Analysis
-
max time kernel
2s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
41098f5762dc04369ebf2e54a1efa540.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
41098f5762dc04369ebf2e54a1efa540.exe
Resource
win10v2004-20231215-en
General
-
Target
41098f5762dc04369ebf2e54a1efa540.exe
-
Size
2.0MB
-
MD5
41098f5762dc04369ebf2e54a1efa540
-
SHA1
0e541de9b3dd4ea228226bad5f3a93e6911342f8
-
SHA256
4d3a6bd44756de82a2e5a60a082445ae007ae8b3f9019d1868b06882f1cb33a4
-
SHA512
441b824709b727705d597fe1e9c4be4df6810e9ff1365f8110b8fb9e21d327ee96d9ae942875fa4cf71f5beea563391d08b16643bc4188223274ad233ac101c7
-
SSDEEP
24576:UuhaCeZJ8NI8xeZJ8NI8xeZJ8NI8xeZJ8NI8xeZJ8NI8xeZJ8NI8L4:bW82828282828s
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 41098f5762dc04369ebf2e54a1efa540.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Help\HelpCat.exe 41098f5762dc04369ebf2e54a1efa540.exe File created C:\Windows\Sysinf.bat 41098f5762dc04369ebf2e54a1efa540.exe File created C:\Windows\regedt32.sys 41098f5762dc04369ebf2e54a1efa540.exe File opened for modification C:\Windows\system\KavUpda.exe 41098f5762dc04369ebf2e54a1efa540.exe File created C:\Windows\Help\HelpCat.exe 41098f5762dc04369ebf2e54a1efa540.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4148 sc.exe 800 sc.exe 4532 sc.exe 3464 sc.exe 880 sc.exe 2152 sc.exe 4852 sc.exe 2924 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 4528 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4784 41098f5762dc04369ebf2e54a1efa540.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1300 4784 41098f5762dc04369ebf2e54a1efa540.exe 23 PID 4784 wrote to memory of 1300 4784 41098f5762dc04369ebf2e54a1efa540.exe 23 PID 4784 wrote to memory of 1300 4784 41098f5762dc04369ebf2e54a1efa540.exe 23 PID 4784 wrote to memory of 2160 4784 41098f5762dc04369ebf2e54a1efa540.exe 22 PID 4784 wrote to memory of 2160 4784 41098f5762dc04369ebf2e54a1efa540.exe 22 PID 4784 wrote to memory of 2160 4784 41098f5762dc04369ebf2e54a1efa540.exe 22 PID 2160 wrote to memory of 948 2160 net.exe 20 PID 2160 wrote to memory of 948 2160 net.exe 20 PID 2160 wrote to memory of 948 2160 net.exe 20 PID 4784 wrote to memory of 828 4784 41098f5762dc04369ebf2e54a1efa540.exe 145 PID 4784 wrote to memory of 828 4784 41098f5762dc04369ebf2e54a1efa540.exe 145 PID 4784 wrote to memory of 828 4784 41098f5762dc04369ebf2e54a1efa540.exe 145 PID 4784 wrote to memory of 856 4784 41098f5762dc04369ebf2e54a1efa540.exe 104 PID 4784 wrote to memory of 856 4784 41098f5762dc04369ebf2e54a1efa540.exe 104 PID 4784 wrote to memory of 856 4784 41098f5762dc04369ebf2e54a1efa540.exe 104 PID 4784 wrote to memory of 2792 4784 41098f5762dc04369ebf2e54a1efa540.exe 99 PID 4784 wrote to memory of 2792 4784 41098f5762dc04369ebf2e54a1efa540.exe 99 PID 4784 wrote to memory of 2792 4784 41098f5762dc04369ebf2e54a1efa540.exe 99 PID 4784 wrote to memory of 4996 4784 41098f5762dc04369ebf2e54a1efa540.exe 218 PID 4784 wrote to memory of 4996 4784 41098f5762dc04369ebf2e54a1efa540.exe 218 PID 4784 wrote to memory of 4996 4784 41098f5762dc04369ebf2e54a1efa540.exe 218 PID 4784 wrote to memory of 1512 4784 41098f5762dc04369ebf2e54a1efa540.exe 118 PID 4784 wrote to memory of 1512 4784 41098f5762dc04369ebf2e54a1efa540.exe 118 PID 4784 wrote to memory of 1512 4784 41098f5762dc04369ebf2e54a1efa540.exe 118 PID 4784 wrote to memory of 4648 4784 41098f5762dc04369ebf2e54a1efa540.exe 95 PID 4784 wrote to memory of 4648 4784 41098f5762dc04369ebf2e54a1efa540.exe 95 PID 4784 wrote to memory of 4648 4784 41098f5762dc04369ebf2e54a1efa540.exe 95 PID 4784 wrote to memory of 3192 4784 41098f5762dc04369ebf2e54a1efa540.exe 91 PID 4784 wrote to memory of 3192 4784 41098f5762dc04369ebf2e54a1efa540.exe 91 PID 4784 wrote to memory of 3192 4784 41098f5762dc04369ebf2e54a1efa540.exe 91 PID 4784 wrote to memory of 2236 4784 41098f5762dc04369ebf2e54a1efa540.exe 89 PID 4784 wrote to memory of 2236 4784 41098f5762dc04369ebf2e54a1efa540.exe 89 PID 4784 wrote to memory of 2236 4784 41098f5762dc04369ebf2e54a1efa540.exe 89 PID 4784 wrote to memory of 2152 4784 41098f5762dc04369ebf2e54a1efa540.exe 87 PID 4784 wrote to memory of 2152 4784 41098f5762dc04369ebf2e54a1efa540.exe 87 PID 4784 wrote to memory of 2152 4784 41098f5762dc04369ebf2e54a1efa540.exe 87 PID 4784 wrote to memory of 880 4784 41098f5762dc04369ebf2e54a1efa540.exe 84 PID 4784 wrote to memory of 880 4784 41098f5762dc04369ebf2e54a1efa540.exe 84 PID 4784 wrote to memory of 880 4784 41098f5762dc04369ebf2e54a1efa540.exe 84 PID 4784 wrote to memory of 3464 4784 41098f5762dc04369ebf2e54a1efa540.exe 224 PID 4784 wrote to memory of 3464 4784 41098f5762dc04369ebf2e54a1efa540.exe 224 PID 4784 wrote to memory of 3464 4784 41098f5762dc04369ebf2e54a1efa540.exe 224 PID 4784 wrote to memory of 4532 4784 41098f5762dc04369ebf2e54a1efa540.exe 59 PID 4784 wrote to memory of 4532 4784 41098f5762dc04369ebf2e54a1efa540.exe 59 PID 4784 wrote to memory of 4532 4784 41098f5762dc04369ebf2e54a1efa540.exe 59 PID 4784 wrote to memory of 4528 4784 41098f5762dc04369ebf2e54a1efa540.exe 61 PID 4784 wrote to memory of 4528 4784 41098f5762dc04369ebf2e54a1efa540.exe 61 PID 4784 wrote to memory of 4528 4784 41098f5762dc04369ebf2e54a1efa540.exe 61 PID 4784 wrote to memory of 3444 4784 41098f5762dc04369ebf2e54a1efa540.exe 78 PID 4784 wrote to memory of 3444 4784 41098f5762dc04369ebf2e54a1efa540.exe 78 PID 4784 wrote to memory of 3444 4784 41098f5762dc04369ebf2e54a1efa540.exe 78 PID 4784 wrote to memory of 2804 4784 41098f5762dc04369ebf2e54a1efa540.exe 77 PID 4784 wrote to memory of 2804 4784 41098f5762dc04369ebf2e54a1efa540.exe 77 PID 4784 wrote to memory of 2804 4784 41098f5762dc04369ebf2e54a1efa540.exe 77 PID 856 wrote to memory of 896 856 Conhost.exe 122 PID 856 wrote to memory of 896 856 Conhost.exe 122 PID 856 wrote to memory of 896 856 Conhost.exe 122 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2816 attrib.exe 1112 attrib.exe 2024 attrib.exe 3584 attrib.exe 4996 attrib.exe 4012 attrib.exe 2396 attrib.exe 1636 attrib.exe 3592 attrib.exe 3196 attrib.exe 2480 attrib.exe 3972 attrib.exe 740 attrib.exe 2160 attrib.exe 1584 attrib.exe 3764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41098f5762dc04369ebf2e54a1efa540.exe"C:\Users\Admin\AppData\Local\Temp\41098f5762dc04369ebf2e54a1efa540.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:2160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:1300
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:4532
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:4528
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:4444
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:2776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y4⤵PID:3140
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:768
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1512
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1936
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4852
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2924
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4148
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:800
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:3464
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:2540
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:5036
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1616
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 1:59:52 PM C:\Windows\Sysinf.bat3⤵PID:3336
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 1:56:52 PM C:\Windows\Sysinf.bat3⤵PID:3520
-
-
C:\Windows\SysWOW64\At.exeAt.exe 1:57:50 PM C:\Windows\Help\HelpCat.exe3⤵PID:3300
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3436
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3488
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4244
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4152
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4004
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3900
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:432
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4156
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4628
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1384
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1412
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1420
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4448
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1232
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4124
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3196
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3616
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2860
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:400
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:856
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4380
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1316
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3968
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2804
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:3444
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:3464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y3⤵PID:3896
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:880
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2152
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2236
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:3192
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:4648
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:1512
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2396
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:4996
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 1:59:49 PM C:\Windows\Sysinf.bat2⤵PID:2792
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 1:56:49 PM C:\Windows\Sysinf.bat2⤵PID:856
-
-
C:\Users\Admin\AppData\Local\Temp\41098f5762dc04369ebf2e54a1efa540~4.exe41098f5762dc04369ebf2e54a1efa540~4.exe2⤵PID:2088
-
-
C:\Windows\SysWOW64\At.exeAt.exe 1:57:47 PM C:\Windows\Help\HelpCat.exe2⤵PID:828
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1108
-
C:\Windows\SysWOW64\at.exeat 1:59:49 PM C:\Windows\Sysinf.bat1⤵PID:4040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1508
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat1⤵PID:3876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:4148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:896
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2800
-
C:\Windows\SysWOW64\at.exeat 1:56:49 PM C:\Windows\Sysinf.bat1⤵PID:896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:3196
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1488
-
C:\Windows\SysWOW64\at.exeat 1:59:52 PM C:\Windows\Sysinf.bat1⤵PID:3644
-
C:\Windows\SysWOW64\at.exeat 1:56:52 PM C:\Windows\Sysinf.bat1⤵PID:3552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:3640
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1584 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:740
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2024
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3584
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3592
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4996
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3764
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3464
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3972
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4012
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2160
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1112
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2480