Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 23:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
8 signatures
150 seconds
General
-
Target
5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe
-
Size
108KB
-
MD5
5e24f784ead0aacf1a086123d366de4c
-
SHA1
a92fb961ce46c15870177a3b175fa849be0bf11c
-
SHA256
d65d4e139df9c545dffc30e140a60cdce59af0e05a68deba1887abcd5fb8e8ce
-
SHA512
34186500b29d06dad5465d633d201b6e540c4a1b0fd9a7ea163329f219be4c892b64c3a65d6e77fba5b64d9050ba29c57bd72f07a081c456b2b830aa644e2014
-
SSDEEP
768:w7rgnvQjX4KPcAmigvO2B/fJPSysbX2uraeVE65ITnOdqv/q7rgnvQjXMf1DYM8k:w7rA6XbBy8hVrISkv/q7rA6XM1OVf
Malware Config
Signatures
-
Executes dropped EXE 60 IoCs
pid Process 2640 net.net 2680 net.net 2992 net.net 2412 net.net 1076 net.net 1200 net.net 2476 net.net 1616 net.net 2208 net.net 1440 net.net 884 net.net 1600 net.net 3012 net.net 2792 net.net 1324 net.net 2572 net.net 2336 net.net 2092 net.net 2920 net.net 684 net.net 1560 net.net 3040 net.net 2896 net.net 2596 net.net 2036 net.net 2536 net.net 2680 net.net 2060 net.net 852 net.net 2760 net.net 2100 net.net 2396 net.net 2476 net.net 1572 net.net 1792 net.net 2188 net.net 1800 net.net 1636 net.net 2324 net.net 2796 net.net 1232 net.net 2564 net.net 2988 net.net 2836 net.net 2864 net.net 1852 net.net 1788 net.net 2268 net.net 2232 net.net 1176 net.net 2128 net.net 1012 net.net 1080 net.net 2600 net.net 836 net.net 2196 net.net 2700 net.net 2680 net.net 1528 net.net 2000 net.net -
Loads dropped DLL 64 IoCs
pid Process 2672 cmd.exe 2672 cmd.exe 568 cmd.exe 568 cmd.exe 2984 cmd.exe 2984 cmd.exe 1848 cmd.exe 1848 cmd.exe 2760 cmd.exe 2760 cmd.exe 2612 cmd.exe 2612 cmd.exe 1980 cmd.exe 1980 cmd.exe 1620 cmd.exe 1620 cmd.exe 2368 cmd.exe 2368 cmd.exe 2236 cmd.exe 2236 cmd.exe 1800 cmd.exe 1800 cmd.exe 1576 cmd.exe 1576 cmd.exe 3060 cmd.exe 3060 cmd.exe 2652 cmd.exe 2652 cmd.exe 560 cmd.exe 560 cmd.exe 2776 cmd.exe 2776 cmd.exe 2584 cmd.exe 2584 cmd.exe 1172 cmd.exe 1172 cmd.exe 2108 cmd.exe 2108 cmd.exe 1296 cmd.exe 1296 cmd.exe 980 cmd.exe 980 cmd.exe 1976 cmd.exe 1976 cmd.exe 1744 cmd.exe 1744 cmd.exe 884 cmd.exe 884 cmd.exe 2360 cmd.exe 2360 cmd.exe 3028 cmd.exe 3028 cmd.exe 2560 cmd.exe 2560 cmd.exe 2544 cmd.exe 2544 cmd.exe 2492 cmd.exe 2492 cmd.exe 1524 cmd.exe 1524 cmd.exe 924 cmd.exe 924 cmd.exe 1956 cmd.exe 1956 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\net.net 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\net.net 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 61 IoCs
pid Process 560 PING.EXE 2884 PING.EXE 2560 PING.EXE 1716 PING.EXE 1496 PING.EXE 2840 PING.EXE 2684 PING.EXE 944 PING.EXE 468 PING.EXE 2840 PING.EXE 1088 PING.EXE 3056 PING.EXE 1748 PING.EXE 2852 PING.EXE 468 PING.EXE 1808 PING.EXE 1492 PING.EXE 2440 PING.EXE 2296 PING.EXE 2660 PING.EXE 2068 PING.EXE 1912 PING.EXE 2672 PING.EXE 2220 PING.EXE 2120 PING.EXE 3008 PING.EXE 2764 PING.EXE 612 PING.EXE 800 PING.EXE 2776 PING.EXE 876 PING.EXE 2900 PING.EXE 3020 PING.EXE 2736 PING.EXE 1888 PING.EXE 2044 PING.EXE 2816 PING.EXE 1856 PING.EXE 2780 PING.EXE 1292 PING.EXE 2532 PING.EXE 1484 PING.EXE 1868 PING.EXE 2968 PING.EXE 2576 PING.EXE 1936 PING.EXE 2012 PING.EXE 2116 PING.EXE 2096 PING.EXE 608 PING.EXE 2004 PING.EXE 1928 PING.EXE 3056 PING.EXE 1512 PING.EXE 1652 PING.EXE 3068 PING.EXE 2928 PING.EXE 3064 PING.EXE 2464 PING.EXE 2276 PING.EXE 1612 PING.EXE -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 2640 net.net 2680 net.net 2992 net.net 2412 net.net 1076 net.net 1200 net.net 2476 net.net 1616 net.net 2208 net.net 1440 net.net 884 net.net 1600 net.net 3012 net.net 2792 net.net 1324 net.net 2572 net.net 2336 net.net 2092 net.net 2920 net.net 684 net.net 1560 net.net 3040 net.net 2896 net.net 2596 net.net 2036 net.net 2536 net.net 2680 net.net 2060 net.net 852 net.net 2760 net.net 2100 net.net 2396 net.net 2476 net.net 1572 net.net 1792 net.net 2188 net.net 1800 net.net 1636 net.net 2324 net.net 2796 net.net 1232 net.net 2564 net.net 2988 net.net 2836 net.net 2864 net.net 1852 net.net 1788 net.net 2268 net.net 2232 net.net 1176 net.net 2128 net.net 1012 net.net 1080 net.net 2600 net.net 836 net.net 2196 net.net 2700 net.net 2680 net.net 1528 net.net 2000 net.net -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 2640 net.net 2640 net.net 2640 net.net 2680 net.net 2680 net.net 2680 net.net 2992 net.net 2992 net.net 2992 net.net 2412 net.net 2412 net.net 2412 net.net 1076 net.net 1076 net.net 1076 net.net 1200 net.net 1200 net.net 1200 net.net 2476 net.net 2476 net.net 2476 net.net 1616 net.net 1616 net.net 1616 net.net 2208 net.net 2208 net.net 2208 net.net 1440 net.net 1440 net.net 1440 net.net 884 net.net 884 net.net 884 net.net 1600 net.net 1600 net.net 1600 net.net 3012 net.net 3012 net.net 3012 net.net 2792 net.net 2792 net.net 2792 net.net 1324 net.net 1324 net.net 1324 net.net 2572 net.net 2572 net.net 2572 net.net 2336 net.net 2336 net.net 2336 net.net 2092 net.net 2092 net.net 2092 net.net 2920 net.net 2920 net.net 2920 net.net 684 net.net 684 net.net 684 net.net 1560 net.net -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3012 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 31 PID 1876 wrote to memory of 3012 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 31 PID 1876 wrote to memory of 3012 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 31 PID 1876 wrote to memory of 3012 1876 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 31 PID 3012 wrote to memory of 3056 3012 cmd.exe 33 PID 3012 wrote to memory of 3056 3012 cmd.exe 33 PID 3012 wrote to memory of 3056 3012 cmd.exe 33 PID 3012 wrote to memory of 3056 3012 cmd.exe 33 PID 3012 wrote to memory of 2672 3012 cmd.exe 34 PID 3012 wrote to memory of 2672 3012 cmd.exe 34 PID 3012 wrote to memory of 2672 3012 cmd.exe 34 PID 3012 wrote to memory of 2672 3012 cmd.exe 34 PID 2672 wrote to memory of 2640 2672 cmd.exe 35 PID 2672 wrote to memory of 2640 2672 cmd.exe 35 PID 2672 wrote to memory of 2640 2672 cmd.exe 35 PID 2672 wrote to memory of 2640 2672 cmd.exe 35 PID 2640 wrote to memory of 3064 2640 net.net 36 PID 2640 wrote to memory of 3064 2640 net.net 36 PID 2640 wrote to memory of 3064 2640 net.net 36 PID 2640 wrote to memory of 3064 2640 net.net 36 PID 3064 wrote to memory of 2840 3064 cmd.exe 38 PID 3064 wrote to memory of 2840 3064 cmd.exe 38 PID 3064 wrote to memory of 2840 3064 cmd.exe 38 PID 3064 wrote to memory of 2840 3064 cmd.exe 38 PID 3064 wrote to memory of 568 3064 cmd.exe 39 PID 3064 wrote to memory of 568 3064 cmd.exe 39 PID 3064 wrote to memory of 568 3064 cmd.exe 39 PID 3064 wrote to memory of 568 3064 cmd.exe 39 PID 568 wrote to memory of 2680 568 cmd.exe 40 PID 568 wrote to memory of 2680 568 cmd.exe 40 PID 568 wrote to memory of 2680 568 cmd.exe 40 PID 568 wrote to memory of 2680 568 cmd.exe 40 PID 2680 wrote to memory of 2532 2680 net.net 41 PID 2680 wrote to memory of 2532 2680 net.net 41 PID 2680 wrote to memory of 2532 2680 net.net 41 PID 2680 wrote to memory of 2532 2680 net.net 41 PID 2532 wrote to memory of 560 2532 cmd.exe 43 PID 2532 wrote to memory of 560 2532 cmd.exe 43 PID 2532 wrote to memory of 560 2532 cmd.exe 43 PID 2532 wrote to memory of 560 2532 cmd.exe 43 PID 2532 wrote to memory of 2984 2532 cmd.exe 44 PID 2532 wrote to memory of 2984 2532 cmd.exe 44 PID 2532 wrote to memory of 2984 2532 cmd.exe 44 PID 2532 wrote to memory of 2984 2532 cmd.exe 44 PID 2984 wrote to memory of 2992 2984 cmd.exe 45 PID 2984 wrote to memory of 2992 2984 cmd.exe 45 PID 2984 wrote to memory of 2992 2984 cmd.exe 45 PID 2984 wrote to memory of 2992 2984 cmd.exe 45 PID 2992 wrote to memory of 2496 2992 net.net 46 PID 2992 wrote to memory of 2496 2992 net.net 46 PID 2992 wrote to memory of 2496 2992 net.net 46 PID 2992 wrote to memory of 2496 2992 net.net 46 PID 2496 wrote to memory of 2764 2496 cmd.exe 48 PID 2496 wrote to memory of 2764 2496 cmd.exe 48 PID 2496 wrote to memory of 2764 2496 cmd.exe 48 PID 2496 wrote to memory of 2764 2496 cmd.exe 48 PID 2496 wrote to memory of 1848 2496 cmd.exe 49 PID 2496 wrote to memory of 1848 2496 cmd.exe 49 PID 2496 wrote to memory of 1848 2496 cmd.exe 49 PID 2496 wrote to memory of 1848 2496 cmd.exe 49 PID 1848 wrote to memory of 2412 1848 cmd.exe 50 PID 1848 wrote to memory of 2412 1848 cmd.exe 50 PID 1848 wrote to memory of 2412 1848 cmd.exe 50 PID 1848 wrote to memory of 2412 1848 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:3056
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL5⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 36⤵
- Runs ping.exe
PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL8⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 39⤵
- Runs ping.exe
PID:560
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"9⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"10⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL11⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 312⤵
- Runs ping.exe
PID:2764
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"13⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL14⤵PID:2824
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 315⤵
- Runs ping.exe
PID:1652
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"15⤵
- Loads dropped DLL
PID:2760 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"16⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL17⤵PID:1788
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 318⤵
- Runs ping.exe
PID:1748
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"18⤵
- Loads dropped DLL
PID:2612 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"19⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL20⤵PID:1888
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 321⤵
- Runs ping.exe
PID:2044
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"21⤵
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"22⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL23⤵PID:2968
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 324⤵
- Runs ping.exe
PID:2852
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"24⤵
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"25⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL26⤵PID:864
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 327⤵
- Runs ping.exe
PID:608
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"27⤵
- Loads dropped DLL
PID:2368 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"28⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL29⤵PID:1716
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 330⤵
- Runs ping.exe
PID:612
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"30⤵
- Loads dropped DLL
PID:2236 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"31⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL32⤵PID:2112
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 333⤵
- Runs ping.exe
PID:2004
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"33⤵
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"34⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL35⤵PID:1444
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 336⤵
- Runs ping.exe
PID:2220
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"36⤵
- Loads dropped DLL
PID:1576 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"37⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL38⤵PID:2876
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 339⤵
- Runs ping.exe
PID:2660
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"39⤵
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"40⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL41⤵PID:2620
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 342⤵
- Runs ping.exe
PID:3020
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"42⤵
- Loads dropped DLL
PID:2652 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"43⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL44⤵PID:2636
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 345⤵
- Runs ping.exe
PID:2684
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"45⤵
- Loads dropped DLL
PID:560 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"46⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL47⤵PID:1856
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 348⤵
- Runs ping.exe
PID:1484
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"48⤵
- Loads dropped DLL
PID:2776 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"49⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL50⤵PID:2256
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 351⤵
- Runs ping.exe
PID:468
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"51⤵
- Loads dropped DLL
PID:2584 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"52⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL53⤵PID:2692
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 354⤵
- Runs ping.exe
PID:944
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"54⤵
- Loads dropped DLL
PID:1172 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"55⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL56⤵PID:2152
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 357⤵
- Runs ping.exe
PID:2068
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"57⤵
- Loads dropped DLL
PID:2108 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"58⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL59⤵PID:1168
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 360⤵
- Runs ping.exe
PID:800
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"60⤵
- Loads dropped DLL
PID:1296 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"61⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL62⤵PID:668
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 363⤵
- Runs ping.exe
PID:1808
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"63⤵
- Loads dropped DLL
PID:980 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"64⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL65⤵PID:1536
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 366⤵
- Runs ping.exe
PID:3068
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"66⤵
- Loads dropped DLL
PID:1976 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"67⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL68⤵PID:952
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 369⤵
- Runs ping.exe
PID:2464
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"69⤵
- Loads dropped DLL
PID:1744 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"70⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL71⤵PID:1896
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 372⤵
- Runs ping.exe
PID:1868
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"72⤵
- Loads dropped DLL
PID:884 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"73⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL74⤵PID:1576
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 375⤵
- Runs ping.exe
PID:2816
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"75⤵
- Loads dropped DLL
PID:2360 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"76⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL77⤵PID:2660
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 378⤵
- Runs ping.exe
PID:2780
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"78⤵
- Loads dropped DLL
PID:3028 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"79⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL80⤵PID:2856
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 381⤵
- Runs ping.exe
PID:2276
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"81⤵
- Loads dropped DLL
PID:2560 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"82⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL83⤵PID:2376
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 384⤵
- Runs ping.exe
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"84⤵
- Loads dropped DLL
PID:2544 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"85⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL86⤵PID:2836
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 387⤵
- Runs ping.exe
PID:2776
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"87⤵
- Loads dropped DLL
PID:2492 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"88⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL89⤵PID:2864
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 390⤵
- Runs ping.exe
PID:468
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"90⤵
- Loads dropped DLL
PID:1524 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"91⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL92⤵PID:2336
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 393⤵
- Runs ping.exe
PID:1612
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"93⤵
- Loads dropped DLL
PID:924 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"94⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL95⤵PID:2136
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 396⤵
- Runs ping.exe
PID:2928
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"96⤵
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"97⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL98⤵PID:2268
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 399⤵
- Runs ping.exe
PID:1888
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"99⤵PID:2868
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"100⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL101⤵PID:1168
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3102⤵
- Runs ping.exe
PID:2968
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"102⤵PID:2696
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"103⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL104⤵PID:556
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3105⤵
- Runs ping.exe
PID:1492
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"105⤵PID:1376
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"106⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL107⤵PID:2924
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3108⤵
- Runs ping.exe
PID:2884
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"108⤵PID:1972
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"109⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL110⤵PID:2944
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3111⤵
- Runs ping.exe
PID:1716
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"111⤵PID:1644
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"112⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL113⤵PID:1696
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3114⤵
- Runs ping.exe
PID:1928
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"114⤵PID:3044
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"115⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL116⤵PID:2260
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3117⤵
- Runs ping.exe
PID:2440
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"117⤵PID:2144
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"118⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL119⤵PID:836
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3120⤵
- Runs ping.exe
PID:3056
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"120⤵PID:2892
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"121⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL122⤵PID:2660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-