Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 17:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8a2308e717857d6d7f8d712d7517efe2.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
8a2308e717857d6d7f8d712d7517efe2.exe
-
Size
108KB
-
MD5
8a2308e717857d6d7f8d712d7517efe2
-
SHA1
ade32ee95572133e5a5be4ed905e04fd146989cc
-
SHA256
39ddc5ee6653b06412e92cdf3d27e82fc9ddbe962073543753a3706a72541955
-
SHA512
c573865deec08ebfa61066a48c7dd4c060074df0b4dffd1c1703b087b92212f75e5cc460b0303d5f570b250702f8c9f074faa046bd67c28fd0bb77b5774e5c80
-
SSDEEP
1536:WE6hDaywldhD7rA6XmY6VCAop7NX+o3STOARs4h7RmKFzG3f8Yk/5gKN:osywldhU7VVmp7NX+o3PUEu0kYkhF
Malware Config
Signatures
-
Executes dropped EXE 62 IoCs
pid Process 2780 net.net 2812 net.net 2596 net.net 1664 net.net 1100 net.net 1688 net.net 2328 net.net 1644 net.net 2460 net.net 832 net.net 2108 net.net 3012 net.net 1868 net.net 2868 net.net 2748 net.net 2680 net.net 2040 net.net 520 net.net 1584 net.net 3000 net.net 1944 net.net 1588 net.net 1676 net.net 876 net.net 2216 net.net 2616 net.net 1900 net.net 3060 net.net 2920 net.net 2948 net.net 2480 net.net 2324 net.net 2328 net.net 1112 net.net 1944 net.net 1952 net.net 880 net.net 1076 net.net 2724 net.net 2588 net.net 2584 net.net 3068 net.net 2756 net.net 1996 net.net 2012 net.net 2620 net.net 748 net.net 2956 net.net 1960 net.net 2124 net.net 860 net.net 2172 net.net 2316 net.net 1964 net.net 1812 net.net 2716 net.net 2668 net.net 2044 net.net 324 net.net 784 net.net 2992 net.net 644 net.net -
Loads dropped DLL 64 IoCs
pid Process 2852 cmd.exe 2852 cmd.exe 2624 cmd.exe 2624 cmd.exe 2168 cmd.exe 2168 cmd.exe 2928 cmd.exe 2928 cmd.exe 1656 cmd.exe 1656 cmd.exe 1692 cmd.exe 1692 cmd.exe 1864 cmd.exe 1864 cmd.exe 1468 cmd.exe 1468 cmd.exe 1432 cmd.exe 1432 cmd.exe 2508 cmd.exe 2508 cmd.exe 844 cmd.exe 844 cmd.exe 1076 cmd.exe 1076 cmd.exe 2804 cmd.exe 2804 cmd.exe 2696 cmd.exe 2696 cmd.exe 2584 cmd.exe 2584 cmd.exe 848 cmd.exe 848 cmd.exe 1196 cmd.exe 1196 cmd.exe 1984 cmd.exe 1984 cmd.exe 2324 cmd.exe 2324 cmd.exe 1244 cmd.exe 1244 cmd.exe 2404 cmd.exe 2404 cmd.exe 2508 cmd.exe 2508 cmd.exe 1508 cmd.exe 1508 cmd.exe 2092 cmd.exe 2092 cmd.exe 2660 cmd.exe 2660 cmd.exe 2672 cmd.exe 2672 cmd.exe 2960 cmd.exe 2960 cmd.exe 2636 cmd.exe 2636 cmd.exe 284 cmd.exe 284 cmd.exe 1996 cmd.exe 1996 cmd.exe 2260 cmd.exe 2260 cmd.exe 2308 cmd.exe 2308 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8a2308e717857d6d7f8d712d7517efe2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\net.net 8a2308e717857d6d7f8d712d7517efe2.exe File opened for modification C:\Windows\SysWOW64\net.net 8a2308e717857d6d7f8d712d7517efe2.exe -
Runs ping.exe 1 TTPs 63 IoCs
pid Process 2328 PING.EXE 1060 PING.EXE 1940 PING.EXE 2860 PING.EXE 2896 PING.EXE 2680 PING.EXE 3000 PING.EXE 1336 PING.EXE 2656 PING.EXE 2164 PING.EXE 1940 PING.EXE 2412 PING.EXE 2688 PING.EXE 3048 PING.EXE 2588 PING.EXE 2860 PING.EXE 2632 PING.EXE 2688 PING.EXE 1760 PING.EXE 676 PING.EXE 2144 PING.EXE 1688 PING.EXE 568 PING.EXE 1944 PING.EXE 1400 PING.EXE 2448 PING.EXE 1080 PING.EXE 340 PING.EXE 1964 PING.EXE 2016 PING.EXE 980 PING.EXE 2536 PING.EXE 2704 PING.EXE 2508 PING.EXE 2144 PING.EXE 520 PING.EXE 1576 PING.EXE 2460 PING.EXE 1560 PING.EXE 2848 PING.EXE 2712 PING.EXE 1864 PING.EXE 440 PING.EXE 2672 PING.EXE 1992 PING.EXE 2684 PING.EXE 3056 PING.EXE 2424 PING.EXE 1632 PING.EXE 2180 PING.EXE 3052 PING.EXE 2760 PING.EXE 1624 PING.EXE 2904 PING.EXE 1224 PING.EXE 1960 PING.EXE 1184 PING.EXE 2604 PING.EXE 1164 PING.EXE 2244 PING.EXE 2364 PING.EXE 568 PING.EXE 1612 PING.EXE -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 1868 8a2308e717857d6d7f8d712d7517efe2.exe 2780 net.net 2812 net.net 2596 net.net 1664 net.net 1100 net.net 1688 net.net 2328 net.net 1644 net.net 2460 net.net 832 net.net 2108 net.net 3012 net.net 1868 net.net 2868 net.net 2748 net.net 2680 net.net 2040 net.net 520 net.net 1584 net.net 3000 net.net 1944 net.net 1588 net.net 1676 net.net 876 net.net 2216 net.net 2616 net.net 1900 net.net 3060 net.net 2920 net.net 2948 net.net 2480 net.net 2324 net.net 2328 net.net 1112 net.net 1944 net.net 1952 net.net 880 net.net 1076 net.net 2724 net.net 2588 net.net 2584 net.net 3068 net.net 2756 net.net 1996 net.net 2012 net.net 2620 net.net 748 net.net 2956 net.net 1960 net.net 2124 net.net 860 net.net 2172 net.net 2316 net.net 1964 net.net 1812 net.net 2716 net.net 2668 net.net 2044 net.net 324 net.net 784 net.net 2992 net.net 644 net.net -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1868 8a2308e717857d6d7f8d712d7517efe2.exe 1868 8a2308e717857d6d7f8d712d7517efe2.exe 1868 8a2308e717857d6d7f8d712d7517efe2.exe 2780 net.net 2780 net.net 2780 net.net 2812 net.net 2812 net.net 2812 net.net 2596 net.net 2596 net.net 2596 net.net 1664 net.net 1664 net.net 1664 net.net 1100 net.net 1100 net.net 1100 net.net 1688 net.net 1688 net.net 1688 net.net 2328 net.net 2328 net.net 2328 net.net 1644 net.net 1644 net.net 1644 net.net 2460 net.net 2460 net.net 2460 net.net 832 net.net 832 net.net 832 net.net 2108 net.net 2108 net.net 2108 net.net 3012 net.net 3012 net.net 3012 net.net 1868 net.net 1868 net.net 1868 net.net 2868 net.net 2868 net.net 2868 net.net 2748 net.net 2748 net.net 2748 net.net 2680 net.net 2680 net.net 2680 net.net 2040 net.net 2040 net.net 2040 net.net 520 net.net 520 net.net 520 net.net 1584 net.net 1584 net.net 1584 net.net 3000 net.net 3000 net.net 3000 net.net 1944 net.net -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2764 1868 8a2308e717857d6d7f8d712d7517efe2.exe 28 PID 1868 wrote to memory of 2764 1868 8a2308e717857d6d7f8d712d7517efe2.exe 28 PID 1868 wrote to memory of 2764 1868 8a2308e717857d6d7f8d712d7517efe2.exe 28 PID 1868 wrote to memory of 2764 1868 8a2308e717857d6d7f8d712d7517efe2.exe 28 PID 2764 wrote to memory of 2684 2764 cmd.exe 30 PID 2764 wrote to memory of 2684 2764 cmd.exe 30 PID 2764 wrote to memory of 2684 2764 cmd.exe 30 PID 2764 wrote to memory of 2684 2764 cmd.exe 30 PID 2764 wrote to memory of 2852 2764 cmd.exe 31 PID 2764 wrote to memory of 2852 2764 cmd.exe 31 PID 2764 wrote to memory of 2852 2764 cmd.exe 31 PID 2764 wrote to memory of 2852 2764 cmd.exe 31 PID 2852 wrote to memory of 2780 2852 cmd.exe 32 PID 2852 wrote to memory of 2780 2852 cmd.exe 32 PID 2852 wrote to memory of 2780 2852 cmd.exe 32 PID 2852 wrote to memory of 2780 2852 cmd.exe 32 PID 2780 wrote to memory of 2708 2780 net.net 33 PID 2780 wrote to memory of 2708 2780 net.net 33 PID 2780 wrote to memory of 2708 2780 net.net 33 PID 2780 wrote to memory of 2708 2780 net.net 33 PID 2708 wrote to memory of 2604 2708 cmd.exe 35 PID 2708 wrote to memory of 2604 2708 cmd.exe 35 PID 2708 wrote to memory of 2604 2708 cmd.exe 35 PID 2708 wrote to memory of 2604 2708 cmd.exe 35 PID 2708 wrote to memory of 2624 2708 cmd.exe 36 PID 2708 wrote to memory of 2624 2708 cmd.exe 36 PID 2708 wrote to memory of 2624 2708 cmd.exe 36 PID 2708 wrote to memory of 2624 2708 cmd.exe 36 PID 2624 wrote to memory of 2812 2624 cmd.exe 37 PID 2624 wrote to memory of 2812 2624 cmd.exe 37 PID 2624 wrote to memory of 2812 2624 cmd.exe 37 PID 2624 wrote to memory of 2812 2624 cmd.exe 37 PID 2812 wrote to memory of 2656 2812 net.net 38 PID 2812 wrote to memory of 2656 2812 net.net 38 PID 2812 wrote to memory of 2656 2812 net.net 38 PID 2812 wrote to memory of 2656 2812 net.net 38 PID 2656 wrote to memory of 3056 2656 cmd.exe 40 PID 2656 wrote to memory of 3056 2656 cmd.exe 40 PID 2656 wrote to memory of 3056 2656 cmd.exe 40 PID 2656 wrote to memory of 3056 2656 cmd.exe 40 PID 2656 wrote to memory of 2168 2656 cmd.exe 41 PID 2656 wrote to memory of 2168 2656 cmd.exe 41 PID 2656 wrote to memory of 2168 2656 cmd.exe 41 PID 2656 wrote to memory of 2168 2656 cmd.exe 41 PID 2168 wrote to memory of 2596 2168 cmd.exe 42 PID 2168 wrote to memory of 2596 2168 cmd.exe 42 PID 2168 wrote to memory of 2596 2168 cmd.exe 42 PID 2168 wrote to memory of 2596 2168 cmd.exe 42 PID 2596 wrote to memory of 2648 2596 net.net 43 PID 2596 wrote to memory of 2648 2596 net.net 43 PID 2596 wrote to memory of 2648 2596 net.net 43 PID 2596 wrote to memory of 2648 2596 net.net 43 PID 2648 wrote to memory of 2904 2648 cmd.exe 45 PID 2648 wrote to memory of 2904 2648 cmd.exe 45 PID 2648 wrote to memory of 2904 2648 cmd.exe 45 PID 2648 wrote to memory of 2904 2648 cmd.exe 45 PID 2648 wrote to memory of 2928 2648 cmd.exe 46 PID 2648 wrote to memory of 2928 2648 cmd.exe 46 PID 2648 wrote to memory of 2928 2648 cmd.exe 46 PID 2648 wrote to memory of 2928 2648 cmd.exe 46 PID 2928 wrote to memory of 1664 2928 cmd.exe 47 PID 2928 wrote to memory of 1664 2928 cmd.exe 47 PID 2928 wrote to memory of 1664 2928 cmd.exe 47 PID 2928 wrote to memory of 1664 2928 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2308e717857d6d7f8d712d7517efe2.exe"C:\Users\Admin\AppData\Local\Temp\8a2308e717857d6d7f8d712d7517efe2.exe"1⤵
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2684
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL5⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 36⤵
- Runs ping.exe
PID:2604
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL8⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 39⤵
- Runs ping.exe
PID:3056
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"9⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"10⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 312⤵
- Runs ping.exe
PID:2904
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"13⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL14⤵PID:2016
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 315⤵
- Runs ping.exe
PID:1560
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"15⤵
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"16⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL17⤵PID:364
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 318⤵
- Runs ping.exe
PID:520
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"18⤵
- Loads dropped DLL
PID:1692 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"19⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL20⤵PID:1584
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 321⤵
- Runs ping.exe
PID:1224
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"21⤵
- Loads dropped DLL
PID:1864 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"22⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL23⤵PID:2264
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 324⤵
- Runs ping.exe
PID:3000
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"24⤵
- Loads dropped DLL
PID:1468 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"25⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL26⤵PID:1892
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 327⤵
- Runs ping.exe
PID:1944
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"27⤵
- Loads dropped DLL
PID:1432 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"28⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL29⤵PID:1340
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 330⤵
- Runs ping.exe
PID:1960
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"30⤵
- Loads dropped DLL
PID:2508 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"31⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL32⤵PID:880
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 333⤵
- Runs ping.exe
PID:1400
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"33⤵
- Loads dropped DLL
PID:844 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"34⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL35⤵PID:2280
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 336⤵
- Runs ping.exe
PID:1336
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"36⤵
- Loads dropped DLL
PID:1076 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"37⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL38⤵PID:1604
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 339⤵
- Runs ping.exe
PID:3048
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"39⤵
- Loads dropped DLL
PID:2804 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"40⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL41⤵PID:2736
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 342⤵
- Runs ping.exe
PID:2588
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"42⤵
- Loads dropped DLL
PID:2696 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"43⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL44⤵PID:2424
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 345⤵
- Runs ping.exe
PID:2704
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"45⤵
- Loads dropped DLL
PID:2584 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"46⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL47⤵PID:2392
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 348⤵
- Runs ping.exe
PID:2632
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"48⤵
- Loads dropped DLL
PID:848 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"49⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL50⤵PID:2912
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 351⤵
- Runs ping.exe
PID:2860
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"51⤵
- Loads dropped DLL
PID:1196 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"52⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL53⤵PID:2260
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 354⤵
- Runs ping.exe
PID:2164
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"54⤵
- Loads dropped DLL
PID:1984 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"55⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:520 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL56⤵PID:1680
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 357⤵
- Runs ping.exe
PID:2412
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"57⤵
- Loads dropped DLL
PID:2324 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"58⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL59⤵PID:1132
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 360⤵
- Runs ping.exe
PID:2328
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"60⤵
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"61⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL62⤵PID:2304
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 363⤵
- Runs ping.exe
PID:340
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"63⤵
- Loads dropped DLL
PID:2404 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"64⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL65⤵PID:1932
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 366⤵
- Runs ping.exe
PID:1164
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"66⤵
- Loads dropped DLL
PID:2508 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"67⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL68⤵PID:1924
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 369⤵
- Runs ping.exe
PID:676
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"69⤵
- Loads dropped DLL
PID:1508 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"70⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL71⤵PID:1748
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 372⤵
- Runs ping.exe
PID:1632
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"72⤵
- Loads dropped DLL
PID:2092 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"73⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL74⤵PID:1884
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 375⤵
- Runs ping.exe
PID:1576
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"75⤵
- Loads dropped DLL
PID:2660 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"76⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL77⤵PID:1604
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 378⤵
- Runs ping.exe
PID:2448
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"78⤵
- Loads dropped DLL
PID:2672 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"79⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL80⤵PID:2696
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 381⤵
- Runs ping.exe
PID:1964
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"81⤵
- Loads dropped DLL
PID:2960 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"82⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL83⤵PID:1724
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 384⤵
- Runs ping.exe
PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"84⤵
- Loads dropped DLL
PID:2636 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"85⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL86⤵PID:1968
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 387⤵
- Runs ping.exe
PID:2656
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"87⤵
- Loads dropped DLL
PID:284 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"88⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL89⤵PID:2840
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 390⤵
- Runs ping.exe
PID:2244
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"90⤵
- Loads dropped DLL
PID:1996 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"91⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL92⤵PID:2040
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 393⤵
- Runs ping.exe
PID:1184
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"93⤵
- Loads dropped DLL
PID:2260 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"94⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL95⤵PID:1764
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 396⤵
- Runs ping.exe
PID:1688
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"96⤵
- Loads dropped DLL
PID:2308 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"97⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL98⤵PID:572
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 399⤵
- Runs ping.exe
PID:1060
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"99⤵PID:2336
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"100⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL101⤵PID:2768
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3102⤵
- Runs ping.exe
PID:568
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"102⤵PID:440
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"103⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1112 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL104⤵PID:2924
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3105⤵
- Runs ping.exe
PID:1940
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"105⤵PID:1156
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"106⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL107⤵PID:2388
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3108⤵
- Runs ping.exe
PID:2508
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"108⤵PID:940
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"109⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL110⤵PID:832
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3111⤵
- Runs ping.exe
PID:2144
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"111⤵PID:1912
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"112⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL113⤵PID:900
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3114⤵
- Runs ping.exe
PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"114⤵PID:2500
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"115⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL116⤵PID:868
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3117⤵
- Runs ping.exe
PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"117⤵PID:1628
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"118⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL119⤵PID:1868
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3120⤵
- Runs ping.exe
PID:2672
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"120⤵PID:2848
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"121⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL122⤵PID:2780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-