Analysis
-
max time kernel
186s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe
Resource
win7-20221111-en
General
-
Target
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe
-
Size
1.1MB
-
MD5
44657060c3b9aa17540d648ceebbbb5d
-
SHA1
23701f8f47348d54cfacfe1c879122f4a267a198
-
SHA256
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18
-
SHA512
8d3eafc2ffb604899c1de8b597fb13885a34376e835daf698b0ac6c5be32263c8f4d8c1c29b75fa06a2cf196fe378b606d0222f21a853345b786bff480dbe967
-
SSDEEP
24576:Ltb20pkECqT5TBWgNQ7a5zSphZJQriY6A:I3g5tQ7a5z0hZSf5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe,explorer.exe" 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1172 schtasks.exe 2344 schtasks.exe 2384 schtasks.exe 696 schtasks.exe 2268 schtasks.exe 1548 schtasks.exe 1324 schtasks.exe 1940 schtasks.exe 268 schtasks.exe 1348 schtasks.exe 1520 schtasks.exe 1168 schtasks.exe 2144 schtasks.exe 2796 schtasks.exe 1140 schtasks.exe -
NTFS ADS 1 IoCs
Processes:
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe:Zone.Identifier:$DATA 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exepid process 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exepid process 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exepid process 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1300 wrote to memory of 1032 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe netsh.exe PID 1300 wrote to memory of 1032 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe netsh.exe PID 1300 wrote to memory of 1032 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe netsh.exe PID 1300 wrote to memory of 1032 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe netsh.exe PID 1300 wrote to memory of 596 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 596 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 596 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 596 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1140 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1140 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1140 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1140 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1592 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1592 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1592 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1592 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 696 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 696 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 696 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 696 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1592 wrote to memory of 1748 1592 cmd.exe at.exe PID 1592 wrote to memory of 1748 1592 cmd.exe at.exe PID 1592 wrote to memory of 1748 1592 cmd.exe at.exe PID 1592 wrote to memory of 1748 1592 cmd.exe at.exe PID 596 wrote to memory of 848 596 cmd.exe at.exe PID 596 wrote to memory of 848 596 cmd.exe at.exe PID 596 wrote to memory of 848 596 cmd.exe at.exe PID 596 wrote to memory of 848 596 cmd.exe at.exe PID 1300 wrote to memory of 964 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 964 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 964 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 964 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1940 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1940 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1940 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1940 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 964 wrote to memory of 1120 964 cmd.exe at.exe PID 964 wrote to memory of 1120 964 cmd.exe at.exe PID 964 wrote to memory of 1120 964 cmd.exe at.exe PID 964 wrote to memory of 1120 964 cmd.exe at.exe PID 1300 wrote to memory of 1828 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1828 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1828 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1828 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1548 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1548 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1548 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1548 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1828 wrote to memory of 1224 1828 cmd.exe at.exe PID 1828 wrote to memory of 1224 1828 cmd.exe at.exe PID 1828 wrote to memory of 1224 1828 cmd.exe at.exe PID 1828 wrote to memory of 1224 1828 cmd.exe at.exe PID 1300 wrote to memory of 840 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 840 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 840 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 840 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe cmd.exe PID 1300 wrote to memory of 1172 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1172 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1172 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 1300 wrote to memory of 1172 1300 28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe schtasks.exe PID 840 wrote to memory of 956 840 cmd.exe at.exe PID 840 wrote to memory of 956 840 cmd.exe at.exe PID 840 wrote to memory of 956 840 cmd.exe at.exe PID 840 wrote to memory of 956 840 cmd.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" ENABLE2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:17 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:18 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c AT \\127.0.0.1 19:19 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"2⤵
-
C:\Windows\SysWOW64\at.exeAT \\127.0.0.1 19:19 "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /tr "C:\Users\Admin\AppData\Local\Temp\28fd5eba31a5186480c31dc8938b3a4fe2678325ee5141fff3bc6bfd3226cf18.exe" /f2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-78-0x0000000000000000-mapping.dmp
-
memory/524-90-0x0000000000000000-mapping.dmp
-
memory/544-83-0x0000000000000000-mapping.dmp
-
memory/596-57-0x0000000000000000-mapping.dmp
-
memory/696-60-0x0000000000000000-mapping.dmp
-
memory/836-85-0x0000000000000000-mapping.dmp
-
memory/840-73-0x0000000000000000-mapping.dmp
-
memory/848-62-0x0000000000000000-mapping.dmp
-
memory/916-77-0x0000000000000000-mapping.dmp
-
memory/956-75-0x0000000000000000-mapping.dmp
-
memory/964-65-0x0000000000000000-mapping.dmp
-
memory/972-89-0x0000000000000000-mapping.dmp
-
memory/1032-55-0x0000000000000000-mapping.dmp
-
memory/1120-67-0x0000000000000000-mapping.dmp
-
memory/1140-58-0x0000000000000000-mapping.dmp
-
memory/1168-92-0x0000000000000000-mapping.dmp
-
memory/1172-74-0x0000000000000000-mapping.dmp
-
memory/1224-71-0x0000000000000000-mapping.dmp
-
memory/1300-54-0x0000000075C31000-0x0000000075C33000-memory.dmpFilesize
8KB
-
memory/1324-88-0x0000000000000000-mapping.dmp
-
memory/1348-82-0x0000000000000000-mapping.dmp
-
memory/1520-86-0x0000000000000000-mapping.dmp
-
memory/1548-70-0x0000000000000000-mapping.dmp
-
memory/1592-59-0x0000000000000000-mapping.dmp
-
memory/1616-81-0x0000000000000000-mapping.dmp
-
memory/1620-79-0x0000000000000000-mapping.dmp
-
memory/1748-61-0x0000000000000000-mapping.dmp
-
memory/1828-69-0x0000000000000000-mapping.dmp
-
memory/1892-87-0x0000000000000000-mapping.dmp
-
memory/1920-91-0x0000000000000000-mapping.dmp
-
memory/1940-66-0x0000000000000000-mapping.dmp
-
memory/2104-95-0x0000000000000000-mapping.dmp
-
memory/2132-97-0x0000000000000000-mapping.dmp
-
memory/2144-98-0x0000000000000000-mapping.dmp
-
memory/2192-99-0x0000000000000000-mapping.dmp
-
memory/2256-101-0x0000000000000000-mapping.dmp
-
memory/2268-102-0x0000000000000000-mapping.dmp
-
memory/2332-103-0x0000000000000000-mapping.dmp
-
memory/2344-104-0x0000000000000000-mapping.dmp
-
memory/2372-105-0x0000000000000000-mapping.dmp
-
memory/2384-106-0x0000000000000000-mapping.dmp
-
memory/2716-107-0x0000000000000000-mapping.dmp
-
memory/2760-108-0x0000000000000000-mapping.dmp
-
memory/2776-109-0x0000000000000000-mapping.dmp
-
memory/2796-110-0x0000000000000000-mapping.dmp
-
memory/2808-113-0x0000000000000000-mapping.dmp
-
memory/2864-114-0x0000000000000000-mapping.dmp