File name: | Unhide Files.bat |
Full analysis: | https://app.any.run/tasks/423105c4-a392-4375-a8b5-a96769b07987 |
Verdict: | Malicious activity |
Analysis date: | November 16, 2019, 20:46:40 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/octet-stream |
File info: | data |
MD5: | ED321251DC3B4F175E68BE78E694474D |
SHA1: | 9E72DA35F476589E57754A6768E9914D7717F2E0 |
SHA256: | F335F7098DE9B44F3849B8ADA84FCCA1AC09ED00F8936D60CB3CF8D085EEA2E5 |
SSDEEP: | 12288:wnVHDWx5jouKbs3wPDdI3N4Pgq9vJvSuuqngHAJ:wnc/YsgrgN45 |
.bib/bibtex/txt | | | BibTeX references (100) |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2148 | cmd /c ""C:\Users\admin\AppData\Local\Temp\Unhide Files.bat" " | C:\Windows\system32\cmd.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
4064 | "C:\Users\admin\AppData\Local\Temp\rlgms24838\eng.exe" "C:\Users\admin\AppData\Local\Temp\rlgms24838\sk.js" | C:\Users\admin\AppData\Local\Temp\rlgms24838\eng.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
2884 | attrib * -s /d | C:\Windows\system32\attrib.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2368 | attrib * -h /d | C:\Windows\system32\attrib.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3036 | attrib * -h -s /d | C:\Windows\system32\attrib.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
236 | C:\Windows\system32\cmd.exe /c REG QUERY HKCU\SOFTWARE\bt | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3180 | REG QUERY HKCU\SOFTWARE\bt | C:\Windows\system32\reg.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2280 | ping 127.0.0.1 -n 2 | C:\Windows\system32\PING.EXE | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3892 | "C:\Users\admin\AppData\Local\Temp\rlgms24838\rf.exe" rlc | C:\Users\admin\AppData\Local\Temp\rlgms24838\rf.exe | eng.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 1.0.0.0 | ||||
2644 | "C:\Windows\system32\cmd.exe" /c cacls n:\sefera\Jnt\null\..\.. /g everyone:f /e /t | C:\Windows\system32\cmd.exe | — | rf.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 3 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
(PID) Process: | (4064) eng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (4064) eng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (3892) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (3892) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (3892) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Microsoft |
Operation: | write | Name: | STR |
Value: C|sovoyyboq|uibewyio|svcnost|svcnosts | |||
(PID) Process: | (3892) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Explorers |
Value: C:\Windows\explorer.exe /root c:\windows\system32\rundll32.exe ..\windows\system32\user32.dll.ShellExecute(%s), C:\System_VoIume_lnformation\Jnt\uibewyio\bmz\explorer.exe, 0xff3leca | |||
(PID) Process: | (3892) rf.exe | Key: | HKEY_CLASSES_ROOT\.exe |
Operation: | write | Name: | |
Value: exefiles | |||
(PID) Process: | (3892) rf.exe | Key: | HKEY_CLASSES_ROOT\exefiles\shell\open\command |
Operation: | write | Name: | |
Value: "C:\System_VoIume_lnformation\Jnt\uibewyio\explorers.exe" rts "%1" | |||
(PID) Process: | — | Key: | HKEY_CURRENT_USER\Software\bt |
Operation: | write | Name: | gp |
Value: 20:4 | |||
(PID) Process: | (3892) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Microsoft |
Operation: | write | Name: | SLK |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4064 | eng.exe | C:\Users\admin\AppData\Local\Temp\rlgms24838\rf.exe | executable | |
MD5:43935A2B61416385736FDF2D0D4BDFCC | SHA256:C5F21CBEAA15988A6E0887A1FD3B652DA9E8FFECC60D207E9513930CFF2CD965 | |||
3892 | rf.exe | C:\System_VoIume_lnformation\Jnt\uibewyio\explorers.exe | executable | |
MD5:C94D686FB13A835355299C992EE8E594 | SHA256:BEEF68C9C19D5E0A2A7EBEB97C10373EEAA88F87741573B9D1027F523C98076E | |||
3892 | rf.exe | C:\sefera\Jnt\sovoyyboq\svcnosts.exe | executable | |
MD5:C94D686FB13A835355299C992EE8E594 | SHA256:BEEF68C9C19D5E0A2A7EBEB97C10373EEAA88F87741573B9D1027F523C98076E | |||
3892 | rf.exe | C:\sefera\Jnt\sovoyyboq\gotera.bmp | binary | |
MD5:CAC17D4A6C7489D29F523FB4D9A7EA25 | SHA256:AC1D3CDA8A70C5FFDAA00C5B770BDA2660569B3B270F9775337C8E8C9B3BFE5B | |||
2148 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms24838\unrf.dll | bib | |
MD5:ED321251DC3B4F175E68BE78E694474D | SHA256:F335F7098DE9B44F3849B8ADA84FCCA1AC09ED00F8936D60CB3CF8D085EEA2E5 | |||
3892 | rf.exe | C:\sefera\Jnt\sovoyyboq\svcnost.exe | executable | |
MD5:C94D686FB13A835355299C992EE8E594 | SHA256:BEEF68C9C19D5E0A2A7EBEB97C10373EEAA88F87741573B9D1027F523C98076E | |||
3892 | rf.exe | C:\System_VoIume_lnformation\Jnt\uibewyio\gotera.bmp | binary | |
MD5:CAC17D4A6C7489D29F523FB4D9A7EA25 | SHA256:AC1D3CDA8A70C5FFDAA00C5B770BDA2660569B3B270F9775337C8E8C9B3BFE5B | |||
3892 | rf.exe | C:\System_VoIume_lnformation\Jnt\uibewyio\bmz\explorer.exe | executable | |
MD5:AD7B9C14083B52BC532FBA5948342B98 | SHA256:17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE | |||
3892 | rf.exe | C:\sefera\desktop.ini | ini | |
MD5:ADC4B5D4444D26293DC782B6238CA6F0 | SHA256:ABE8A5933FF450A89B8E9A736F08874B43B7355D17FFE6540C4A6EAD0F0995D3 | |||
2148 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms24838\sk.js | text | |
MD5:3ABAFFE780DACFD3C83A6D79D3456CD1 | SHA256:1D16BCFDCC3ACBD37D4E39E07DF2FA6F496FB4B9998D6F1D83C5E076860AFC6B |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4016 | svcnost.exe | 151.101.1.195:443 | clear-march.firebaseapp.com | Fastly | US | malicious |
Domain | IP | Reputation |
---|---|---|
clear-march.firebaseapp.com |
| malicious |