Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
21a5a79c9ca784f652f196bf6d8cf071.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21a5a79c9ca784f652f196bf6d8cf071.vbs
Resource
win10v2004-20231215-en
General
-
Target
21a5a79c9ca784f652f196bf6d8cf071.vbs
-
Size
3KB
-
MD5
21a5a79c9ca784f652f196bf6d8cf071
-
SHA1
4a47358fd44b27c84f7b219c827168aacf235314
-
SHA256
62aee883f95c20ec2849eaa5e8bc3b8ff55ad9feb61610e1242564172edf821b
-
SHA512
c377a99497e2aecc7b23cb4de1f84489c5e04dbe5dbc340150b249915415b06a931d01631b473bf001e05cb395e49776dcb8f258d1811a70ab9498a0f7dfb60e
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 57 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1856 attrib.exe 1740 attrib.exe 4564 attrib.exe 4432 attrib.exe 2324 attrib.exe 980 attrib.exe 4920 attrib.exe 2924 attrib.exe 388 attrib.exe 1892 attrib.exe 2328 attrib.exe 3364 attrib.exe 3740 attrib.exe 1976 attrib.exe 1536 attrib.exe 448 attrib.exe 2332 attrib.exe 1224 attrib.exe 2304 attrib.exe 4424 attrib.exe 4128 attrib.exe 5100 attrib.exe 2356 attrib.exe 2552 attrib.exe 4036 attrib.exe 4824 attrib.exe 3356 attrib.exe 2120 attrib.exe 2316 attrib.exe 4028 attrib.exe 3452 attrib.exe 4028 attrib.exe 1512 attrib.exe 4072 attrib.exe 4304 attrib.exe 5064 attrib.exe 3624 attrib.exe 3292 attrib.exe 4816 attrib.exe 4232 attrib.exe 4128 attrib.exe 212 attrib.exe 2452 attrib.exe 640 attrib.exe 2684 attrib.exe 4600 attrib.exe 5052 attrib.exe 3304 attrib.exe 4828 attrib.exe 1520 attrib.exe 3504 attrib.exe 1740 attrib.exe 1976 attrib.exe 856 attrib.exe 2648 attrib.exe 2148 attrib.exe 2712 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "wscript.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\21a5a79c9ca784f652f196bf6d8cf071.vbs\" t" WScript.exe -
Drops autorun.inf file 1 TTPs 52 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File created F:\autorun.inf WScript.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File created C:\autorun.inf WScript.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe File opened for modification C:\autorun.inf attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1800 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4328 WScript.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1800 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 1800 4328 WScript.exe 90 PID 4328 wrote to memory of 1800 4328 WScript.exe 90 PID 4328 wrote to memory of 1892 4328 WScript.exe 94 PID 4328 wrote to memory of 1892 4328 WScript.exe 94 PID 4328 wrote to memory of 4304 4328 WScript.exe 102 PID 4328 wrote to memory of 4304 4328 WScript.exe 102 PID 4328 wrote to memory of 1740 4328 WScript.exe 97 PID 4328 wrote to memory of 1740 4328 WScript.exe 97 PID 4328 wrote to memory of 1976 4328 WScript.exe 99 PID 4328 wrote to memory of 1976 4328 WScript.exe 99 PID 4328 wrote to memory of 856 4328 WScript.exe 101 PID 4328 wrote to memory of 856 4328 WScript.exe 101 PID 4328 wrote to memory of 3172 4328 WScript.exe 104 PID 4328 wrote to memory of 3172 4328 WScript.exe 104 PID 4328 wrote to memory of 2648 4328 WScript.exe 106 PID 4328 wrote to memory of 2648 4328 WScript.exe 106 PID 4328 wrote to memory of 4816 4328 WScript.exe 108 PID 4328 wrote to memory of 4816 4328 WScript.exe 108 PID 4328 wrote to memory of 4700 4328 WScript.exe 110 PID 4328 wrote to memory of 4700 4328 WScript.exe 110 PID 4328 wrote to memory of 2304 4328 WScript.exe 112 PID 4328 wrote to memory of 2304 4328 WScript.exe 112 PID 4328 wrote to memory of 5052 4328 WScript.exe 114 PID 4328 wrote to memory of 5052 4328 WScript.exe 114 PID 4328 wrote to memory of 3824 4328 WScript.exe 118 PID 4328 wrote to memory of 3824 4328 WScript.exe 118 PID 4328 wrote to memory of 2120 4328 WScript.exe 120 PID 4328 wrote to memory of 2120 4328 WScript.exe 120 PID 4328 wrote to memory of 2552 4328 WScript.exe 122 PID 4328 wrote to memory of 2552 4328 WScript.exe 122 PID 4328 wrote to memory of 4276 4328 WScript.exe 124 PID 4328 wrote to memory of 4276 4328 WScript.exe 124 PID 4328 wrote to memory of 3504 4328 WScript.exe 126 PID 4328 wrote to memory of 3504 4328 WScript.exe 126 PID 4328 wrote to memory of 3304 4328 WScript.exe 128 PID 4328 wrote to memory of 3304 4328 WScript.exe 128 PID 4328 wrote to memory of 3808 4328 WScript.exe 134 PID 4328 wrote to memory of 3808 4328 WScript.exe 134 PID 4328 wrote to memory of 2924 4328 WScript.exe 136 PID 4328 wrote to memory of 2924 4328 WScript.exe 136 PID 4328 wrote to memory of 3740 4328 WScript.exe 138 PID 4328 wrote to memory of 3740 4328 WScript.exe 138 PID 4328 wrote to memory of 4888 4328 WScript.exe 140 PID 4328 wrote to memory of 4888 4328 WScript.exe 140 PID 4328 wrote to memory of 5064 4328 WScript.exe 142 PID 4328 wrote to memory of 5064 4328 WScript.exe 142 PID 4328 wrote to memory of 980 4328 WScript.exe 144 PID 4328 wrote to memory of 980 4328 WScript.exe 144 PID 4328 wrote to memory of 1704 4328 WScript.exe 146 PID 4328 wrote to memory of 1704 4328 WScript.exe 146 PID 4328 wrote to memory of 4036 4328 WScript.exe 148 PID 4328 wrote to memory of 4036 4328 WScript.exe 148 PID 4328 wrote to memory of 1740 4328 WScript.exe 150 PID 4328 wrote to memory of 1740 4328 WScript.exe 150 PID 4328 wrote to memory of 4532 4328 WScript.exe 152 PID 4328 wrote to memory of 4532 4328 WScript.exe 152 PID 4328 wrote to memory of 3624 4328 WScript.exe 155 PID 4328 wrote to memory of 3624 4328 WScript.exe 155 PID 4328 wrote to memory of 4232 4328 WScript.exe 156 PID 4328 wrote to memory of 4232 4328 WScript.exe 156 PID 4328 wrote to memory of 4564 4328 WScript.exe 161 PID 4328 wrote to memory of 4564 4328 WScript.exe 161 PID 4328 wrote to memory of 4424 4328 WScript.exe 163 PID 4328 wrote to memory of 4424 4328 WScript.exe 163 -
Views/modifies file attributes 1 TTPs 64 IoCs
pid Process 1228 attrib.exe 4128 attrib.exe 2324 attrib.exe 2272 attrib.exe 2120 attrib.exe 980 attrib.exe 2452 attrib.exe 3304 attrib.exe 4888 attrib.exe 2272 attrib.exe 5064 attrib.exe 3120 attrib.exe 448 attrib.exe 4504 attrib.exe 4532 attrib.exe 3208 attrib.exe 4564 attrib.exe 656 attrib.exe 4920 attrib.exe 2648 attrib.exe 3824 attrib.exe 4028 attrib.exe 1536 attrib.exe 3356 attrib.exe 2356 attrib.exe 1976 attrib.exe 4304 attrib.exe 4824 attrib.exe 4848 attrib.exe 4220 attrib.exe 2552 attrib.exe 3624 attrib.exe 4036 attrib.exe 1740 attrib.exe 1976 attrib.exe 4828 attrib.exe 4028 attrib.exe 1856 attrib.exe 856 attrib.exe 3504 attrib.exe 3232 attrib.exe 1512 attrib.exe 2684 attrib.exe 2304 attrib.exe 4128 attrib.exe 2316 attrib.exe 3292 attrib.exe 3176 attrib.exe 4816 attrib.exe 4424 attrib.exe 2148 attrib.exe 2328 attrib.exe 3172 attrib.exe 5052 attrib.exe 2924 attrib.exe 4232 attrib.exe 3824 attrib.exe 388 attrib.exe 1892 attrib.exe 1740 attrib.exe 2332 attrib.exe 1224 attrib.exe 4636 attrib.exe 4600 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\21a5a79c9ca784f652f196bf6d8cf071.vbs"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1892
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1740
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:1976
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:856
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4304
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3172
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2648
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4816
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
PID:4700
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
PID:2304
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5052
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3824
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2120
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2552
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
PID:4276
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3504
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3304
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
PID:3808
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2924
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
PID:3740
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4888
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:5064
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:980
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
PID:1704
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4036
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1740
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4532
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3624
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4232
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4564
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4424
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
PID:212
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3824
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:388
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1976
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:1228
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4028
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2684
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:2304
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4824
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4128
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4848
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4828
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4600
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4220
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
PID:1520
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
PID:5100
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3120
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4128
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
PID:4564
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:656
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:1536
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2316
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
PID:3512
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
PID:3452
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2452
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
PID:3264
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3292
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
PID:4432
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3176
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
PID:640
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2148
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
PID:448
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4028
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2332
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3208
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2324
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1224
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:2272
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
PID:2712
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1856
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3232
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2328
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:448
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4504
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3356
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4920
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "C:\autorun.inf"2⤵
- Views/modifies file attributes
PID:2272
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\autorun.inf"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1512
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "C:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2356
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\21a5a79c9ca784f652f196bf6d8cf071.vbs"2⤵
- Sets file to hidden
PID:3364
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +a +s +h +r "F:\autorun.inf"2⤵
- Sets file to hidden
PID:4072
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" -a -s -h -r "F:\autorun.inf"2⤵
- Views/modifies file attributes
PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD521a5a79c9ca784f652f196bf6d8cf071
SHA14a47358fd44b27c84f7b219c827168aacf235314
SHA25662aee883f95c20ec2849eaa5e8bc3b8ff55ad9feb61610e1242564172edf821b
SHA512c377a99497e2aecc7b23cb4de1f84489c5e04dbe5dbc340150b249915415b06a931d01631b473bf001e05cb395e49776dcb8f258d1811a70ab9498a0f7dfb60e
-
Filesize
131B
MD538ee17766a121b81c6b6982a17708fe8
SHA1e7f64d72a6a500000c96b892f9b97eb09343cf8e
SHA25609c929db07db904d860111a784d82ea1d5fa1b9a2848adb4c1861aef6fb2f685
SHA512acc3c3a80b6223ec89e003e401a51e78ab909f299d3bbf857e413ddfba998b3f097b6b87be943680fcec68b8eda6e3b7c9eb40b1f7cdf0f14375cd6c24537f6c