Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
65e48bffdace17dbf351e152d118291d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65e48bffdace17dbf351e152d118291d.exe
Resource
win10v2004-20231222-en
General
-
Target
65e48bffdace17dbf351e152d118291d.exe
-
Size
1.3MB
-
MD5
65e48bffdace17dbf351e152d118291d
-
SHA1
042e610db36379e4dd2fa1016acc55ccd2aa5af6
-
SHA256
9d0e62d68453c4793569eab033c626faee29dea1869c720bdedbc308498d4160
-
SHA512
9121f250b22757b6123134b7de87449ec3a81185b2211092072a188fe80df4d0c43318697e66915a5438463631b4d496f507c21ead765668e59d9417604ca0a8
-
SSDEEP
12288:UZWtI6RkYunudMwO6unudMwO6unudMwO6unudMwO6unudMvBZ0:UuhawMIMIMIMIMT0
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 KavUpda.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\Autorun.inf KavUpda.exe File opened for modification C:\Autorun.inf KavUpda.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Windows\SysWOW64\Option.bat KavUpda.exe -
Drops file in Program Files directory 38 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\7-Zip\7z.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 65e48bffdace17dbf351e152d118291d.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\system\KavUpda.exe 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Windows\system\KavUpda.exe 65e48bffdace17dbf351e152d118291d.exe File created C:\Windows\Help\HelpCat.exe 65e48bffdace17dbf351e152d118291d.exe File created C:\Windows\regedt32.sys 65e48bffdace17dbf351e152d118291d.exe File created C:\Windows\regedt32.sys KavUpda.exe File opened for modification C:\Windows\Help\HelpCat.exe 65e48bffdace17dbf351e152d118291d.exe File created C:\Windows\Sysinf.bat 65e48bffdace17dbf351e152d118291d.exe File opened for modification C:\Windows\system\KavUpda.exe KavUpda.exe File opened for modification C:\Windows\Sysinf.bat KavUpda.exe File opened for modification C:\Windows\regedt32.sys KavUpda.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2224 sc.exe 4992 sc.exe 3932 sc.exe 796 sc.exe 3000 sc.exe 3484 sc.exe 2200 sc.exe 3240 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 3584 regedit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 2124 KavUpda.exe Token: SeIncBasePriorityPrivilege 2124 KavUpda.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe Token: 33 724 65e48bffdace17dbf351e152d118291d.exe Token: SeIncBasePriorityPrivilege 724 65e48bffdace17dbf351e152d118291d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 724 65e48bffdace17dbf351e152d118291d.exe 2124 KavUpda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 724 wrote to memory of 396 724 65e48bffdace17dbf351e152d118291d.exe 24 PID 724 wrote to memory of 396 724 65e48bffdace17dbf351e152d118291d.exe 24 PID 724 wrote to memory of 396 724 65e48bffdace17dbf351e152d118291d.exe 24 PID 724 wrote to memory of 3720 724 65e48bffdace17dbf351e152d118291d.exe 22 PID 724 wrote to memory of 3720 724 65e48bffdace17dbf351e152d118291d.exe 22 PID 724 wrote to memory of 3720 724 65e48bffdace17dbf351e152d118291d.exe 22 PID 3720 wrote to memory of 1940 3720 net.exe 18 PID 3720 wrote to memory of 1940 3720 net.exe 18 PID 3720 wrote to memory of 1940 3720 net.exe 18 PID 724 wrote to memory of 2416 724 65e48bffdace17dbf351e152d118291d.exe 206 PID 724 wrote to memory of 2416 724 65e48bffdace17dbf351e152d118291d.exe 206 PID 724 wrote to memory of 2416 724 65e48bffdace17dbf351e152d118291d.exe 206 PID 724 wrote to memory of 3324 724 65e48bffdace17dbf351e152d118291d.exe 125 PID 724 wrote to memory of 3324 724 65e48bffdace17dbf351e152d118291d.exe 125 PID 724 wrote to memory of 3324 724 65e48bffdace17dbf351e152d118291d.exe 125 PID 724 wrote to memory of 540 724 65e48bffdace17dbf351e152d118291d.exe 97 PID 724 wrote to memory of 540 724 65e48bffdace17dbf351e152d118291d.exe 97 PID 724 wrote to memory of 540 724 65e48bffdace17dbf351e152d118291d.exe 97 PID 724 wrote to memory of 1376 724 65e48bffdace17dbf351e152d118291d.exe 94 PID 724 wrote to memory of 1376 724 65e48bffdace17dbf351e152d118291d.exe 94 PID 724 wrote to memory of 1376 724 65e48bffdace17dbf351e152d118291d.exe 94 PID 724 wrote to memory of 1176 724 65e48bffdace17dbf351e152d118291d.exe 92 PID 724 wrote to memory of 1176 724 65e48bffdace17dbf351e152d118291d.exe 92 PID 724 wrote to memory of 1176 724 65e48bffdace17dbf351e152d118291d.exe 92 PID 724 wrote to memory of 1616 724 65e48bffdace17dbf351e152d118291d.exe 168 PID 724 wrote to memory of 1616 724 65e48bffdace17dbf351e152d118291d.exe 168 PID 724 wrote to memory of 1616 724 65e48bffdace17dbf351e152d118291d.exe 168 PID 724 wrote to memory of 1964 724 65e48bffdace17dbf351e152d118291d.exe 107 PID 724 wrote to memory of 1964 724 65e48bffdace17dbf351e152d118291d.exe 107 PID 724 wrote to memory of 1964 724 65e48bffdace17dbf351e152d118291d.exe 107 PID 724 wrote to memory of 736 724 65e48bffdace17dbf351e152d118291d.exe 87 PID 724 wrote to memory of 736 724 65e48bffdace17dbf351e152d118291d.exe 87 PID 724 wrote to memory of 736 724 65e48bffdace17dbf351e152d118291d.exe 87 PID 724 wrote to memory of 3484 724 65e48bffdace17dbf351e152d118291d.exe 86 PID 724 wrote to memory of 3484 724 65e48bffdace17dbf351e152d118291d.exe 86 PID 724 wrote to memory of 3484 724 65e48bffdace17dbf351e152d118291d.exe 86 PID 724 wrote to memory of 3932 724 65e48bffdace17dbf351e152d118291d.exe 60 PID 724 wrote to memory of 3932 724 65e48bffdace17dbf351e152d118291d.exe 60 PID 724 wrote to memory of 3932 724 65e48bffdace17dbf351e152d118291d.exe 60 PID 724 wrote to memory of 3000 724 65e48bffdace17dbf351e152d118291d.exe 84 PID 724 wrote to memory of 3000 724 65e48bffdace17dbf351e152d118291d.exe 84 PID 724 wrote to memory of 3000 724 65e48bffdace17dbf351e152d118291d.exe 84 PID 724 wrote to memory of 796 724 65e48bffdace17dbf351e152d118291d.exe 81 PID 724 wrote to memory of 796 724 65e48bffdace17dbf351e152d118291d.exe 81 PID 724 wrote to memory of 796 724 65e48bffdace17dbf351e152d118291d.exe 81 PID 3324 wrote to memory of 4840 3324 reg.exe 138 PID 3324 wrote to memory of 4840 3324 reg.exe 138 PID 3324 wrote to memory of 4840 3324 reg.exe 138 PID 724 wrote to memory of 3584 724 65e48bffdace17dbf351e152d118291d.exe 61 PID 724 wrote to memory of 3584 724 65e48bffdace17dbf351e152d118291d.exe 61 PID 724 wrote to memory of 3584 724 65e48bffdace17dbf351e152d118291d.exe 61 PID 1176 wrote to memory of 5024 1176 net.exe 77 PID 1176 wrote to memory of 5024 1176 net.exe 77 PID 1176 wrote to memory of 5024 1176 net.exe 77 PID 1376 wrote to memory of 5084 1376 net.exe 62 PID 1376 wrote to memory of 5084 1376 net.exe 62 PID 1376 wrote to memory of 5084 1376 net.exe 62 PID 540 wrote to memory of 4112 540 cmd.exe 76 PID 540 wrote to memory of 4112 540 cmd.exe 76 PID 540 wrote to memory of 4112 540 cmd.exe 76 PID 1616 wrote to memory of 1852 1616 Conhost.exe 63 PID 1616 wrote to memory of 1852 1616 Conhost.exe 63 PID 1616 wrote to memory of 1852 1616 Conhost.exe 63 PID 724 wrote to memory of 2884 724 65e48bffdace17dbf351e152d118291d.exe 75 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2416 attrib.exe 824 attrib.exe 3652 attrib.exe 3284 attrib.exe 4488 attrib.exe 2372 attrib.exe 4948 attrib.exe 1708 attrib.exe 384 attrib.exe 4064 attrib.exe 2004 attrib.exe 4424 attrib.exe 2796 attrib.exe 1428 attrib.exe 1972 attrib.exe 1900 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65e48bffdace17dbf351e152d118291d.exe"C:\Users\Admin\AppData\Local\Temp\65e48bffdace17dbf351e152d118291d.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:3720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:396
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:1852
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:3932
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:3584
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y3⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat3⤵PID:3444
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1364
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4948
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1964
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3324
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2200
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:3240
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2224
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:2424
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:4284
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:384
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1704
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:4184
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 10:36:34 AM C:\Windows\Sysinf.bat3⤵PID:1816
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 10:33:34 AM C:\Windows\Sysinf.bat3⤵PID:3780
-
-
C:\Windows\SysWOW64\At.exeAt.exe 10:34:32 AM C:\Windows\Help\HelpCat.exe3⤵PID:1912
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:864
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2212
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2436
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1108
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2228
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:400
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2528
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4532
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:3652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1428
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3268
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:116
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2436
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3780
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1140
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:864
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4848
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1428
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3956
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2244
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2472
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:4488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4316
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3560
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3652
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1376
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2700
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2884
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:796
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3484
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:736
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1964
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:1176
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:1376
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 10:36:31 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:540
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 10:33:31 AM C:\Windows\Sysinf.bat2⤵PID:3324
-
-
C:\Windows\SysWOW64\At.exeAt.exe 10:34:29 AM C:\Windows\Help\HelpCat.exe2⤵PID:2416
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:3368
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:3056
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2252
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:4216
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:3372
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:5084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1412
-
C:\Windows\SysWOW64\at.exeat 10:36:31 AM C:\Windows\Sysinf.bat1⤵PID:4112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:5024
-
C:\Windows\SysWOW64\at.exeat 10:33:31 AM C:\Windows\Sysinf.bat1⤵PID:4840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:4592
-
C:\Windows\SysWOW64\at.exeat 10:33:34 AM C:\Windows\Sysinf.bat1⤵PID:4364
-
C:\Windows\SysWOW64\at.exeat 10:36:34 AM C:\Windows\Sysinf.bat1⤵PID:1108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:3096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:4724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:1616
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1968
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3780
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:1972
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2372
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4324
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:824
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2224
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4948
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD53f7fbd2eb34892646e93fd5e6e343512
SHA1265ac1061b54f62350fb7a5f57e566454d013a66
SHA256e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7
SHA51253d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140
-
Filesize
381KB
MD5a1a3cc69cd3b4b60441997543f2d482e
SHA170256287daa3ba721cb506c8680748ec3f01a49b
SHA25621c98c9a8add1afc6d0fbf0a83e63cfb04b015f674ec611c5246e33d5975982b
SHA512ab343622fe80971467020d844888126b47af58907965504e8dd58d49b3f7b43e661952e67e34506c371029accb313697791bc7b749e408bd46926373dba20278