| File name: | Unhide Files.bat |
| Full analysis: | https://app.any.run/tasks/9048e73a-d904-44ff-8e06-85f4dad38fbb |
| Verdict: | Malicious activity |
| Analysis date: | November 16, 2019, 21:30:04 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | data |
| MD5: | ED321251DC3B4F175E68BE78E694474D |
| SHA1: | 9E72DA35F476589E57754A6768E9914D7717F2E0 |
| SHA256: | F335F7098DE9B44F3849B8ADA84FCCA1AC09ED00F8936D60CB3CF8D085EEA2E5 |
| SSDEEP: | 12288:wnVHDWx5jouKbs3wPDdI3N4Pgq9vJvSuuqngHAJ:wnc/YsgrgN45 |
| .bib/bibtex/txt | | | BibTeX references (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 496 | attrib C:\sefera\Jnt\juhoxa\..\.. +r +s +h | C:\Windows\system32\attrib.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 784 | "C:\Users\admin\AppData\Local\Temp\rlgms574\eng.exe" "C:\Users\admin\AppData\Local\Temp\rlgms574\sk.js" | C:\Users\admin\AppData\Local\Temp\rlgms574\eng.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 788 | "C:\Windows\system32\cmd.exe" /c cacls n:\sefera\Jnt\null\..\.. /g everyone:f /e /t | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 3 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 792 | attrib C:\sefera\Jnt\juhoxa\desktop.ini +s +h | C:\Windows\system32\attrib.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Attribute Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 928 | "C:\Windows\system32\cmd.exe" /c attrib C:\System_VoIume_lnformation\Jnt\serouuc\..\.. +r +s +h | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 996 | "C:\Windows\system32\cmd.exe" /c cacls C:\System_VoIume_lnformation\Jnt\serouuc\..\.. /d everyone /e | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1252 | "C:\Windows\system32\cmd.exe" /c cacls n:\sefera\Jnt\null\..\.. /g everyone:f /e /t | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 3 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1400 | "C:\Windows\system32\cmd.exe" /c cacls C:\sefera\Jnt\juhoxa\..\.. /d everyone /e | C:\Windows\system32\cmd.exe | — | rf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1532 | cacls n:\sefera\Jnt\null\..\.. /r administrators /e /t | C:\Windows\system32\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 3 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1560 | C:\Windows\system32\cmd.exe /c REG QUERY HKCU\SOFTWARE\bt | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (784) eng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (784) eng.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2232) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2232) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2064) reg.exe | Key: | HKEY_CURRENT_USER\Software\bt |
| Operation: | write | Name: | gp |
Value: 21:3 | |||
| (PID) Process: | (2232) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Microsoft |
| Operation: | write | Name: | STR |
Value: C|juhoxa|serouuc|svcnost|svcnosts | |||
| (PID) Process: | (2232) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Explorers |
Value: C:\Windows\explorer.exe /root c:\windows\system32\rundll32.exe ..\windows\system32\user32.dll.ShellExecute(%s), C:\System_VoIume_lnformation\Jnt\serouuc\bmz\explorer.exe, 0xff3leca | |||
| (PID) Process: | (2232) rf.exe | Key: | HKEY_CLASSES_ROOT\.exe |
| Operation: | write | Name: | |
Value: exefiles | |||
| (PID) Process: | (2232) rf.exe | Key: | HKEY_CLASSES_ROOT\exefiles\shell\open\command |
| Operation: | write | Name: | |
Value: "C:\System_VoIume_lnformation\Jnt\serouuc\explorers.exe" rts "%1" | |||
| (PID) Process: | (2232) rf.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Microsoft |
| Operation: | write | Name: | SLK |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2712 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms574\unrf.dll | bib | |
MD5:— | SHA256:— | |||
| 2232 | rf.exe | C:\sefera\Jnt\juhoxa\svcnosts.exe | executable | |
MD5:— | SHA256:— | |||
| 2232 | rf.exe | C:\System_VoIume_lnformation\Jnt\serouuc\gotera.bmp | binary | |
MD5:— | SHA256:— | |||
| 2232 | rf.exe | C:\sefera\Jnt\juhoxa\gotera.bmp | binary | |
MD5:— | SHA256:— | |||
| 784 | eng.exe | C:\Users\admin\AppData\Local\Temp\rlgms574\rf.exe | executable | |
MD5:— | SHA256:— | |||
| 2232 | rf.exe | C:\sefera\Jnt\juhoxa\svcnost.exe | executable | |
MD5:— | SHA256:— | |||
| 2232 | rf.exe | C:\System_VoIume_lnformation\Jnt\serouuc\explorers.exe | executable | |
MD5:— | SHA256:— | |||
| 2712 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms574\sk.js | text | |
MD5:3ABAFFE780DACFD3C83A6D79D3456CD1 | SHA256:1D16BCFDCC3ACBD37D4E39E07DF2FA6F496FB4B9998D6F1D83C5E076860AFC6B | |||
| 2712 | cmd.exe | C:\Users\admin\AppData\Local\Temp\rlgms574\eng.exe | executable | |
MD5:D1AB72DB2BEDD2F255D35DA3DA0D4B16 | SHA256:047F3C5A7AB0EA05F35B2CA8037BF62DD4228786D07707064DBD0D46569305D0 | |||
| 2232 | rf.exe | C:\System_VoIume_lnformation\Jnt\serouuc\bmz\explorer.exe | executable | |
MD5:AD7B9C14083B52BC532FBA5948342B98 | SHA256:17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3784 | svcnost.exe | 151.101.1.195:443 | clear-march.firebaseapp.com | Fastly | US | malicious |
Domain | IP | Reputation |
|---|---|---|
clear-march.firebaseapp.com |
| malicious |