Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
193d173a2c2cd487c1836cbb6b3d5f83.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
193d173a2c2cd487c1836cbb6b3d5f83.exe
Resource
win10v2004-20231215-en
General
-
Target
193d173a2c2cd487c1836cbb6b3d5f83.exe
-
Size
548KB
-
MD5
193d173a2c2cd487c1836cbb6b3d5f83
-
SHA1
76bbcd2be38a545b505fa4832ba06b1449e62839
-
SHA256
c55a6e7a213ffaf785d6b1fcc86ba5f18990432721ad6df4d8930dafdeed0975
-
SHA512
f63b78681a98c30e18d2d3d064de63a767509e0847faba02ea28a086f150bebf3f47b72bd45bb344b17b5228632c725d35e74bfdcf64447bc3789370275935ad
-
SSDEEP
6144:UZfec9EbXDk6Rk8KJrG1VVE+Ih/UOPSe570Szp3b/UOPSe570Szp39BS:UZWtI6RkbupOB0POB0qA
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 KavUpda.exe -
Loads dropped DLL 2 IoCs
pid Process 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\Autorun.inf KavUpda.exe File opened for modification C:\Autorun.inf KavUpda.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 193d173a2c2cd487c1836cbb6b3d5f83.exe File opened for modification C:\Windows\SysWOW64\Option.bat KavUpda.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe 193d173a2c2cd487c1836cbb6b3d5f83.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 193d173a2c2cd487c1836cbb6b3d5f83.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\system\KavUpda.exe 193d173a2c2cd487c1836cbb6b3d5f83.exe File created C:\Windows\Help\HelpCat.exe 193d173a2c2cd487c1836cbb6b3d5f83.exe File created C:\Windows\regedt32.sys 193d173a2c2cd487c1836cbb6b3d5f83.exe File opened for modification C:\Windows\regedt32.sys KavUpda.exe File created C:\Windows\regedt32.sys KavUpda.exe File created C:\Windows\system\KavUpda.exe 193d173a2c2cd487c1836cbb6b3d5f83.exe File created C:\Windows\Sysinf.bat 193d173a2c2cd487c1836cbb6b3d5f83.exe File opened for modification C:\Windows\system\KavUpda.exe KavUpda.exe File opened for modification C:\Windows\Sysinf.bat KavUpda.exe File opened for modification C:\Windows\Help\HelpCat.exe 193d173a2c2cd487c1836cbb6b3d5f83.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1416 sc.exe 2808 sc.exe 1264 sc.exe 2228 sc.exe 2512 sc.exe 952 sc.exe 1704 sc.exe 1832 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 1436 regedit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: 33 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe Token: SeIncBasePriorityPrivilege 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 2736 KavUpda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1580 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 20 PID 2060 wrote to memory of 1580 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 20 PID 2060 wrote to memory of 1580 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 20 PID 2060 wrote to memory of 1580 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 20 PID 2060 wrote to memory of 2160 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 18 PID 2060 wrote to memory of 2160 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 18 PID 2060 wrote to memory of 2160 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 18 PID 2060 wrote to memory of 2160 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 18 PID 2160 wrote to memory of 2540 2160 net.exe 16 PID 2160 wrote to memory of 2540 2160 net.exe 16 PID 2160 wrote to memory of 2540 2160 net.exe 16 PID 2160 wrote to memory of 2540 2160 net.exe 16 PID 2060 wrote to memory of 2668 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 74 PID 2060 wrote to memory of 2668 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 74 PID 2060 wrote to memory of 2668 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 74 PID 2060 wrote to memory of 2668 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 74 PID 2060 wrote to memory of 2720 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 73 PID 2060 wrote to memory of 2720 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 73 PID 2060 wrote to memory of 2720 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 73 PID 2060 wrote to memory of 2720 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 73 PID 2060 wrote to memory of 2552 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 71 PID 2060 wrote to memory of 2552 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 71 PID 2060 wrote to memory of 2552 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 71 PID 2060 wrote to memory of 2552 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 71 PID 2060 wrote to memory of 2712 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 70 PID 2060 wrote to memory of 2712 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 70 PID 2060 wrote to memory of 2712 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 70 PID 2060 wrote to memory of 2712 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 70 PID 2060 wrote to memory of 3040 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 67 PID 2060 wrote to memory of 3040 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 67 PID 2060 wrote to memory of 3040 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 67 PID 2060 wrote to memory of 3040 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 67 PID 2060 wrote to memory of 2272 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 33 PID 2060 wrote to memory of 2272 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 33 PID 2060 wrote to memory of 2272 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 33 PID 2060 wrote to memory of 2272 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 33 PID 2060 wrote to memory of 2116 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 63 PID 2060 wrote to memory of 2116 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 63 PID 2060 wrote to memory of 2116 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 63 PID 2060 wrote to memory of 2116 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 63 PID 3040 wrote to memory of 2488 3040 net.exe 62 PID 3040 wrote to memory of 2488 3040 net.exe 62 PID 3040 wrote to memory of 2488 3040 net.exe 62 PID 3040 wrote to memory of 2488 3040 net.exe 62 PID 2060 wrote to memory of 2444 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 60 PID 2060 wrote to memory of 2444 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 60 PID 2060 wrote to memory of 2444 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 60 PID 2060 wrote to memory of 2444 2060 193d173a2c2cd487c1836cbb6b3d5f83.exe 60 PID 2720 wrote to memory of 2496 2720 cmd.exe 34 PID 2720 wrote to memory of 2496 2720 cmd.exe 34 PID 2720 wrote to memory of 2496 2720 cmd.exe 34 PID 2720 wrote to memory of 2496 2720 cmd.exe 34 PID 2272 wrote to memory of 2524 2272 net.exe 58 PID 2272 wrote to memory of 2524 2272 net.exe 58 PID 2272 wrote to memory of 2524 2272 net.exe 58 PID 2272 wrote to memory of 2524 2272 net.exe 58 PID 2552 wrote to memory of 1524 2552 cmd.exe 57 PID 2552 wrote to memory of 1524 2552 cmd.exe 57 PID 2552 wrote to memory of 1524 2552 cmd.exe 57 PID 2552 wrote to memory of 1524 2552 cmd.exe 57 PID 2712 wrote to memory of 2960 2712 net.exe 55 PID 2712 wrote to memory of 2960 2712 net.exe 55 PID 2712 wrote to memory of 2960 2712 net.exe 55 PID 2712 wrote to memory of 2960 2712 net.exe 55 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2800 attrib.exe 2276 attrib.exe 1748 attrib.exe 1120 attrib.exe 2684 attrib.exe 1976 attrib.exe 2104 attrib.exe 3024 attrib.exe 2864 attrib.exe 2696 attrib.exe 1884 attrib.exe 1468 attrib.exe 2808 attrib.exe 2036 attrib.exe 1760 attrib.exe 1488 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\193d173a2c2cd487c1836cbb6b3d5f83.exe"C:\Users\Admin\AppData\Local\Temp\193d173a2c2cd487c1836cbb6b3d5f83.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:2160
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:1580
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:2524
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2808
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:704
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2764
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:1436
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1264
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1240
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:620
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1532
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2004
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1704
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1832
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1416
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:2660
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:2040
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:1352
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1744
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:56:50 PM C:\Windows\Sysinf.bat3⤵PID:2856
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:53:50 PM C:\Windows\Sysinf.bat3⤵PID:2964
-
-
C:\Windows\SysWOW64\At.exeAt.exe 2:54:48 PM C:\Windows\Help\HelpCat.exe3⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2148
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1592
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2684
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1180
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2664
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:860
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2412
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1480
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:956
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:820
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1780
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1600
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2656
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2968
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:848
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2412
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:2228
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2512
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2444
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2116
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:3040
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:56:47 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2552
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 2:53:47 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2720
-
-
C:\Windows\SysWOW64\At.exeAt.exe 2:54:45 PM C:\Windows\Help\HelpCat.exe2⤵PID:2668
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:808
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:584
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:596
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:1256
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:2404
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2540
-
C:\Windows\SysWOW64\at.exeat 2:53:47 PM C:\Windows\Sysinf.bat1⤵PID:2496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2932
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:1192
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:1160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2960
-
C:\Windows\SysWOW64\at.exeat 2:56:47 PM C:\Windows\Sysinf.bat1⤵PID:1524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2488
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:572
-
C:\Windows\SysWOW64\at.exeat 2:56:50 PM C:\Windows\Sysinf.bat1⤵PID:1464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:788
-
C:\Windows\SysWOW64\at.exeat 2:53:50 PM C:\Windows\Sysinf.bat1⤵PID:684
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1884
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1468
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-977142091674753739346266003-1507654641181465343-1514720149137209263331511271"1⤵PID:948
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1748
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1120
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2036
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2104
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2864
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3024
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2696
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2684
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1760
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2800