Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
29acd85a3064ac1e7185ba7b3ca840a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29acd85a3064ac1e7185ba7b3ca840a5.exe
Resource
win10v2004-20231215-en
General
-
Target
29acd85a3064ac1e7185ba7b3ca840a5.exe
-
Size
1.7MB
-
MD5
29acd85a3064ac1e7185ba7b3ca840a5
-
SHA1
c7217dcc033dc183d2938b04ad4b6e4acae1695a
-
SHA256
835ff10769dffe66a2f73102b694862b435be949d0c19722f52b562c254870f4
-
SHA512
9819b04e4e6a31e117b5502084d2b6abbf778e4d0df106b5c71e524179c57fb4a0ab402af3c5b9463cb516b73163c2ab26a9d71e386c66227de67aa830ad3af7
-
SSDEEP
12288:UZWtI6RkAbu9O1bu9O1bu9O1bu9O1bu9O1buAqaerQZb+md4w1UM:UuhaAjjjjj4aerQZb+md4wmM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe -
Executes dropped EXE 2 IoCs
pid Process 1436 KavUpda.exe 1640 29acd85a3064ac1e7185ba7b3ca840a5~4.exe -
Loads dropped DLL 4 IoCs
pid Process 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Autorun.inf KavUpda.exe File opened for modification F:\Autorun.inf KavUpda.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 29acd85a3064ac1e7185ba7b3ca840a5.exe File opened for modification C:\Windows\SysWOW64\Option.bat KavUpda.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\regedt32.sys 29acd85a3064ac1e7185ba7b3ca840a5.exe File created C:\Windows\regedt32.sys KavUpda.exe File opened for modification C:\Windows\system\KavUpda.exe 29acd85a3064ac1e7185ba7b3ca840a5.exe File created C:\Windows\Help\HelpCat.exe 29acd85a3064ac1e7185ba7b3ca840a5.exe File opened for modification C:\Windows\Help\HelpCat.exe 29acd85a3064ac1e7185ba7b3ca840a5.exe File created C:\Windows\Sysinf.bat 29acd85a3064ac1e7185ba7b3ca840a5.exe File opened for modification C:\Windows\system\KavUpda.exe KavUpda.exe File opened for modification C:\Windows\Sysinf.bat KavUpda.exe File opened for modification C:\Windows\regedt32.sys KavUpda.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2440 sc.exe 1708 sc.exe 1804 sc.exe 556 sc.exe 1784 sc.exe 2300 sc.exe 1888 sc.exe 2512 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 1628 regedit.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe Token: 33 1436 KavUpda.exe Token: SeIncBasePriorityPrivilege 1436 KavUpda.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 1436 KavUpda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3060 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 29 PID 2236 wrote to memory of 3060 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 29 PID 2236 wrote to memory of 3060 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 29 PID 2236 wrote to memory of 3060 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 29 PID 2236 wrote to memory of 836 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 31 PID 2236 wrote to memory of 836 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 31 PID 2236 wrote to memory of 836 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 31 PID 2236 wrote to memory of 836 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 31 PID 836 wrote to memory of 2896 836 net.exe 32 PID 836 wrote to memory of 2896 836 net.exe 32 PID 836 wrote to memory of 2896 836 net.exe 32 PID 836 wrote to memory of 2896 836 net.exe 32 PID 2236 wrote to memory of 2704 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 33 PID 2236 wrote to memory of 2704 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 33 PID 2236 wrote to memory of 2704 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 33 PID 2236 wrote to memory of 2704 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 33 PID 2236 wrote to memory of 2832 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 64 PID 2236 wrote to memory of 2832 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 64 PID 2236 wrote to memory of 2832 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 64 PID 2236 wrote to memory of 2832 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 64 PID 2236 wrote to memory of 2884 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 62 PID 2236 wrote to memory of 2884 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 62 PID 2236 wrote to memory of 2884 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 62 PID 2236 wrote to memory of 2884 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 62 PID 2236 wrote to memory of 2712 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 34 PID 2236 wrote to memory of 2712 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 34 PID 2236 wrote to memory of 2712 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 34 PID 2236 wrote to memory of 2712 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 34 PID 2236 wrote to memory of 2992 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 58 PID 2236 wrote to memory of 2992 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 58 PID 2236 wrote to memory of 2992 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 58 PID 2236 wrote to memory of 2992 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 58 PID 2832 wrote to memory of 2592 2832 cmd.exe 56 PID 2832 wrote to memory of 2592 2832 cmd.exe 56 PID 2832 wrote to memory of 2592 2832 cmd.exe 56 PID 2832 wrote to memory of 2592 2832 cmd.exe 56 PID 2712 wrote to memory of 2016 2712 net.exe 55 PID 2712 wrote to memory of 2016 2712 net.exe 55 PID 2712 wrote to memory of 2016 2712 net.exe 55 PID 2712 wrote to memory of 2016 2712 net.exe 55 PID 2884 wrote to memory of 2692 2884 cmd.exe 54 PID 2884 wrote to memory of 2692 2884 cmd.exe 54 PID 2884 wrote to memory of 2692 2884 cmd.exe 54 PID 2884 wrote to memory of 2692 2884 cmd.exe 54 PID 2236 wrote to memory of 2792 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 35 PID 2236 wrote to memory of 2792 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 35 PID 2236 wrote to memory of 2792 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 35 PID 2236 wrote to memory of 2792 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 35 PID 2992 wrote to memory of 2604 2992 net.exe 36 PID 2992 wrote to memory of 2604 2992 net.exe 36 PID 2992 wrote to memory of 2604 2992 net.exe 36 PID 2992 wrote to memory of 2604 2992 net.exe 36 PID 2236 wrote to memory of 2024 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 52 PID 2236 wrote to memory of 2024 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 52 PID 2236 wrote to memory of 2024 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 52 PID 2236 wrote to memory of 2024 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 52 PID 2236 wrote to memory of 2552 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 51 PID 2236 wrote to memory of 2552 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 51 PID 2236 wrote to memory of 2552 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 51 PID 2236 wrote to memory of 2552 2236 29acd85a3064ac1e7185ba7b3ca840a5.exe 51 PID 2792 wrote to memory of 2124 2792 Process not Found 48 PID 2792 wrote to memory of 2124 2792 Process not Found 48 PID 2792 wrote to memory of 2124 2792 Process not Found 48 PID 2792 wrote to memory of 2124 2792 Process not Found 48 -
Views/modifies file attributes 1 TTPs 14 IoCs
pid Process 288 attrib.exe 1036 attrib.exe 2928 attrib.exe 2320 attrib.exe 2644 attrib.exe 296 attrib.exe 1240 attrib.exe 1476 attrib.exe 1224 attrib.exe 2816 attrib.exe 1584 attrib.exe 1592 attrib.exe 2108 attrib.exe 2544 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29acd85a3064ac1e7185ba7b3ca840a5.exe"C:\Users\Admin\AppData\Local\Temp\29acd85a3064ac1e7185ba7b3ca840a5.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:3060
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 7:36:20 AM C:\Windows\Help\HelpCat.exe2⤵PID:2704
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y3⤵PID:2016
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:2124
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1804
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:1628
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:556
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1784
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2300
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2552
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2024
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2992
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:38:22 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2884
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:35:22 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2832
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2516
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:784
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y3⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat3⤵PID:2764
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:2948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y4⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:38:46 AM C:\Windows\Sysinf.bat3⤵PID:2972
-
C:\Windows\SysWOW64\at.exeat 7:38:46 AM C:\Windows\Sysinf.bat4⤵PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:35:46 AM C:\Windows\Sysinf.bat3⤵PID:1512
-
C:\Windows\SysWOW64\at.exeat 7:35:46 AM C:\Windows\Sysinf.bat4⤵PID:1760
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 7:36:44 AM C:\Windows\Help\HelpCat.exe3⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:816
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1624
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1592
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2396
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:940
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1888
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2512
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2440
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1708
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:1128
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:1968
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:1948
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1304
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:860
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2604
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2116
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1308
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:988
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2912
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1960
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1556
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2968
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2964
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1644
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2952
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1596
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1240
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2284
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1936
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3068
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2092
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2392
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2660
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2320
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:520
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1408
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2704
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Temp\29acd85a3064ac1e7185ba7b3ca840a5~4.exe29acd85a3064ac1e7185ba7b3ca840a5~4.exe2⤵
- Executes dropped EXE
PID:1640
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2452
-
C:\Windows\SysWOW64\at.exeat 7:38:22 AM C:\Windows\Sysinf.bat1⤵PID:2692
-
C:\Windows\SysWOW64\at.exeat 7:35:22 AM C:\Windows\Sysinf.bat1⤵PID:2592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1956
-
C:\Windows\system32\taskeng.exetaskeng.exe {238E52ED-E08D-49F4-9F25-BA1D0A6BCFEC} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD531c37906ad73e09b064f0a2f61e1f587
SHA1076f803e86f237a745e2479e71be4a03fdcea3f8
SHA2568514bc5ab49afbd6b23ebfd87b8522820f1d273774eab125400beff6cf439118
SHA512d0da4ce3e38ccc7ddb86fc367ee7a5919c5dc8449c35736ce707d5a7713cc6da982b9c4c7808f64238cf49b054571ac7eec12dcd5506dfd5f049b80a947f66e0
-
Filesize
90KB
MD5ac6721a1cf4a4f6b9e4ffac6fe265bf5
SHA1fc1c86b504e41e0b32a3e826a3f8d94e5211a63c
SHA256bdafbf8b9c0a8cad5b89dfe92621346b3e6bd5fb792ae79aacbbb440ef79a7e0
SHA5126a70024b2f1c63326f8a97e3b1cd433bf870cdcc6577792fbf4b94580dcf76e54d1bbea7a0b6e388c8a72328701279268ce81fc80e6eabe6ea7ca6c09af1311b
-
Filesize
82B
MD53f7fbd2eb34892646e93fd5e6e343512
SHA1265ac1061b54f62350fb7a5f57e566454d013a66
SHA256e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7
SHA51253d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140
-
Filesize
460B
MD57db3d565d6ddbe65a8b0e093910e7dcd
SHA1d4804e6180c6e74ba79d3343f2f2ccb15e502f12
SHA256a2778cb87fd88c7508ffd506a8ff8d58d0ffc02156f846956e5e99c6cb3d2f3f
SHA5120b3d1d0f44feba9dd78903ff77fdeaea834d930990a86641fb2e4ce04da280d33f6bee0ae0b1320e4070cbe20824062e45b52e5cad797c5985d8e31dce1ef82b
-
Filesize
1KB
MD50d8a1f285b7891a2c790824fbf2e4392
SHA16c761d2c3f3931560cc5e57d106cd0bb5db3a555
SHA2567b965346446e66a3efac56457bd40e2ec9791dfae9d693fec04aafd2e4e92660
SHA512805282dc69a8315e2e05eaf2bcee27858fe2a2f2258b83305110a1f9a217144f06e299b3c4c11b38a7b258c2c54cd54f0623d39f72c97b5898defeccbad7c50a
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6
-
Filesize
82KB
MD564e5fb8ba1f205139d24986bba359504
SHA1e0fe83cb0cb1df81d49a9f16a8cb66bf1987bcc7
SHA25615615eeb026bd5f9ad70b72465651c590bb739845d210ed66675119bcda6da9c
SHA512eefc90fcf33a2f9297629de7e2fdbb77d00d94423c12551644eed49a5b0062c12a99faad18ac43d6ede0a3943edb5043131814be4de3831a875f08138d758f59
-
Filesize
28KB
MD567a5052299861bc3ad528c1d174ab247
SHA1886b91a325e4fb951f552c0d93aa4c8f8e8231e3
SHA256b3b94ebdad40fa4da2c63698eb422539d16f8f023db115bf971994ccce72f99e
SHA5129f25af118842dbfccd997bfcb89e34eb830ee31cca5685fb902cdb1f625f0a7366691e79e20302ae1396298b03917538bf43ccffad9d32dac7bbe3ba0612d009
-
Filesize
128KB
MD557575e4d65dc53fd12a8b4ea1a4864ca
SHA15c38642ca85c7b0d77ea21a0765b8cc9acb60370
SHA2565267aebc07808d718e67c2d1dfa68201490846481d9a95ecc4a73b109cfaec54
SHA5120dc9373b8fdc91e4bbd11ef8b266e89638c0951ae416a9d2677e5e02f00d890a13aed1bf093ba872ec574c5e93d3b5db1ff2ecfa537c10be0c7a52c665680e89
-
Filesize
237B
MD594bcd02c5afd5918b4446345e7a5ded9
SHA179839238e84be225132e1382fae6333dfc4906a1
SHA2565d9f41e4f886926dae2ed8a57807708110d3c6964ab462be21462bff0088d9a1
SHA512149f6bd49fc3b62fa5f41666bfb3a58060514eec1b61c6aa1ac4c75417c840b028e701eb5533460eb00e2fee8543379564bc47d7477264771d81b99a0caab500
-
Filesize
132KB
MD5729f10588e843fd86f260256d7571b0d
SHA19b5b426a98b0ee9a7fcf72373305df4e4e7fec88
SHA2568f0894c9327735a099f25565244b78c8efe52a0d1e63a63b28122d71905d7bb3
SHA51261944f2d4ce0c51922d7a0c146c24a5e63e4e00c5ca1ed36efb19213fadb041933b1940a7fbbe3064483e0f05a73410fb733a7002b4aeeabd4d13bc7d3142fe4
-
Filesize
36KB
MD5dd95b811179f2057de6f3e4c6741d719
SHA163fc89729c8658c4f951031e1558d2a6c20a2cf7
SHA2568f5cad9331b165ff5b9aa317ba78f8ead9d023a2b4b131f69f2b721c647d8325
SHA512d6b802260dc9dc927e341c7b806c4ee2f7ac001f5df68e03ef894cb2c27f8f24b83176e56e9cdee36d7d0225d961c00f157028be0c70466ab8c7bfa8f1c7f648
-
Filesize
40KB
MD55e4b0854acf13d6c292b592a2e4d39df
SHA1b01b57a144e518a65a57c0c31193af5fa96a0a06
SHA256b39e4e4130e3463f8900db274502cc24a58d3b8a79eaf9e98650737b3f369ebc
SHA512d295754f3a8836312d43bcdfc7965fafca2fdbffa44317bb2ff707b927a9f0eeb6869235848d9f09bc89345ed16ea28e2f28b738218acb24a52000ab5d1faa64
-
Filesize
31KB
MD5f14c6acb864a35ba85220253b844baed
SHA131646edf5ac5e6eb1124eb247d1b4a67d5f5c5ce
SHA2566234d953c56fe3cf438578645a4dc61a1053e699451d06cd53dfc985c9880510
SHA512fd7c8e18b901f8c850f318a4ca402a36280d99ed9c3d70a0dbfb84f8e4a7cb4e0c24823a794d54cdb9695953340ee755b45e9b7ee031dd609a0ce47bcee2f42e