c.exe 77 PID 1532 wrote to memory of 4808 1532 12d8788d43e807e3e791b26828dbc40c.exe 77 PID 1532 wrote to memory of 4808 1532 12d8788d43e807e3e791b26828dbc40c.exe 77 PID 1532 wrote to memory of 1148 1532 12d8788d43e807e3e791b26828dbc40c.exe 76 PID 1532 wrote to memory of 1148 1532 12d8788d43e807e3e791b26828dbc40c.exe 76 PID 1532 wrote to memory of 1148 1532 12d8788d43e807e3e791b26828dbc40c.exe 76 PID 4344 wrote to memory of 1928 4344 cmd.exe 73 PID 4344 wrote to memory of 1928 4344 cmd.exe 73 PID 4344 wrote to memory of 1928 4344 cmd.exe 73 PID 2640 wrote to memory of 1960 2640 Conhost.exe 270 PID 2640 wrote to memory of 1960 2640 Conhost.exe 270 PID 2640 wrote to memory of 1960 2640 Conhost.exe 270 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 1272 attrib.exe 4996 attrib.exe 3320 attrib.exe 3628 attrib.exe 1680 attrib.exe 1516 attrib.exe 3592 attrib.exe 4256 attrib.exe 2708 attrib.exe 4788 attrib.exe 4720 attrib.exe 1084 attrib.exe 4300 attrib.exe 4900 attrib.exe 4596 attrib.exe 4508 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d8788d43e807e3e791b26828dbc40c.exe"C:\Users\Admin\AppData\Local\Temp\12d8788d43e807e3e791b26828dbc40c.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:2680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:1472
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:3244
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:2040
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3732
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of WriteProcessMemory
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2928
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
PID:3244
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2152
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1468
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2952
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1736
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:3804
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:4308
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:2488
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:3772
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:4356
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1740
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3764
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:4904
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:11:20 AM C:\Windows\Sysinf.bat3⤵PID:216
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:08:20 AM C:\Windows\Sysinf.bat3⤵PID:928
-
-
C:\Windows\SysWOW64\At.exeAt.exe 11:09:18 AM C:\Windows\Help\HelpCat.exe3⤵PID:5004
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4680
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2604
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2764
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4408
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3740
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2072
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4616
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3312
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2396
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3648
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4000
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:228
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1236
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4580
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4596
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1960
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2772
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3312
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:712
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3400
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1740
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4200
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1148
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:4808
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:512
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1524
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1448
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3724
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1372
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1888
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:5116
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2640
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:4200
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:11:17 AM C:\Windows\Sysinf.bat2⤵PID:1004
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:08:17 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4344
-
-
C:\Windows\SysWOW64\At.exeAt.exe 11:09:15 AM C:\Windows\Help\HelpCat.exe2⤵PID:3712
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:920
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:4844
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2600
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:3740
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:4996
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\12d8788d43e807e3e791b26828dbc40c~4.exe12d8788d43e807e3e791b26828dbc40c~4.exe2⤵PID:3232
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1960
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:4596
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3648
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:1084
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:904
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat1⤵PID:4756
-
C:\Windows\SysWOW64\at.exeat 11:11:17 AM C:\Windows\Sysinf.bat1⤵PID:4680
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:1516
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3764
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:4788
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4240
-
C:\Windows\SysWOW64\at.exeat 11:08:17 AM C:\Windows\Sysinf.bat1⤵PID:1928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2296
-
C:\Windows\SysWOW64\at.exeat 11:08:20 AM C:\Windows\Sysinf.bat1⤵PID:4912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4624
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4508
-
C:\Windows\SysWOW64\at.exeat 11:11:20 AM C:\Windows\Sysinf.bat1⤵PID:940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:5108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2216
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3628
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1272
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4720
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3592
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4300
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3320
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4900
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4256