Analysis
-
max time kernel
2s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2ab1bba297feb6086115d9f3ad81a7ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ab1bba297feb6086115d9f3ad81a7ab.exe
Resource
win10v2004-20231215-en
General
-
Target
2ab1bba297feb6086115d9f3ad81a7ab.exe
-
Size
1.9MB
-
MD5
2ab1bba297feb6086115d9f3ad81a7ab
-
SHA1
3c591e1fb5550f3bb298e96251f8a0e2ae44b0ce
-
SHA256
dabfdfccb61a75867d9e77cb416602e484035aae3673d6e81f18686d18b834e6
-
SHA512
b7e25fca3e22a49caee8d4f95b10ba7c4fb96d631b26e111c1a9a1b73047fba6acd00b62d8763f951fa2b043f7ecc8b345ddbe141a4b7bbcf23488a1d61f6946
-
SSDEEP
12288:UZWtI6RkAunupOB0fONunupOB0fONunupOB0fONunupOB0fONunupOB0fONunup3:UuhaCOxOxOxOxOxOEOn4
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 2ab1bba297feb6086115d9f3ad81a7ab.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system\KavUpda.exe 2ab1bba297feb6086115d9f3ad81a7ab.exe File created C:\Windows\Help\HelpCat.exe 2ab1bba297feb6086115d9f3ad81a7ab.exe File opened for modification C:\Windows\Help\HelpCat.exe 2ab1bba297feb6086115d9f3ad81a7ab.exe File created C:\Windows\Sysinf.bat 2ab1bba297feb6086115d9f3ad81a7ab.exe File created C:\Windows\regedt32.sys 2ab1bba297feb6086115d9f3ad81a7ab.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4396 sc.exe 4368 sc.exe 116 sc.exe 3392 sc.exe 4528 sc.exe 1032 sc.exe 1528 sc.exe 3404 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 4324 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4684 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 16 PID 1492 wrote to memory of 4684 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 16 PID 1492 wrote to memory of 4684 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 16 PID 1492 wrote to memory of 5008 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 21 PID 1492 wrote to memory of 5008 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 21 PID 1492 wrote to memory of 5008 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 21 PID 5008 wrote to memory of 4532 5008 net.exe 20 PID 5008 wrote to memory of 4532 5008 net.exe 20 PID 5008 wrote to memory of 4532 5008 net.exe 20 PID 1492 wrote to memory of 2540 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 127 PID 1492 wrote to memory of 2540 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 127 PID 1492 wrote to memory of 2540 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 127 PID 1492 wrote to memory of 3132 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 108 PID 1492 wrote to memory of 3132 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 108 PID 1492 wrote to memory of 3132 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 108 PID 1492 wrote to memory of 4168 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 98 PID 1492 wrote to memory of 4168 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 98 PID 1492 wrote to memory of 4168 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 98 PID 1492 wrote to memory of 4900 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 97 PID 1492 wrote to memory of 4900 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 97 PID 1492 wrote to memory of 4900 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 97 PID 1492 wrote to memory of 1448 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 58 PID 1492 wrote to memory of 1448 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 58 PID 1492 wrote to memory of 1448 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 58 PID 1492 wrote to memory of 4416 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 94 PID 1492 wrote to memory of 4416 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 94 PID 1492 wrote to memory of 4416 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 94 PID 1492 wrote to memory of 2440 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 90 PID 1492 wrote to memory of 2440 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 90 PID 1492 wrote to memory of 2440 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 90 PID 1492 wrote to memory of 1272 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 89 PID 1492 wrote to memory of 1272 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 89 PID 1492 wrote to memory of 1272 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 89 PID 1492 wrote to memory of 3404 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 88 PID 1492 wrote to memory of 3404 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 88 PID 1492 wrote to memory of 3404 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 88 PID 1492 wrote to memory of 1528 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 83 PID 1492 wrote to memory of 1528 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 83 PID 1492 wrote to memory of 1528 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 83 PID 1492 wrote to memory of 4528 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 124 PID 1492 wrote to memory of 4528 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 124 PID 1492 wrote to memory of 4528 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 124 PID 1492 wrote to memory of 1032 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 121 PID 1492 wrote to memory of 1032 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 121 PID 1492 wrote to memory of 1032 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 121 PID 2440 wrote to memory of 3136 2440 net.exe 77 PID 2440 wrote to memory of 3136 2440 net.exe 77 PID 2440 wrote to memory of 3136 2440 net.exe 77 PID 4900 wrote to memory of 3440 4900 net.exe 239 PID 4900 wrote to memory of 3440 4900 net.exe 239 PID 4900 wrote to memory of 3440 4900 net.exe 239 PID 4416 wrote to memory of 3124 4416 net.exe 133 PID 4416 wrote to memory of 3124 4416 net.exe 133 PID 4416 wrote to memory of 3124 4416 net.exe 133 PID 1272 wrote to memory of 4596 1272 net.exe 106 PID 1272 wrote to memory of 4596 1272 net.exe 106 PID 1272 wrote to memory of 4596 1272 net.exe 106 PID 1448 wrote to memory of 4368 1448 Process not Found 126 PID 1448 wrote to memory of 4368 1448 Process not Found 126 PID 1448 wrote to memory of 4368 1448 Process not Found 126 PID 1492 wrote to memory of 4324 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 74 PID 1492 wrote to memory of 4324 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 74 PID 1492 wrote to memory of 4324 1492 2ab1bba297feb6086115d9f3ad81a7ab.exe 74 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 4868 attrib.exe 5004 attrib.exe 2828 attrib.exe 4732 attrib.exe 392 attrib.exe 4268 attrib.exe 5016 attrib.exe 4800 attrib.exe 2624 attrib.exe 1540 attrib.exe 3684 attrib.exe 4396 attrib.exe 232 attrib.exe 640 attrib.exe 1544 attrib.exe 1364 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab1bba297feb6086115d9f3ad81a7ab.exe"C:\Users\Admin\AppData\Local\Temp\2ab1bba297feb6086115d9f3ad81a7ab.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:4684
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:5008
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:1448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y3⤵PID:4368
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:4528
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1260
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:2324
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4396
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:404
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1032
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:4528
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:3804
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4368
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:116
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:3392
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:1332
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:3612
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4268
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:4408
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1428
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:3684
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 5:32:25 PM C:\Windows\Sysinf.bat3⤵PID:3584
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 5:29:25 PM C:\Windows\Sysinf.bat3⤵PID:1412
-
-
C:\Windows\SysWOW64\At.exeAt.exe 5:30:23 PM C:\Windows\Help\HelpCat.exe3⤵PID:4240
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3364
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4356
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3092
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1832
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3672
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1668
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2868
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1352
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1496
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2008
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1540
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3076
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3860
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3416
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2372
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3612
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4076
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2940
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3672
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:424
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2628
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3240
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2612
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3168
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2984
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4320
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1420
-
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:4324
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1032 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:392
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1528
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3404
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵
- Suspicious use of WriteProcessMemory
PID:1272
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵
- Suspicious use of WriteProcessMemory
PID:2440
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:4416
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:4900
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 5:32:21 PM C:\Windows\Sysinf.bat2⤵PID:4168
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 5:29:21 PM C:\Windows\Sysinf.bat2⤵PID:3132
-
-
C:\Windows\SysWOW64\At.exeAt.exe 5:30:19 PM C:\Windows\Help\HelpCat.exe2⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\2ab1bba297feb6086115d9f3ad81a7ab~4.exe2ab1bba297feb6086115d9f3ad81a7ab~4.exe2⤵PID:5020
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:4532
-
C:\Windows\SysWOW64\at.exeat 5:29:21 PM C:\Windows\Sysinf.bat1⤵PID:2336
-
C:\Windows\SysWOW64\at.exeat 5:32:21 PM C:\Windows\Sysinf.bat1⤵PID:2408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2036
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat1⤵PID:4300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:3124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3440
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:3132
-
C:\Windows\SysWOW64\at.exeat 5:29:25 PM C:\Windows\Sysinf.bat1⤵PID:4716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:3240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3488
-
C:\Windows\SysWOW64\at.exeat 5:32:25 PM C:\Windows\Sysinf.bat1⤵PID:3040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3124
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4396
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1364
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4800
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4868
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:5016
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2624
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:232
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:5004
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3440
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:640
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4732
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3684
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD53f7fbd2eb34892646e93fd5e6e343512
SHA1265ac1061b54f62350fb7a5f57e566454d013a66
SHA256e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7
SHA51253d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140
-
Filesize
92KB
MD5c02140a0b11470d0776fac7533b56441
SHA149340674259c09bcc653d6d437c7f57d118d1627
SHA2560825de767a2ee6c314afc417f7602f633adb89c108757fe7313aad9f317d096b
SHA5120f778ac465f58c946ad7389e49d6b1ea466bf3b79c2440757193177ae57800713b4dc0faa770671f780423ff53ad91cdcf58571a7edf586c66c6638ba4829148
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6