Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:45
Behavioral task
behavioral1
Sample
c6eb3335493cd2db4bc65f97a65763de.exe
Resource
win7-20231215-en
General
-
Target
c6eb3335493cd2db4bc65f97a65763de.exe
-
Size
2.6MB
-
MD5
c6eb3335493cd2db4bc65f97a65763de
-
SHA1
80e56b33edd1cfeb54b39efea554b7303ba9e128
-
SHA256
ada6ff0cbe7e8921bc185b7b7248e80ff9c5873a3cf881692b88efc6c0ec9c12
-
SHA512
dc39716c5c1217a5b17e7fb2631c1ab0e96191bf45508fe0c0def0673103c4d120c7540edbfb42f09a29ad73ed03ec6a79f02133683739cb84cc572d869f15c3
-
SSDEEP
49152:5xoFebsVpZYBAU7Ns1AbXwTKjAW9r3UCJWXrS8YaHfg:5xousVpZYv7qOsTKjn8XY8g
Malware Config
Signatures
-
Detect ZGRat V1 4 IoCs
resource yara_rule behavioral2/memory/4580-0-0x0000000000480000-0x0000000000720000-memory.dmp family_zgrat_v1 behavioral2/files/0x0006000000023212-62.dat family_zgrat_v1 behavioral2/files/0x000600000002320e-351.dat family_zgrat_v1 behavioral2/files/0x000600000002320e-350.dat family_zgrat_v1 -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5072 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4244 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4040 4888 schtasks.exe 92 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4192 4888 schtasks.exe 92 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation c6eb3335493cd2db4bc65f97a65763de.exe -
Executes dropped EXE 1 IoCs
pid Process 5444 TextInputHost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\fontdrvhost.exe c6eb3335493cd2db4bc65f97a65763de.exe File opened for modification C:\Program Files (x86)\Windows Defender\fontdrvhost.exe c6eb3335493cd2db4bc65f97a65763de.exe File created C:\Program Files (x86)\Windows NT\dwm.exe c6eb3335493cd2db4bc65f97a65763de.exe File created C:\Program Files\MSBuild\spoolsv.exe c6eb3335493cd2db4bc65f97a65763de.exe File created C:\Program Files\MSBuild\f3b6ecef712a24 c6eb3335493cd2db4bc65f97a65763de.exe File created C:\Program Files (x86)\Windows Defender\5b884080fd4f94 c6eb3335493cd2db4bc65f97a65763de.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\c6eb3335493cd2db4bc65f97a65763de.exe c6eb3335493cd2db4bc65f97a65763de.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\3633f7a51f98b1 c6eb3335493cd2db4bc65f97a65763de.exe File created C:\Program Files (x86)\Windows NT\6cb0b6c459d5d3 c6eb3335493cd2db4bc65f97a65763de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3236 schtasks.exe 5072 schtasks.exe 2812 schtasks.exe 4244 schtasks.exe 3612 schtasks.exe 4916 schtasks.exe 4040 schtasks.exe 2808 schtasks.exe 1868 schtasks.exe 5028 schtasks.exe 3676 schtasks.exe 2276 schtasks.exe 2608 schtasks.exe 2392 schtasks.exe 2388 schtasks.exe 2884 schtasks.exe 2960 schtasks.exe 4192 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings c6eb3335493cd2db4bc65f97a65763de.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1376 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe 4580 c6eb3335493cd2db4bc65f97a65763de.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 4580 c6eb3335493cd2db4bc65f97a65763de.exe Token: SeDebugPrivilege 1440 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 856 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 3320 powershell.exe Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 3704 powershell.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 3572 powershell.exe Token: SeDebugPrivilege 3436 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 5444 TextInputHost.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4868 4580 c6eb3335493cd2db4bc65f97a65763de.exe 135 PID 4580 wrote to memory of 4868 4580 c6eb3335493cd2db4bc65f97a65763de.exe 135 PID 4580 wrote to memory of 3436 4580 c6eb3335493cd2db4bc65f97a65763de.exe 134 PID 4580 wrote to memory of 3436 4580 c6eb3335493cd2db4bc65f97a65763de.exe 134 PID 4580 wrote to memory of 1384 4580 c6eb3335493cd2db4bc65f97a65763de.exe 133 PID 4580 wrote to memory of 1384 4580 c6eb3335493cd2db4bc65f97a65763de.exe 133 PID 4580 wrote to memory of 2264 4580 c6eb3335493cd2db4bc65f97a65763de.exe 132 PID 4580 wrote to memory of 2264 4580 c6eb3335493cd2db4bc65f97a65763de.exe 132 PID 4580 wrote to memory of 3572 4580 c6eb3335493cd2db4bc65f97a65763de.exe 131 PID 4580 wrote to memory of 3572 4580 c6eb3335493cd2db4bc65f97a65763de.exe 131 PID 4580 wrote to memory of 3576 4580 c6eb3335493cd2db4bc65f97a65763de.exe 130 PID 4580 wrote to memory of 3576 4580 c6eb3335493cd2db4bc65f97a65763de.exe 130 PID 4580 wrote to memory of 1484 4580 c6eb3335493cd2db4bc65f97a65763de.exe 129 PID 4580 wrote to memory of 1484 4580 c6eb3335493cd2db4bc65f97a65763de.exe 129 PID 4580 wrote to memory of 2284 4580 c6eb3335493cd2db4bc65f97a65763de.exe 128 PID 4580 wrote to memory of 2284 4580 c6eb3335493cd2db4bc65f97a65763de.exe 128 PID 4580 wrote to memory of 2452 4580 c6eb3335493cd2db4bc65f97a65763de.exe 127 PID 4580 wrote to memory of 2452 4580 c6eb3335493cd2db4bc65f97a65763de.exe 127 PID 4580 wrote to memory of 856 4580 c6eb3335493cd2db4bc65f97a65763de.exe 126 PID 4580 wrote to memory of 856 4580 c6eb3335493cd2db4bc65f97a65763de.exe 126 PID 4580 wrote to memory of 3696 4580 c6eb3335493cd2db4bc65f97a65763de.exe 125 PID 4580 wrote to memory of 3696 4580 c6eb3335493cd2db4bc65f97a65763de.exe 125 PID 4580 wrote to memory of 1440 4580 c6eb3335493cd2db4bc65f97a65763de.exe 124 PID 4580 wrote to memory of 1440 4580 c6eb3335493cd2db4bc65f97a65763de.exe 124 PID 4580 wrote to memory of 2520 4580 c6eb3335493cd2db4bc65f97a65763de.exe 123 PID 4580 wrote to memory of 2520 4580 c6eb3335493cd2db4bc65f97a65763de.exe 123 PID 4580 wrote to memory of 4780 4580 c6eb3335493cd2db4bc65f97a65763de.exe 121 PID 4580 wrote to memory of 4780 4580 c6eb3335493cd2db4bc65f97a65763de.exe 121 PID 4580 wrote to memory of 4620 4580 c6eb3335493cd2db4bc65f97a65763de.exe 119 PID 4580 wrote to memory of 4620 4580 c6eb3335493cd2db4bc65f97a65763de.exe 119 PID 4580 wrote to memory of 3704 4580 c6eb3335493cd2db4bc65f97a65763de.exe 118 PID 4580 wrote to memory of 3704 4580 c6eb3335493cd2db4bc65f97a65763de.exe 118 PID 4580 wrote to memory of 3380 4580 c6eb3335493cd2db4bc65f97a65763de.exe 116 PID 4580 wrote to memory of 3380 4580 c6eb3335493cd2db4bc65f97a65763de.exe 116 PID 4580 wrote to memory of 3320 4580 c6eb3335493cd2db4bc65f97a65763de.exe 114 PID 4580 wrote to memory of 3320 4580 c6eb3335493cd2db4bc65f97a65763de.exe 114 PID 4580 wrote to memory of 2020 4580 c6eb3335493cd2db4bc65f97a65763de.exe 104 PID 4580 wrote to memory of 2020 4580 c6eb3335493cd2db4bc65f97a65763de.exe 104 PID 2020 wrote to memory of 5508 2020 cmd.exe 108 PID 2020 wrote to memory of 5508 2020 cmd.exe 108 PID 2020 wrote to memory of 1376 2020 cmd.exe 122 PID 2020 wrote to memory of 1376 2020 cmd.exe 122 PID 2020 wrote to memory of 5444 2020 cmd.exe 156 PID 2020 wrote to memory of 5444 2020 cmd.exe 156 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6eb3335493cd2db4bc65f97a65763de.exe"C:\Users\Admin\AppData\Local\Temp\c6eb3335493cd2db4bc65f97a65763de.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CecPxE92Gb.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5508
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1376
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\c6eb3335493cd2db4bc65f97a65763de.exe'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\fontdrvhost.exe'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\c6eb3335493cd2db4bc65f97a65763de.exe'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\TextInputHost.exe'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\dwm.exe'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\spoolsv.exe'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c6eb3335493cd2db4bc65f97a65763dec" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\c6eb3335493cd2db4bc65f97a65763de.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c6eb3335493cd2db4bc65f97a65763de" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\c6eb3335493cd2db4bc65f97a65763de.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c6eb3335493cd2db4bc65f97a65763dec" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\c6eb3335493cd2db4bc65f97a65763de.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Defender\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c6eb3335493cd2db4bc65f97a65763dec" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\c6eb3335493cd2db4bc65f97a65763de.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c6eb3335493cd2db4bc65f97a65763de" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\c6eb3335493cd2db4bc65f97a65763de.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c6eb3335493cd2db4bc65f97a65763dec" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\c6eb3335493cd2db4bc65f97a65763de.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\MSBuild\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD5785eb618e1e509f993f2823f170b1d14
SHA10bd7eaac97bb695129bb22b8c7e879e8b01334db
SHA256ffa2427a0f586b7d6b0e2d1acba4255f641d13c93384325d7bcbe7f1556aaadd
SHA51279dfa9fcf68fad69db6dc95b4470b4df1d4f6ff7f4275167eca1f06b9dc7ba2ff202c62027cde9ca601d6caa1373c436a260d5f18206451df5f976be2ae7c8de
-
Filesize
197KB
MD54a90ccda0364adeb27b50c1cc5106469
SHA1186d28d28bb37eb8032d3ce334f230a4089fab65
SHA256a3e69cb5f2ab5696d7150cdeef6ffad2d07cbb78866e5fc2b58728b1ff289d84
SHA512e475de690f632d4c851ade8ef1f6c46898f310f8230d0f2f476a32c8565324d1870e59ee2ae9022dd7d22c62415be30deb3ea4a89f1a2afb8c0dcdfea5cf38ba
-
Filesize
318KB
MD509e31fc860f6a26e9493bb5d2299d496
SHA1b722b9a016137f2e02cfb6e25fa34c2ccea81946
SHA2564e117f464ed0d18c76bef78fd90ae4fa1d26d1a3c4f4fd840786489e6e2efe06
SHA512d86c7624aa629cfc3292b77b6a69946905b4a3759c5bc7566593a3885fd69fab95e1ecadc393bddf9990351e939d595377dd8e6a45f1a851b46353ab411d79ca
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD5243347db405974f6277b941306d57ddb
SHA148a7563230d78ecfe8aaa7b749bf985c6078b4e4
SHA256876100d0ce1aff677a0cab677787ca9858a989f4e5c13b05c8931f709232b835
SHA5121c45eae761fb4224943debe2f2d553793146bb6d4bf2535de2bded3f9c78665607bc1fce7d4ecf905569488e42e42d0bf4b6d20dfcf8cda77a354b8faf17a951
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD561e06aa7c42c7b2a752516bcbb242cc1
SHA102c54f8b171ef48cad21819c20b360448418a068
SHA2565bb0254e8f0220caab64dcc785f432820350471bfcdcb98240c3e0e71a709f5d
SHA51203731f49999ec895370100a4dfeee674bbe5baa50d82007256e6914c323412eef8936b320d2738774758fbbfd76d4c3d391d9e144e65587eba700d98d0362346
-
Filesize
167B
MD514d0969b42917cf2a510d025347c8987
SHA1a575639ae1e4365e350d8178ae2456b3a386fdbf
SHA256a7c8f02ac60f09a0c7288f52b335dad0532c759987b7c44244c0c071a82c7bd2
SHA512e13b5f2c4cd658b28058a3cf373adf460918ef2c1a31a088fd17a1ce0469b5bbfe979de80ba3a551f265c2a8d6e8f87b8ac9f3db7d0410e442487fdecdb434d2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82