Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe
Resource
win7-20240704-en
8 signatures
150 seconds
General
-
Target
3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe
-
Size
108KB
-
MD5
3bf4d8c8bc4216ec9c95f89eb03d833e
-
SHA1
7764794a8cea89ef0a1b9eca48ce47a207304bad
-
SHA256
0e38763afc44da863332dd3a156e2b82db5c1361353f30b0a133e82e669ec1e9
-
SHA512
d0575a645b3712c6a4a41f8b0e5941d2073d12e943ad1e87ae71e111c6dc2a0830861190326338768e83a12a24a84990ceeacc4bfbb103183c4535b47b5a859b
-
SSDEEP
768:U7rgnvQjXcTmAaigvO2B/fJPSysbX2uraeVE65IJnur1v2j7rgnvQjXsU1DYPtiG:U7rA6Xizy8hVrI05v2j7rA6XsU6tKf
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2740 net.net 2924 net.net 2596 net.net 336 net.net 1612 net.net 1684 net.net 2352 net.net 2788 net.net 2904 net.net 2248 net.net 2488 net.net 1252 net.net 2092 net.net 2760 net.net 2628 net.net 564 net.net 532 net.net 2012 net.net 1028 net.net 1516 net.net 1436 net.net 2980 net.net 372 net.net 1432 net.net 1500 net.net 1528 net.net 2840 net.net 2656 net.net 2856 net.net 564 net.net 1060 net.net 2896 net.net 2188 net.net 1560 net.net 1120 net.net 872 net.net 2988 net.net 1668 net.net 3048 net.net 2516 net.net 2816 net.net 2864 net.net 2736 net.net 2868 net.net 1940 net.net 816 net.net 1288 net.net 404 net.net 1696 net.net 112 net.net 928 net.net 3028 net.net 1380 net.net 1252 net.net 2212 net.net 2808 net.net 2996 net.net 480 net.net 1268 net.net 1912 net.net 600 net.net 2184 net.net 1108 net.net 1408 net.net -
Loads dropped DLL 64 IoCs
pid Process 2708 cmd.exe 2708 cmd.exe 2104 cmd.exe 2104 cmd.exe 2600 cmd.exe 2600 cmd.exe 684 cmd.exe 684 cmd.exe 592 cmd.exe 592 cmd.exe 1868 cmd.exe 1868 cmd.exe 1028 cmd.exe 1028 cmd.exe 2400 cmd.exe 2400 cmd.exe 624 cmd.exe 624 cmd.exe 2980 cmd.exe 2980 cmd.exe 1924 cmd.exe 1924 cmd.exe 2512 cmd.exe 2512 cmd.exe 3000 cmd.exe 3000 cmd.exe 2716 cmd.exe 2716 cmd.exe 2620 cmd.exe 2620 cmd.exe 2644 cmd.exe 2644 cmd.exe 1600 cmd.exe 1600 cmd.exe 1868 cmd.exe 1868 cmd.exe 2120 cmd.exe 2120 cmd.exe 2956 cmd.exe 2956 cmd.exe 1308 cmd.exe 1308 cmd.exe 1240 cmd.exe 1240 cmd.exe 1608 cmd.exe 1608 cmd.exe 1896 cmd.exe 1896 cmd.exe 1864 cmd.exe 1864 cmd.exe 2408 cmd.exe 2408 cmd.exe 2796 cmd.exe 2796 cmd.exe 2648 cmd.exe 2648 cmd.exe 760 cmd.exe 760 cmd.exe 2652 cmd.exe 2652 cmd.exe 1728 cmd.exe 1728 cmd.exe 2892 cmd.exe 2892 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\net.net 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe File created C:\Windows\SysWOW64\net.net 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 2092 PING.EXE 2732 PING.EXE 2784 PING.EXE 2476 PING.EXE 1976 PING.EXE 2196 PING.EXE 1528 PING.EXE 2036 PING.EXE 2396 PING.EXE 532 PING.EXE 960 PING.EXE 1668 PING.EXE 992 PING.EXE 2840 PING.EXE 3012 PING.EXE 2408 PING.EXE 2840 PING.EXE 2852 PING.EXE 956 PING.EXE 2100 PING.EXE 1628 PING.EXE 1952 PING.EXE 1940 PING.EXE 2604 PING.EXE 1180 PING.EXE 1800 PING.EXE 1232 PING.EXE 2100 PING.EXE 2008 PING.EXE 2156 PING.EXE 2204 PING.EXE 2504 PING.EXE 2608 PING.EXE 2760 PING.EXE 1568 PING.EXE 2968 PING.EXE 1948 PING.EXE 1604 PING.EXE 1232 PING.EXE 2640 PING.EXE 1328 PING.EXE 2492 PING.EXE 2820 PING.EXE 340 PING.EXE 2264 PING.EXE 2032 PING.EXE 2560 PING.EXE 992 PING.EXE 884 PING.EXE 2144 PING.EXE 2532 PING.EXE 2644 PING.EXE 1308 PING.EXE 1372 PING.EXE 1296 PING.EXE 2948 PING.EXE 2272 PING.EXE 1248 PING.EXE 620 PING.EXE 1240 PING.EXE 836 PING.EXE 2164 PING.EXE 1596 PING.EXE 1736 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 2740 net.net 2924 net.net 2596 net.net 336 net.net 1612 net.net 1684 net.net 2352 net.net 2788 net.net 2904 net.net 2248 net.net 2488 net.net 2092 net.net 2760 net.net 2628 net.net 564 net.net 532 net.net 2012 net.net 1028 net.net 1516 net.net 1436 net.net 2980 net.net 372 net.net 1432 net.net 1500 net.net 1528 net.net 2840 net.net 2656 net.net 2856 net.net 564 net.net 1060 net.net 2896 net.net 2188 net.net 1560 net.net 1120 net.net 872 net.net 2988 net.net 1668 net.net 3048 net.net 2516 net.net 2816 net.net 2864 net.net 2736 net.net 2868 net.net 1940 net.net 816 net.net 1288 net.net 404 net.net 1696 net.net 112 net.net 928 net.net 3028 net.net 1380 net.net 2212 net.net 2808 net.net 2996 net.net 480 net.net 1268 net.net 1912 net.net 600 net.net 2184 net.net 1108 net.net 1408 net.net 920 net.net -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 2740 net.net 2740 net.net 2740 net.net 2924 net.net 2924 net.net 2924 net.net 2596 net.net 2596 net.net 2596 net.net 336 net.net 336 net.net 336 net.net 1612 net.net 1612 net.net 1612 net.net 1684 net.net 1684 net.net 1684 net.net 2352 net.net 2352 net.net 2352 net.net 2788 net.net 2788 net.net 2788 net.net 2904 net.net 2904 net.net 2904 net.net 2248 net.net 2248 net.net 2248 net.net 2488 net.net 2488 net.net 2488 net.net 2092 net.net 2092 net.net 2092 net.net 2760 net.net 2760 net.net 2760 net.net 2628 net.net 2628 net.net 2628 net.net 564 net.net 564 net.net 564 net.net 532 net.net 532 net.net 532 net.net 2012 net.net 2012 net.net 2012 net.net 1028 net.net 1028 net.net 1028 net.net 1516 net.net 1516 net.net 1516 net.net 1436 net.net 1436 net.net 1436 net.net 2980 net.net -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1212 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 30 PID 2084 wrote to memory of 1212 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 30 PID 2084 wrote to memory of 1212 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 30 PID 2084 wrote to memory of 1212 2084 3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe 30 PID 1212 wrote to memory of 2092 1212 cmd.exe 32 PID 1212 wrote to memory of 2092 1212 cmd.exe 32 PID 1212 wrote to memory of 2092 1212 cmd.exe 32 PID 1212 wrote to memory of 2092 1212 cmd.exe 32 PID 1212 wrote to memory of 2708 1212 cmd.exe 33 PID 1212 wrote to memory of 2708 1212 cmd.exe 33 PID 1212 wrote to memory of 2708 1212 cmd.exe 33 PID 1212 wrote to memory of 2708 1212 cmd.exe 33 PID 2708 wrote to memory of 2740 2708 cmd.exe 34 PID 2708 wrote to memory of 2740 2708 cmd.exe 34 PID 2708 wrote to memory of 2740 2708 cmd.exe 34 PID 2708 wrote to memory of 2740 2708 cmd.exe 34 PID 2740 wrote to memory of 2864 2740 net.net 35 PID 2740 wrote to memory of 2864 2740 net.net 35 PID 2740 wrote to memory of 2864 2740 net.net 35 PID 2740 wrote to memory of 2864 2740 net.net 35 PID 2864 wrote to memory of 2732 2864 cmd.exe 37 PID 2864 wrote to memory of 2732 2864 cmd.exe 37 PID 2864 wrote to memory of 2732 2864 cmd.exe 37 PID 2864 wrote to memory of 2732 2864 cmd.exe 37 PID 2864 wrote to memory of 2104 2864 cmd.exe 38 PID 2864 wrote to memory of 2104 2864 cmd.exe 38 PID 2864 wrote to memory of 2104 2864 cmd.exe 38 PID 2864 wrote to memory of 2104 2864 cmd.exe 38 PID 2104 wrote to memory of 2924 2104 cmd.exe 39 PID 2104 wrote to memory of 2924 2104 cmd.exe 39 PID 2104 wrote to memory of 2924 2104 cmd.exe 39 PID 2104 wrote to memory of 2924 2104 cmd.exe 39 PID 2924 wrote to memory of 2884 2924 net.net 40 PID 2924 wrote to memory of 2884 2924 net.net 40 PID 2924 wrote to memory of 2884 2924 net.net 40 PID 2924 wrote to memory of 2884 2924 net.net 40 PID 2884 wrote to memory of 2784 2884 cmd.exe 42 PID 2884 wrote to memory of 2784 2884 cmd.exe 42 PID 2884 wrote to memory of 2784 2884 cmd.exe 42 PID 2884 wrote to memory of 2784 2884 cmd.exe 42 PID 2884 wrote to memory of 2600 2884 cmd.exe 43 PID 2884 wrote to memory of 2600 2884 cmd.exe 43 PID 2884 wrote to memory of 2600 2884 cmd.exe 43 PID 2884 wrote to memory of 2600 2884 cmd.exe 43 PID 2600 wrote to memory of 2596 2600 cmd.exe 44 PID 2600 wrote to memory of 2596 2600 cmd.exe 44 PID 2600 wrote to memory of 2596 2600 cmd.exe 44 PID 2600 wrote to memory of 2596 2600 cmd.exe 44 PID 2596 wrote to memory of 3024 2596 net.net 45 PID 2596 wrote to memory of 3024 2596 net.net 45 PID 2596 wrote to memory of 3024 2596 net.net 45 PID 2596 wrote to memory of 3024 2596 net.net 45 PID 3024 wrote to memory of 2644 3024 cmd.exe 47 PID 3024 wrote to memory of 2644 3024 cmd.exe 47 PID 3024 wrote to memory of 2644 3024 cmd.exe 47 PID 3024 wrote to memory of 2644 3024 cmd.exe 47 PID 3024 wrote to memory of 684 3024 cmd.exe 48 PID 3024 wrote to memory of 684 3024 cmd.exe 48 PID 3024 wrote to memory of 684 3024 cmd.exe 48 PID 3024 wrote to memory of 684 3024 cmd.exe 48 PID 684 wrote to memory of 336 684 cmd.exe 49 PID 684 wrote to memory of 336 684 cmd.exe 49 PID 684 wrote to memory of 336 684 cmd.exe 49 PID 684 wrote to memory of 336 684 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3bf4d8c8bc4216ec9c95f89eb03d833e_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:2092
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL5⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 36⤵
- Runs ping.exe
PID:2732
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL8⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 39⤵
- Runs ping.exe
PID:2784
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"9⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"10⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL11⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 312⤵
- Runs ping.exe
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"13⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:336 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL14⤵PID:864
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 315⤵
- Runs ping.exe
PID:1940
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"15⤵
- Loads dropped DLL
PID:592 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"16⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL17⤵PID:600
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 318⤵
- Runs ping.exe
PID:2032
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"18⤵
- Loads dropped DLL
PID:1868 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"19⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL20⤵PID:568
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 321⤵
- Runs ping.exe
PID:2492
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"21⤵
- Loads dropped DLL
PID:1028 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"22⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL23⤵PID:1560
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 324⤵
- Runs ping.exe
PID:1232
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"24⤵
- Loads dropped DLL
PID:2400 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"25⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL26⤵PID:696
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 327⤵
- Runs ping.exe
PID:1308
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"27⤵
- Loads dropped DLL
PID:624 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"28⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL29⤵PID:2320
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 330⤵
- Runs ping.exe
PID:1240
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"30⤵
- Loads dropped DLL
PID:2980 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"31⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL32⤵PID:2192
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 333⤵
- Runs ping.exe
PID:1668
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"33⤵
- Loads dropped DLL
PID:1924 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"34⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL35⤵PID:1892
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 336⤵
- Runs ping.exe
PID:2100
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"36⤵
- Loads dropped DLL
PID:2512 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"37⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1252 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL38⤵PID:1528
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 339⤵
- Runs ping.exe
PID:1736
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"39⤵
- Loads dropped DLL
PID:3000 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"40⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL41⤵PID:2824
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 342⤵
- Runs ping.exe
PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"42⤵
- Loads dropped DLL
PID:2716 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"43⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL44⤵PID:2736
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 345⤵
- Runs ping.exe
PID:1372
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"45⤵
- Loads dropped DLL
PID:2620 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL47⤵PID:1644
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 348⤵
- Runs ping.exe
PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"48⤵
- Loads dropped DLL
PID:2644 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"49⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL50⤵PID:1580
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 351⤵
- Runs ping.exe
PID:2504
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"51⤵
- Loads dropped DLL
PID:1600 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"52⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL53⤵PID:2332
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 354⤵
- Runs ping.exe
PID:2036
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"54⤵
- Loads dropped DLL
PID:1868 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"55⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL56⤵PID:1064
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 357⤵
- Runs ping.exe
PID:992
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"57⤵
- Loads dropped DLL
PID:2120 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"58⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL59⤵PID:2580
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 360⤵
- Runs ping.exe
PID:836
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"60⤵
- Loads dropped DLL
PID:2956 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"61⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL62⤵PID:1660
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 363⤵
- Runs ping.exe
PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"63⤵
- Loads dropped DLL
PID:1308 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"64⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL65⤵PID:1672
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 366⤵PID:2904
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"66⤵
- Loads dropped DLL
PID:1240 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"67⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL68⤵PID:2224
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 369⤵
- Runs ping.exe
PID:2272
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"69⤵
- Loads dropped DLL
PID:1608 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"70⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:372 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL71⤵PID:880
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 372⤵
- Runs ping.exe
PID:2396
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"72⤵
- Loads dropped DLL
PID:1896 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"73⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL74⤵PID:1884
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 375⤵
- Runs ping.exe
PID:2968
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"75⤵
- Loads dropped DLL
PID:1864 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"76⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL77⤵PID:2088
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 378⤵
- Runs ping.exe
PID:2852
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"78⤵
- Loads dropped DLL
PID:2408 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"79⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL80⤵PID:2752
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 381⤵
- Runs ping.exe
PID:2156
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"81⤵
- Loads dropped DLL
PID:2796 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"82⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL83⤵PID:2888
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 384⤵
- Runs ping.exe
PID:2820
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"84⤵
- Loads dropped DLL
PID:2648 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"85⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL86⤵PID:2736
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 387⤵
- Runs ping.exe
PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"87⤵
- Loads dropped DLL
PID:760 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"88⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL89⤵PID:2596
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 390⤵
- Runs ping.exe
PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"90⤵
- Loads dropped DLL
PID:2652 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"91⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL92⤵PID:2504
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 393⤵PID:1020
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"93⤵
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"94⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL95⤵PID:532
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 396⤵
- Runs ping.exe
PID:1248
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"96⤵
- Loads dropped DLL
PID:2892 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"97⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL98⤵PID:1684
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 399⤵
- Runs ping.exe
PID:992
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"99⤵PID:2800
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"100⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL101⤵PID:2176
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3102⤵
- Runs ping.exe
PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"102⤵PID:2944
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"103⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL104⤵PID:3060
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3105⤵
- Runs ping.exe
PID:620
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"105⤵PID:1308
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"106⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL107⤵PID:660
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3108⤵
- Runs ping.exe
PID:956
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"108⤵PID:908
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"109⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL110⤵PID:1664
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3111⤵
- Runs ping.exe
PID:2204
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"111⤵PID:1576
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"112⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL113⤵PID:2260
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3114⤵
- Runs ping.exe
PID:340
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"114⤵PID:3036
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"115⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL116⤵PID:2124
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3117⤵
- Runs ping.exe
PID:2100
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"117⤵PID:1884
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"118⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL119⤵PID:2368
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3120⤵
- Runs ping.exe
PID:2196
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"120⤵PID:1524
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"121⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL122⤵PID:2388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-