Automated Malware Analysis Report for X64.Exe

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for X64.Exe ID: 310318 Sample Name: x64.exe Cookbook: default.jbs Time: 12:39:09 Date: 06/11/2020 Version: 31.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report x64.exe 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Memory Dumps 4 Sigma Overview 5 System Summary: 5 Signature Overview 5 System Summary: 5 Boot Survival: 5 Mitre Att&ck Matrix 6 Behavior Graph 6 Screenshots 7 Thumbnails 7 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 8 Domains 8 URLs 8 Domains and IPs 8 Contacted Domains 8 URLs from Memory and Binaries 8 Contacted IPs 9 General Information 9 Simulations 10 Behavior and APIs 10 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Created / dropped Files 10 Static File Info 12 General 12 File Icon 12 Static PE Info 12 General 12 Entrypoint Preview 12 Data Directories 14 Sections 14 Imports 14 Network Behavior 15 Code Manipulations 15 Statistics 15 Behavior 15 System Behavior 15 Analysis Process: x64.exe PID: 6720 Parent PID: 5692 15 Copyright null 2020 Page 2 of 27 General 15 File Activities 16 File Written 16 File Read 17 Analysis Process: conhost.exe PID: 6736 Parent PID: 6720 17 General 17 Analysis Process: cmd.exe PID: 6788 Parent PID: 6720 17 General 17 File Activities 17 Analysis Process: whoami.exe PID: 6812 Parent PID: 6788 17 General 18 File Activities 18 Analysis Process: cmd.exe PID: 6840 Parent PID: 6720 18 General 18 File Activities 18 Analysis Process: powershell.exe PID: 6852 Parent PID: 6840 18 General 18 File Activities 19 File Created 19 File Deleted 20 File Written 20 File Read 21 Analysis Process: cmd.exe PID: 5848 Parent PID: 6720 26 General 26 File Activities 26 Analysis Process: whoami.exe PID: 5460 Parent PID: 5848 26 General 26 File Activities 26 Analysis Process: findstr.exe PID: 6228 Parent PID: 5848 26 General 26 File Activities 27 File Read 27 Disassembly 27 Code Analysis 27 Copyright null 2020 Page 3 of 27 Analysis Report x64.exe Overview General Information Detection Signatures Classification Sample x64.exe Name: SSiiiggmaa ddeettteeccttteedd::: Whhooaamiii EExxeeccuutttiiioonn Analysis ID: 310318 USUsisgeemss a ww dhheootaaemctiiei ccdoo: mWmhaoanandmd llilii inEneex etttoocouolltl ittotoon qq… MD5: 5daea8be23ce52… CUCosonentsttaa wiiinnhsso fffauumnncci tttciiioonnmaamllliiitttyay n tttodo oloipnpeen nt o aao plp toorrr tttq… SHA1: ba0b53de1b9e9d… Ransomware CCoonntttaaiiinnss llflouonngcg t sisollleneeaeplpistsy ( ((t>>o== o 33p emniii nna))) port Miner Spreading SHA256: a0ff195e6d1d602… CCroreenaattateeinss s aa l oppnrrogoc cseelsesses piinns ss(u>us=sp p3ee nmnddiened)d moo CCrrreeaattteess aa pprrroocceessss iiinn ssuussppeennddeedd moo… mmaallliiiccciiioouusss Most interesting Screenshot: malicious Evader Phishing sssuusssppiiiccciiioouusss DCDereettteaectcettteesd da p ppoortttoeecnnetttiisiaaslll cicnrrry yspputttoso p fffueunncdcttetiiiodon nmo suspicious cccllleeaann clean EDEnenataebbcllleteessd dd peeobbtuueggn tppiarrriiliv vciiillrleeyggpeetoss function Exploiter Banker FEFonouaunbndlde asa hdhieiiggbhhu ngnu upmribvbeielerrr g ooefff s Wiiinnddooww /// UUss… FFoouunndd iiainn llhliiinnigeehdd nnuoompp biiinnessrtt trroruufc cWtttiiiooinndsso (((wllliiikk /ee Ulllyys… Spyware Trojan / Bot Adware FFoouunndd llilanarrlriggnee daa mnoopuu nninttt s ootfrff u nncootnino---neesxx ee(clcikuuettteelydd… Score: 48 Range: 0 - 100 FFoouunndd plpaoortgtteeenn ttatiiiamalll ossutttrrrniiinnt ggo fdd neeoccrnrryy-pepttxtiiioeoncn u /// t aea…d Whitelisted: false MFoaauyyn ssdllle epeeoppt e (((neetvviaalss siiivvterei n lllogoo odppessc))) r tyttoop hthioiiinnndd e/e rarr … Confidence: 100% QMuaueyerr risiieeless e ttthphe e( e vvvooalllusumivee liiionnofffooprrrsm) aatotttiii oohnnin (((dnneaarm … SQSaaumerppielllees eethxxee ccvuuotttliiiuoomnn esst ttoionppfoss r wmwhhaiiitllleieo npp rrr(oonccaeem… USUsasemessp clceoo dedexe e oocbbufffutuiosscnca astttitiioonpn s ttte ewcchhinnleiiiqq puureeossc e(((… Startup YUYasarreraas ssciiigogndnaeat ttuourbrreefu mscaaatttctcihohn techniques ( Yara signature match System is w10x64 x64.exe (PID: 6720 cmdline: 'C:\Users\user\Desktop\x64.exe' MD5: 5DAEA8BE23CE520DBCCE5A346E87DE35) conhost.exe (PID: 6736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) cmd.exe (PID: 6788 cmdline: C:\Windows\system32\cmd.exe /c whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F) whoami.exe (PID: 6812 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701) cmd.exe (PID: 6840 cmdline: C:\Windows\system32\cmd.exe /c powershell.exe 'Get-ExecutionPolicy ;stop-process -Id $PID' ;exit MD5: 4E2ACF4F8A396486AB4268C94A6A245F) powershell.exe (PID: 6852 cmdline: powershell.exe 'Get-ExecutionPolicy ;stop-process -Id $PID' ;exit MD5: 95000560239032BC68B4C2FDFCDEF913) cmd.exe (PID: 5848 cmdline: C:\Windows\system32\cmd.exe /c whoami /priv |findstr 'SeImpersonatePrivilege seAssignPrimaryPrivilege SeDebugPrivilege SeLoadDrive rPrivilege SeTcbPrivilege SeBackupPrivilege SeRestorePrivilege SeCreateTokenPrivilege SeTakeOwnershipPrivilege ' MD5: 4E2ACF4F8A396486AB4268C94A6A245F) whoami.exe (PID: 5460 cmdline: whoami /priv MD5: AA18BE1AD24DE09417C1A7459F5C1701) findstr.exe (PID: 6228 cmdline: findstr 'SeImpersonatePrivilege seAssignPrimaryPrivilege SeDebugPrivilege SeLoadDriverPrivilege SeTcbPrivilege SeBackupPrivilege S eRestorePrivilege SeCreateTokenPrivilege SeTakeOwnershipPrivilege ' MD5: BCC8F29B929DABF5489C9BE6587FF66D) cleanup Malware Configuration No configs have been found Yara Overview Memory Dumps Source Rule Description Author Strings 00000000.00000002.276626953.00000001000C Recon_Commands_Windo Detects a set of Florian Roth 0x1098:$s1: netstat -an E000.00000002.00020000.sdmp ws_Gen1 reconnaissance 0x2310:$s3: net user commands on 0x1b10:$s4: whoami Windows systems 0x1ba0:$s4: whoami 0x2338:$s4: whoami 0x2df:$s6: systeminfo 0x14e8:$s6: systeminfo 0x1450:$s10: tasklist /svc Copyright null 2020 Page 4 of 27 Source Rule Description Author Strings 00000000.00000000.237038759.00000001000C Recon_Commands_Windo Detects a set of Florian Roth 0x1098:$s1: netstat -an E000.00000002.00020000.sdmp ws_Gen1 reconnaissance 0x2310:$s3: net user commands on 0x1b10:$s4: whoami Windows systems 0x1ba0:$s4: whoami 0x2338:$s4: whoami 0x2df:$s6: systeminfo 0x14e8:$s6: systeminfo 0x1450:$s10: tasklist /svc Process Memory Space: x64.exe PID: 6720 Recon_Commands_Windo Detects a set of Florian Roth 0xd7f:$s1: netstat -an ws_Gen1 reconnaissance 0x16e42:$s1: netstat -an commands on 0x62d08:$s1: netstat -an Windows systems 0x3c58:$s3: net user 0x1ae63:$s3: net user 0x64306:$s3: net user 0x4063:$s4: whoami 0xdd22:$s4: whoami 0xe63a:$s4: whoami 0x1949c:$s4: whoami 0x1965e:$s4: whoami 0x1b043:$s4: whoami 0x58b59:$s4: whoami 0x58c77:$s4: whoami 0x58d76:$s4: whoami 0x5ab33:$s4: whoami 0x5ac32:$s4: whoami 0x63929:$s4: whoami 0x639c4:$s4: whoami 0x6431c:$s4: whoami 0x905f2:$s4: whoami Sigma Overview System Summary: Sigma detected: Whoami Execution Signature Overview • Spreading • Software Vulnerabilities • Networking • System Summary • Data Obfuscation • Boot Survival • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection • Remote Access Functionality Click to jump to signature section System Summary: Boot Survival: Uses whoami command line tool to query computer and username Copyright null 2020 Page 5 of 27 Mitre Att&ck Matrix Initial Privilege Credential Lateral Command Network Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Valid Command Path Process Masquerading 1 OS System Time Remote Archive Exfiltration Encrypted Eavesdrop on Accounts and Scripting Interception Injection 1 1 Credential Discovery 1 Services Collected Over Other Channel 1 Insecure Interpreter 2 Dumping Data 1 Network Network Medium Communication Default Scheduled Boot or Boot or Logon Virtualization/Sandbox LSASS Security Software Remote Data from Exfiltration Ingress Tool Exploit SS7 to Accounts Task/Job Logon Initialization Evasion 2 Memory Discovery 1 Desktop Removable Over Transfer 1 Redirect Phone Initialization Scripts Protocol Media Bluetooth Calls/SMS Scripts Domain At (Linux) Logon Script Logon Script Process Security Virtualization/Sandbox SMB/Windows Data from Automated Steganography Exploit SS7 to Accounts (Windows) (Windows) Injection 1 1 Account Evasion 2 Admin Shares Network Exfiltration Track Device Manager Shared Location Drive Local At (Windows) Logon Script Logon Script Deobfuscate/Decode NTDS Process Discovery 1 Distributed Input Scheduled Protocol SIM Card Accounts (Mac) (Mac) Files or Information 1 Component Capture Transfer Impersonation Swap Object Model Cloud Cron Network Network Obfuscated Files or LSA Application Window SSH Keylogging Data Fallback Manipulate Accounts Logon Script Logon Script Information 3 Secrets Discovery 1 Transfer Channels Device Size Limits Communication Replication Launchd Rc.common Rc.common Steganography Cached File and Directory VNC GUI Input Exfiltration Multiband Jamming or Through Domain Discovery 1 Capture Over C2 Communication Denial of Removable Credentials Channel Service Media External Scheduled Startup Startup Items Compile After DCSync System Information Windows Web Portal Exfiltration Commonly Rogue Wi-Fi
Recommended publications
  • User's Guide • Oracle Enterprise Manager Licensing Information User Manual 2.9.2 Integrating Compliance Check Results with Third-Party Tool
    Autonomous Health Framework User’s Guide 21c F31833-01 November 2020 Autonomous Health Framework User’s Guide, 21c F31833-01 Copyright © 2016, 2020, Oracle and/or its affiliates. Primary Authors: Nirmal Kumar, Janet Stern Contributing Authors: Richard Strohm, Mark Bauer, Douglas Williams, Aparna Kamath, Subhash Chandra Contributors: Girdhari Ghantiyala, Gareth Chapman, Robert Caldwell, Vern Wagman, Mark Scardina, Ankita Khandelwal, Girish Adiga, Walter Battistella, Jesus Guillermo Munoz Nunez, Sahil Kumar, Daniel Semler, Carol Colrain This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations.
    [Show full text]
  • List Drive Using Cmd
    List drive using cmd click here to download You can display or list drives in CMD / Command Prompt or PowerShell, using wmic, diskpart, fsutil, psdrive command line, in Windows 10 / 8. The command that erases the drive during this process is "Clean". In this article " Clean" From the diskpart prompt, type list disk and press Enter. Shows the. If you want to use it in a script, then wrap it in for /f with the skip=1 . that whenever typed will run the given command and list all volume letters. How to create a partition from Command Prompt. First of all, open the To view the available disks on your system, use the command list disk. Diskpart is a separate suite of commands that runs in the command window in a particular disk, partition, or volume it must first be selected with the "list disk". You can manually assign permanent drive letters in Windows Type the following command to list all the volumes on your computer and. How does one get a list of the drives connected from the command line? For instance, sometimes I need to run chkdsk on a hdd, so I pop the. See drives in MS-DOS and the Windows command to list all available drives on the computer through. We can run the below command from windows command prompt to get the list of local drives. wmic logicaldisk get description,name | findstr /C:”Local” We can. Diskpart assign and remove drive letter with its syntax in the command prompt. There are And you can type list volume to see the details.
    [Show full text]
  • WINDOWS POWERSHELL LOGGING CHEAT SHEET - Win 7/Win 2008 Or Later
    WINDOWS POWERSHELL LOGGING CHEAT SHEET - Win 7/Win 2008 or later This “Windows PowerShell Logging Cheat Sheet” is intended to help you get started setting up basic and necessary PowerShell (Windows Management Framework) command and command line logging. This list includes some very common items that should be enabled, configured, gathered and harvested for any Log Management program. Start with these settings and add to it as you understand better what is in your logs and what you need. DEFINITIONS:: ENABLE: Things you must do to enable logging to start collecting and keeping events. CONFIGURE: Configuration that is needed to refine what events you will collect. GATHER: Tools/Utilities that you can use locally on the system to set or gather log related information – AuditPol, WEvtUtil, Find, etc. HARVEST : Events that you would want to harvest into some centralized Event log management solution like syslog, SIEM, Splunk, etc. RESOURCES: Places to get information on PowerShell Logging PS 2,3,4 Command Line Logging - http://technet.microsoft.com/en-us/library/hh847796.aspx PowerShell Transcript information - https://technet.microsoft.com/en-us/library/hh849687.aspx PS 4 - https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.html PS 4 & 5 - https://blogs.msdn.microsoft.com/powershell/2015/06/09/powershell-the-blue-team - KEY for PS 5 https://www.blackhat.com/docs/us-14/materials/us-14-Kazanciyan-Investigating-Powershell-Attacks-WP.pdf http://learn-powershell.net/2014/08/26/more-new-stuff-in-powershell-v5-extra-powershell-auditing http://www.redblue.team/2016/01/powershell-traceless-threat-and-how- to.html?showComment=1464099315089#c3589963557794199352 https://www.carbonblack.com/wp-content/uploads/2016/04/Cb-Powershell-Deep-Dive-A-United-Threat-Research-Report-1.pdf INFORMATION:: 1.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Hacking Exposed: Melting Down Memory
    #RSAC SESSION ID: EXP=W04 HACKING EXPOSED: MELTING DOWN MEMORY George Kurtz Dmitri Alperovitch Elia Zaitsev Co-Founder & President/CEO Co-Founder & CTO Director CrowdStrike Inc. CrowdStrike Inc. Solutions Architecture @George_Kurtz @DAlperovitch CrowdStrike Inc. #RSAC THE HACKING EXPOSED OSCARS ARE BACK #RSAC THE NOMINEES FOR BEST TECHNIQUES ARE… #RSAC CATEGORY: CREDENTIAL THEFT DELIVERY: STRATEGIC WEB COMPROMISE USING SMB TECHNICAL BREAKDOWN #RSAC Variations of remote source Javascript + Dean Edwards Packer obfuscation Tiny image Hidden in JQuery related Javascript files #RSAC DEMO 6 REAL WORLD EXAMPLES #RSAC - Massive BERSERK BEAR credential harvesting campaign - Targeted numerous sectors — Chemical – Sept 2017 — Financial – Sept 2017 — Hospitality – Sept 2017 — Oil & Gas – April 2017 — Technology – April 2017 — Engineering – April 2017 — Education – April 2017 REAL WORLD EXAMPLES #RSAC Another variation used spear-phishing emails. Word Docs contain code that attempts to retrieve doc template from remote source over WebDAV 8 REAL WORLD EXAMPLES #RSAC - Post Harvesting Activity - Offline hash cracking - Pass the hash tools - Public facing services most vulnerable - Webmail - VPN - Remote conferencing software COUNTERMEASURES #RSAC - Implement Two-Factor Authentication (2FA) - Restrict or monitor SMB connectivity to remote servers - Robust password policies (length/duration/reuse) - Restrict or monitor remote user authentication - Leverage threat intel to track known SMB C2s #RSAC CATEGORY: WHITELISTING BYPASS DELIVERY: INSTALLUTIL TECHNICAL
    [Show full text]
  • Monitoring Malicious Powershell Usage Through Log Analysis
    Monitoring malicious PowerShell usage through log analysis Jesper Magnusson Computer Science and Engineering, master's level 2019 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering (This page is intentionally left almost blank) Abstract Security has become a hot topic around the world but focuses more on the perime- ter than inside networks which opens up vulnerabilities. Directed cyber-attacks towards the energy sector which leverages this fact has increased and can have dis- astrous effect, even on national level. To counter this, a solution to monitor the usage of the most powerful and popular built-in tool among attackers - PowerShell - was implemented. A test-bed was set up reflecting a corporate network with two separate active directory domains, one for office clients and one for critical infrastructure. It was shown that attackers only needed to overtake the office active directory domain in order for gain easy access to the critical active directory domain. To simulate attacks of this type, a collection of malicious scripts was gathered from which a number of possible scenarios for taking over the office active directory domain via PowerShell was created. Windows has several options for logging executions of PowerShell commands on machines. The one used and deemed most beneficiary was "Module logging" with the addition of a filtered result of process creation logs. To monitor the logs created on the office client from PowerShell executions, a system based on the "ELK stack" was set up. This system gathered, processed, stored and visualized logs along with the result of their analysis. The system analyzed logs with the aid of a custom software called "ESPSA" which based on different parameters and contexts assigned every execution with a risk value indicating the level of maliciousness.
    [Show full text]
  • Batch Files and Scripts Why Should You Care?
    CS140M Fall 2014 Why Should You Care? • Many easy‐to‐use, helpful little programs Batch Files and Scripts • Psychological satisfaction of not being totally under Windows control • Not for everybody but programming can be fun By Al Lake • Make you better prepared to avoid viruses Fall 2014 LBCC CS140M Fall 2014 CS140M Lake 2 General Program Types Common Scripts • Compiled • Batch files – Written in some coding language and then converted to binary – An old format with new power in XP – Executable that interacts with OS directly • VBScript – Examples of languages are C and Java – Related to visual basic and VBA • • Interpreted JavaScript (also JScript) – Common on Internet – Text files that require an interface – Not related to Java • Much slower but easy to write and edit • Generically called “scripts” • Special files with REG extension – Specifically to edit Registry Fall 2014 CS140M Lake 3 Fall 2014 CS140M Lake 4 What are Scripts Used For? What is a Batch File? • Repetitive operations • A text file with extension BAT containing a – System administration sequence of commands – Automation of common tasks • Interpreter is command.com in DOS/Windows 9x/Me • To carry out a series of operations in one step – Commands are DOS plus some additions for • To help with file management variables and branching • To make Registry changes • Interpreter is cmd.exe in XP – Available commands are more versatile than DOS and are 32‐bit Fall 2014 CS140M Lake 5 Fall 2014 CS140M Lake 6 Lake 1 CS140M Fall 2014 Example of Batch File Del Example Deletes one or more files. DEL [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names • “Cleantmp.bat” ERASE [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names names Specifies a list of one or more files or directories.
    [Show full text]
  • Batch Find Text in File
    Batch Find Text In File Leftover and thespian Baron roar: which Derek is cropped enough? Normand altercating solidly? Unfit and twopenny Wit always subrogate healthily and undermined his housecraft. Batch to summit a particular crime in a txt file VideoHelp Forum. Create more Text in Batch File in TestStand National Instruments. Built-in text editor supporting drag drop clipboard operations undoredo etc Multi-line find and replacement fields Case insensitive ignore case another option. Findstr command for processing is fast word and confirm the command syntax have several pages in find text batch in file, but sets file! Count lines and words in it text file Batch recipes. Batch Text File Editor Free Download Replace insert delete. Search a semicolon delimited list of directories strings Text do be searched for drivepathfilename Specifies a file or files to search. Solved Batch script to plunge and strange a particular in text file. TextBatchConv was ConvertEncoding allows you to save or text file txt html etc with a. Ever had could find some point inside a bunch of upcoming text files If three're in those this issue did come up this often. Display all the program will be the extensions, detect unauthorized access and file in stored as windows command prompt and vista or applications that you can call will need. Search for Notepad and click the top result to gate the app Type anything following lines in flat text file to taint a batch file ECHO input ECHO. Any text in find a dialog walks you on windows rename is in batch find text file before swapping out a file contents of backslashes has.
    [Show full text]
  • An A-Z Index of the Windows CMD Command Line
    An A-Z Index of the Windows CMD command line aaADDUSERSADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ARP Address Resolution Protocol ASSOC Change file extension associations• ASSOCIAT One step file association AT Schedule a command to run at a specific time ATTRIB Change file attributes bb BCDBOOT Create or repair a system partition BCDEDIT Manage Boot Configuration Data BITSADMIN Background Intelligent Transfer Service BOOTCFG Edit Windows boot settings BROWSTAT Get domain, browser and PDC info cc CACLS Change file permissions CALL Call one batch program from another• CERTREQ Request certificate from a certification authority CERTUTIL Utility for certification authority (CA) files and services CD Change Directory - move to a specific Folder• CHANGE Change Terminal Server Session properties CHKDSK Check Disk - check and repair disk problems CHKNTFS Check the NTFS file system CHOICE Accept keyboard input to a batch file CIPHER Encrypt or Decrypt files/folders CleanMgr Automated cleanup of Temp files, recycle bin CLEARMEM Clear memory leaks CLIP Copy STDIN to the Windows clipboard CLS Clear the screen• CLUSTER Windows Clustering CMD Start a new CMD shell CMDKEY Manage stored usernames/passwords COLOR Change colors of the CMD window• COMP Compare the contents of two files or sets of files COMPACT Compress files or folders on an NTFS partition COMPRESS Compress individual files on an NTFS partition CON2PRT Connect or disconnect a Printer CONVERT Convert a FAT drive to NTFS COPY Copy one or more files
    [Show full text]
  • An A-Z Index of the Windows XP Command Line
    An A-Z Index of the Windows XP command line ADDUSERS Add or list users to/from a CSV file ARP Address Resolution Protocol ASSOC Change file extension associations• ASSOCIAT One step file association AT Schedule a command to run at a later time ATTRIB Change file attributes b BOOTCFG Edit Windows boot settings BROWSTAT Get domain, browser and PDC info c CACLS Change file permissions CALL Call one batch program from another• CD Change Directory - move to a specific Folder• CHANGE Change Terminal Server Session properties CHKDSK Check Disk - check and repair disk problems CHKNTFS Check the NTFS file system CHOICE Accept keyboard input to a batch file CIPHER Encrypt or Decrypt files/folders CleanMgr Automated cleanup of Temp files, recycle bin CLEARMEM Clear memory leaks CLIP Copy STDIN to the Windows clipboard. CLS Clear the screen• CLUSTER Windows Clustering CMD Start a new CMD shell COLOR Change colors of the CMD window• COMP Compare the contents of two files or sets of files COMPACT Compress files or folders on an NTFS partition COMPRESS Compress individual files on an NTFS partition CON2PRT Connect or disconnect a Printer CONVERT Convert a FAT drive to NTFS. COPY Copy one or more files to another location• CSCcmd Client-side caching (Offline Files) CSVDE Import or Export Active Directory data d DATE Display or set the date• Dcomcnfg DCOM Configuration Utility DEFRAG Defragment hard drive DEL Delete one or more files• DELPROF Delete NT user profiles DELTREE Delete a folder and all subfolders DevCon Device Manager Command Line Utility
    [Show full text]
  • A-Z List of Windows CMD Commands — Also Included CMD Commands Commands PDF PDF
    A-Z List Of Windows CMD Commands — Also Included CMD Com... https://techlog360.com/all-windows-cmd-commands/?preview_id=43... A-Z List Of Windows CMD Commands — Also Included CMD Commands Commands PDF PDF Sabarinath CMD Commands Function A addusers Used to add and list users in a CSV file admodcmd Used for bulk modifying contents in an active directory Address Resolution Protocol is used to map IP address to arp the hardware address assoc Used to change associations for file extensions associat One step file association at Run a command at a specific time atmadm Display connection info of the ATM adapter attrib Used to change file attributes B bcdboot Used to create and repair a system partition bcdedit Used to manage boot configuration data Used to manage the Background Intelligent Transfer bitsadmin Service bootcfg Used to edit boot configuration in Windows break Enable/Disable break capability (CTRL+C) in CMD C cacls Used to change permissions of files call Used one batch program to call another certreq Used to request a certificate from a certification authority certutil Manage Certification Authority files and services cd Used to change folder (directory) or go to a specific one change Used to change terminal services chcp Displays the number of active console code page chdir Same as cd command chkdsk Used to check and repair issues in the disk chkntfs Used to check the NTFS file system choice Accept user input (via keyboard) to a batch file cipher Used to encrypt/decrypt files and folder cleanmgr Used clean temp files and recycle
    [Show full text]
  • Detecting & Defeating the China Chopper Web Shell | Fireeye
    REPORT THE LITTLE MALWARE THAT COULD: Detecting and Defeating the China Chopper Web Shell FireEye Labs Authors: Tony Lee, Ian Ahl and Dennis Hanzlik SECURITY REIMAGINED The Little Malware That Could: Detecting and Defeating the China Chopper Web Shell CONTENTS Introduction ............................................................................................................................................................................................................................................................................................................................................... 3 Components ............................................................................................................................................................................................................................................................................................................................................... 3 Capabilities ................................................................................................................................................................................................................................................................................................................................................... 8 Payload Attributes ............................................................................................................................................................................................................................................................................................................
    [Show full text]