| File name: | Show Hidden Files.bat |
| Full analysis: | https://app.any.run/tasks/837030e7-50e8-4b7c-aeb5-88cd5064de03 |
| Verdict: | Malicious activity |
| Analysis date: | April 16, 2020, 06:33:42 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | data |
| MD5: | EB0E0C123D2EA9AF6487B8D695EB402F |
| SHA1: | 6730F38A2CC3AF5580532DE53EA1D08E89E88E48 |
| SHA256: | A5C4046BE14907415076E391BAFFCFBAFF7464C234359CEE3CA0A0C0B1C8F25A |
| SSDEEP: | 12288:JnzIGmqFaVrXRP5Qo1CaeFWO+N+P52WZUHcyEaK54W7i4ZP/XjI:JnzStVFPutfo5X |
| .bib/bibtex/txt | | | BibTeX references (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 620 | "C:\Windows\system32\cmd.exe" /c attrib C:\System_VoIume_lnformation\Jnt\yejoriv\..\.. +r +s +h | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 916 | cacls C:\System_VoIume_lnformation\Jnt\yejoriv\..\.. /d everyone /e | C:\Windows\system32\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 952 | "C:\Windows\system32\cmd.exe" /c attrib C:\sefera\Jnt\xuwueo\desktop.ini +s +h | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1064 | "C:\Windows\system32\cmd.exe" /c cacls n:\System_VoIume_lnformation\Jnt\null\..\.. /g everyone:f /e /t | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 3 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1092 | ping 127.0.0.1 -n 2 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1352 | cacls n:\System_VoIume_lnformation\Jnt\null\..\.. /g everyone:f /e /t | C:\Windows\system32\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 3 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1456 | "C:\Windows\system32\cmd.exe" /c cacls C:\System_VoIume_lnformation\Jnt\yejoriv\..\.. /d everyone /e | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1708 | "C:\Windows\system32\cmd.exe" /c cacls C:\System_VoIume_lnformation\Jnt\yejoriv\..\.. /d administrators /e | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1760 | "C:\Windows\system32\cmd.exe" /c attrib C:\sefera\Jnt\xuwueo\..\..\desktop.ini +s +h | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1840 | attrib C:\sefera\Jnt\xuwueo\desktop.ini +s +h | C:\Windows\system32\attrib.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3016) eng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3016) eng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2112) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2112) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3244) reg.exe | Key: | HKEY_CURRENT_USER\Software\bt |
| Operation: | write | Name: | gp |
Value: 7:3 | |||
| (PID) Process: | (2112) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Microsoft |
| Operation: | write | Name: | STR |
Value: C|xuwueo|yejoriv|svcnost|svcnosts | |||
| (PID) Process: | (2112) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Explorers |
Value: C:\Windows\explorer.exe /root c:\windows\system32\rundll32.exe ..\windows\system32\user32.dll.ShellExecute(%s), C:\System_VoIume_lnformation\Jnt\yejoriv\bmz\explorer.exe, 0xff3leca | |||
| (PID) Process: | (2112) rf.exe | Key: | HKEY_CLASSES_ROOT\.exe |
| Operation: | write | Name: | |
Value: exefiles | |||
| (PID) Process: | (2112) rf.exe | Key: | HKEY_CLASSES_ROOT\exefiles\shell\open\command |
| Operation: | write | Name: | |
Value: "C:\System_VoIume_lnformation\Jnt\yejoriv\explorers.exe" rts "%1" | |||
| (PID) Process: | (2112) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Microsoft |
| Operation: | write | Name: | SLK |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3340 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms14455\unrf.dll | bib | |
MD5:EB0E0C123D2EA9AF6487B8D695EB402F | SHA256:A5C4046BE14907415076E391BAFFCFBAFF7464C234359CEE3CA0A0C0B1C8F25A | |||
| 3340 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms14455\sk.js | text | |
MD5:3ABAFFE780DACFD3C83A6D79D3456CD1 | SHA256:1D16BCFDCC3ACBD37D4E39E07DF2FA6F496FB4B9998D6F1D83C5E076860AFC6B | |||
| 3016 | eng.exe | C:\Users\admin\AppData\Local\Temp\rlgms14455\rf.exe | executable | |
MD5:A6C776F57B289B97DDF353C32776A4AE | SHA256:686467F75A5C0A056ABA4614AA42E404FE9535D3DE98806AD8C059C582F55716 | |||
| 2112 | rf.exe | C:\sefera\Jnt\xuwueo\svcnosts.exe | executable | |
MD5:E1C8E6FA5477FC3C6459B70EC2C362E0 | SHA256:33AEDB26DBCAC8C27AD724A2583C93CDD5E2F1C8535444AB0DBAF0ECCAABD360 | |||
| 2112 | rf.exe | C:\System_VoIume_lnformation\Jnt\yejoriv\gotera.bmp | binary | |
MD5:F1A2D63899B87CEF381F57BB4D195F7C | SHA256:C0F305F40A1CCCCE836A9DC9F44368ABC4173D4A697709D3EC8C71AFDC30FCEA | |||
| 2112 | rf.exe | C:\sefera\Jnt\xuwueo\gotera.bmp | binary | |
MD5:F1A2D63899B87CEF381F57BB4D195F7C | SHA256:C0F305F40A1CCCCE836A9DC9F44368ABC4173D4A697709D3EC8C71AFDC30FCEA | |||
| 2112 | rf.exe | C:\sefera\desktop.ini | ini | |
MD5:ADC4B5D4444D26293DC782B6238CA6F0 | SHA256:ABE8A5933FF450A89B8E9A736F08874B43B7355D17FFE6540C4A6EAD0F0995D3 | |||
| 2112 | rf.exe | C:\sefera\Jnt\xuwueo\desktop.ini | ini | |
MD5:ADC4B5D4444D26293DC782B6238CA6F0 | SHA256:ABE8A5933FF450A89B8E9A736F08874B43B7355D17FFE6540C4A6EAD0F0995D3 | |||
| 2112 | rf.exe | C:\System_VoIume_lnformation\Jnt\yejoriv\bmz\explorer.exe | executable | |
MD5:AD7B9C14083B52BC532FBA5948342B98 | SHA256:17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE | |||
| 3340 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms14455\eng.exe | executable | |
MD5:D1AB72DB2BEDD2F255D35DA3DA0D4B16 | SHA256:047F3C5A7AB0EA05F35B2CA8037BF62DD4228786D07707064DBD0D46569305D0 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2716 | svcnost.exe | 151.101.1.195:443 | clear-march.firebaseapp.com | Fastly | US | malicious |
Domain | IP | Reputation |
|---|---|---|
clear-march.firebaseapp.com |
| malicious |