Analysis Overview
SHA256
82b649cdc3f2ab838a8b576e7562112eb151d4e75974060251703a2b5af1dc27
Threat Level: Known bad
The file a26d9e5d11f35a7c611d1a0bfb7be899.exe was found to be: Known bad.
Malicious Activity Summary
Modifies visibility of file extensions in Explorer
Blocks application from running via registry modification
Sets file execution options in registry
Loads dropped DLL
Executes dropped EXE
Drops file in System32 directory
Drops autorun.inf file
Launches sc.exe
Drops file in Windows directory
Drops file in Program Files directory
Unsigned PE
Runs net.exe
Suspicious use of SetWindowsHookEx
Runs regedit.exe
Views/modifies file attributes
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:37
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:37
Reported
2024-01-07 19:40
Platform
win7-20231215-en
Max time kernel
175s
Max time network
132s
Command Line
Signatures
Modifies visibility of file extensions in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Windows\SysWOW64\regedit.exe | N/A |
Blocks application from running via registry modification
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" | C:\Windows\SysWOW64\regedit.exe | N/A |
Sets file execution options in registry
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\SysWOW64\regedit.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system\KavUpda.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
Drops autorun.inf file
| Description | Indicator | Process | Target |
| File opened for modification | F:\Autorun.inf | C:\Windows\system\KavUpda.exe | N/A |
| File opened for modification | C:\Autorun.inf | C:\Windows\system\KavUpda.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\Option.bat | C:\Windows\system\KavUpda.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\ExceRes | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\Folderdir | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\SysWOW64\Option.bat | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7zG.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\chrome.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\SelectExpand.xls | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\DVD Maker\DVDMaker.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7zFM.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\chrome_proxy.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7z.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\Help\HelpCat.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\Sysinf.bat | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\regedt32.sys | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Windows\Sysinf.bat | C:\Windows\system\KavUpda.exe | N/A |
| File created | C:\Windows\system\KavUpda.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\Help\HelpCat.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Windows\system\KavUpda.exe | C:\Windows\system\KavUpda.exe | N/A |
| File opened for modification | C:\Windows\regedt32.sys | C:\Windows\system\KavUpda.exe | N/A |
| File created | C:\Windows\regedt32.sys | C:\Windows\system\KavUpda.exe | N/A |
| File opened for modification | C:\Windows\system\KavUpda.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Runs net.exe
Runs regedit.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regedit.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| N/A | N/A | C:\Windows\system\KavUpda.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe
"C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c C:\Windows\system32\Option.bat
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 start schedule /y
C:\Windows\SysWOW64\net.exe
net.exe start schedule /y
C:\Windows\SysWOW64\At.exe
At.exe 7:41:09 PM C:\Windows\Help\HelpCat.exe
C:\Windows\SysWOW64\at.exe
at 7:40:11 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess /y
C:\Windows\SysWOW64\regedit.exe
regedit.exe /s C:\Windows\regedt32.sys
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config wscsvc start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config SharedAccess start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop 360timeprot /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop srservice /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wuauserv /y
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\net.exe
net.exe stop 360timeprot /y
C:\Windows\SysWOW64\at.exe
at 7:43:11 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wscsvc /y
C:\Windows\SysWOW64\net.exe
net.exe stop srservice /y
C:\Windows\SysWOW64\net.exe
net.exe stop wuauserv /y
C:\Windows\SysWOW64\net.exe
net.exe stop sharedaccess /y
C:\Windows\SysWOW64\net.exe
net.exe stop wscsvc /y
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:43:11 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:40:11 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net.exe
net.exe start schedule /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 start schedule /y
C:\Windows\SysWOW64\cmd.exe
cmd /c C:\Windows\system32\Option.bat
C:\Windows\system\KavUpda.exe
C:\Windows\system\KavUpda.exe
C:\Windows\SysWOW64\net.exe
net.exe stop sharedaccess /y
C:\Windows\SysWOW64\at.exe
at 7:43:15 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wuauserv /y
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config SharedAccess start= disabled
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop 360timeprot /y
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config wscsvc start= disabled
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop srservice /y
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\net.exe
net.exe stop 360timeprot /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop 360timeprot /y
C:\Windows\SysWOW64\net.exe
net.exe stop srservice /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wuauserv /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop srservice /y
C:\Windows\SysWOW64\net.exe
net.exe stop 360timeprot /y
C:\Windows\SysWOW64\net.exe
net.exe stop wuauserv /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess /y
C:\Windows\SysWOW64\net.exe
net.exe stop srservice /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess /y
C:\Windows\SysWOW64\net.exe
net.exe stop wuauserv /y
C:\Windows\SysWOW64\net.exe
net.exe stop sharedaccess /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wscsvc /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wscsvc /y
C:\Windows\SysWOW64\at.exe
at 7:40:15 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net.exe
net.exe stop wscsvc /y
C:\Windows\SysWOW64\net.exe
net.exe stop wscsvc /y
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:43:15 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:40:15 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\At.exe
At.exe 7:41:13 PM C:\Windows\Help\HelpCat.exe
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "638564352-360295535-1439612152-1057040902-438716106-7736760151760633203915669523"
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "941331068-1558551118-18885917801311830805-2123483200-20007708741182510233-2048807863"
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
Network
Files
memory/2856-0-0x0000000000400000-0x0000000000436000-memory.dmp
C:\Windows\SysWOW64\Option.bat
| MD5 | 3f7fbd2eb34892646e93fd5e6e343512 |
| SHA1 | 265ac1061b54f62350fb7a5f57e566454d013a66 |
| SHA256 | e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7 |
| SHA512 | 53d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140 |
C:\Windows\system\KavUpda.exe
| MD5 | a26d9e5d11f35a7c611d1a0bfb7be899 |
| SHA1 | ef5c2587c1c47f3be9ff198adb06b512b326b7a2 |
| SHA256 | 82b649cdc3f2ab838a8b576e7562112eb151d4e75974060251703a2b5af1dc27 |
| SHA512 | 1afba3f95f9ca981f6dbe8a791698f43d1fd58ff2ce21b5527992a30f969e2c95b658aa251bfd37bf69197eddb27612aa7ce444776e4b1ef8ac5964978e3c42e |
C:\Windows\Sysinf.bat
| MD5 | 7db3d565d6ddbe65a8b0e093910e7dcd |
| SHA1 | d4804e6180c6e74ba79d3343f2f2ccb15e502f12 |
| SHA256 | a2778cb87fd88c7508ffd506a8ff8d58d0ffc02156f846956e5e99c6cb3d2f3f |
| SHA512 | 0b3d1d0f44feba9dd78903ff77fdeaea834d930990a86641fb2e4ce04da280d33f6bee0ae0b1320e4070cbe20824062e45b52e5cad797c5985d8e31dce1ef82b |
C:\Windows\regedt32.sys
| MD5 | e7d7ec66bd61fac3843c98650b0c68f6 |
| SHA1 | a15ae06e1be51038863650746368a71024539bac |
| SHA256 | 6475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8 |
| SHA512 | ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:37
Reported
2024-01-07 19:40
Platform
win10v2004-20231222-en
Max time kernel
2s
Max time network
129s
Command Line
Signatures
Modifies visibility of file extensions in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Windows\System32\Conhost.exe | N/A |
Blocks application from running via registry modification
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun | C:\Windows\System32\Conhost.exe | N/A |
Sets file execution options in registry
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Windows\System32\Conhost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" | C:\Windows\System32\Conhost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe | C:\Windows\System32\Conhost.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\Option.bat | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system\KavUpda.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\Help\HelpCat.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File opened for modification | C:\Windows\Help\HelpCat.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\Sysinf.bat | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\regedt32.sys | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
| File created | C:\Windows\system\KavUpda.exe | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Runs net.exe
Runs regedit.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regedit.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe
"C:\Users\Admin\AppData\Local\Temp\a26d9e5d11f35a7c611d1a0bfb7be899.exe"
C:\Windows\SysWOW64\net.exe
net.exe start schedule /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 start schedule /y
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat
C:\Windows\SysWOW64\net.exe
net.exe stop 360timeprot /y
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\at.exe
at 7:42:34 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\at.exe
at 7:39:34 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop srservice /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 start schedule /y
C:\Windows\SysWOW64\net.exe
net.exe start schedule /y
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat
C:\Windows\system\KavUpda.exe
C:\Windows\system\KavUpda.exe
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop 360timeprot /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wuauserv /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wscsvc /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess /y
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\regedit.exe
regedit.exe /s C:\Windows\regedt32.sys
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config wscsvc start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config SharedAccess start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\net.exe
net.exe stop srservice /y
C:\Windows\SysWOW64\net.exe
net.exe stop wuauserv /y
C:\Windows\SysWOW64\net.exe
net.exe stop sharedaccess /y
C:\Windows\SysWOW64\net.exe
net.exe stop wscsvc /y
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:42:34 PM C:\Windows\Sysinf.bat
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\at.exe
at 7:42:37 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wscsvc /y
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\at.exe
at 7:39:37 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop 360timeprot /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop 360timeprot /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop srservice /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wuauserv /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wscsvc /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop srservice /y
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wuauserv /y
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config wscsvc start= disabled
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config SharedAccess start= disabled
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net.exe
net.exe stop 360timeprot /y
C:\Windows\SysWOW64\sc.exe
C:\Windows\system32\sc.exe config srservice start= disabled
C:\Windows\SysWOW64\net.exe
net.exe stop srservice /y
C:\Windows\SysWOW64\net.exe
net.exe stop 360timeprot /y
C:\Windows\SysWOW64\net.exe
net.exe stop srservice /y
C:\Windows\SysWOW64\net.exe
net.exe stop wuauserv /y
C:\Windows\SysWOW64\net.exe
net.exe stop wuauserv /y
C:\Windows\SysWOW64\net.exe
net.exe stop sharedaccess /y
C:\Windows\SysWOW64\net.exe
net.exe stop sharedaccess /y
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\net.exe
net.exe stop wscsvc /y
C:\Windows\SysWOW64\net.exe
net.exe stop wscsvc /y
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:42:37 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:39:37 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\At.exe
At.exe 7:40:35 PM C:\Windows\Help\HelpCat.exe
C:\Windows\SysWOW64\cmd.exe
cmd /c at 7:39:34 PM C:\Windows\Sysinf.bat
C:\Windows\SysWOW64\At.exe
At.exe 7:40:32 PM C:\Windows\Help\HelpCat.exe
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir F:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\attrib.exe
attrib -s -h -r C:\Autorun.inf\*.* /s /d
C:\Windows\SysWOW64\cmd.exe
cmd /c rmdir C:\Autorun.inf /s /q
C:\Windows\SysWOW64\cmd.exe
cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 80.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| GB | 96.17.179.71:80 | tcp | |
| GB | 96.17.179.71:80 | tcp | |
| PH | 23.37.1.183:80 | tcp | |
| PH | 23.37.1.183:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| GB | 104.91.71.134:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp |
Files
memory/3996-0-0x0000000000400000-0x0000000000436000-memory.dmp