Analysis
-
max time kernel
146s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe
Resource
win10v2004-20240508-en
General
-
Target
97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe
-
Size
2.6MB
-
MD5
4dce474dea9bf3d812d2c1d89cb5b91e
-
SHA1
d72da98dd395e324cba336c4cbd32d32c630fa2a
-
SHA256
97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30
-
SHA512
e54d89f6690fe53e45e820275f8cc1c8fa7178f9ecc67d52b2c8eeb1ceaf0446997c0b6666190055c1e4598eee04854e21e862eb32d8bc5b92e48ef31521d596
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eU:ObCjPKNqQEfsw43qtmVfq4N
Malware Config
Signatures
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
resource yara_rule behavioral2/memory/3948-18-0x0000000000400000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3948-23-0x0000000000400000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables packed with MEW 3 IoCs
resource yara_rule behavioral2/memory/4892-35-0x0000000000400000-0x000000000043C000-memory.dmp INDICATOR_EXE_Packed_MEW behavioral2/memory/4892-36-0x0000000000400000-0x000000000043C000-memory.dmp INDICATOR_EXE_Packed_MEW behavioral2/memory/4892-38-0x0000000000400000-0x000000000043C000-memory.dmp INDICATOR_EXE_Packed_MEW -
Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
resource yara_rule behavioral2/memory/4420-29-0x0000000000400000-0x0000000000491000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/4420-31-0x0000000000400000-0x0000000000491000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
UPX dump on OEP (original entry point) 8 IoCs
resource yara_rule behavioral2/memory/3948-16-0x0000000000400000-0x000000000048E000-memory.dmp UPX behavioral2/memory/3948-17-0x0000000000400000-0x000000000048E000-memory.dmp UPX behavioral2/memory/3948-18-0x0000000000400000-0x000000000048E000-memory.dmp UPX behavioral2/memory/3948-23-0x0000000000400000-0x000000000048E000-memory.dmp UPX behavioral2/memory/4420-27-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4420-28-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4420-29-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4420-31-0x0000000000400000-0x0000000000491000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 4760 jhdfkldfhndfkjdfnbfklfnf.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3948-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3948-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3948-18-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/3948-23-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/4420-27-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4420-28-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4420-29-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4420-31-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 icanhazip.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000022ad6-3.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4760 set thread context of 4536 4760 jhdfkldfhndfkjdfnbfklfnf.exe 86 PID 4536 set thread context of 3948 4536 RegAsm.exe 89 PID 4536 set thread context of 4420 4536 RegAsm.exe 91 PID 4536 set thread context of 4892 4536 RegAsm.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 25 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5112 schtasks.exe 3228 schtasks.exe 440 schtasks.exe 3632 schtasks.exe 2764 schtasks.exe 2760 schtasks.exe 3348 schtasks.exe 2372 schtasks.exe 3028 schtasks.exe 4300 schtasks.exe 2220 schtasks.exe 1332 schtasks.exe 1564 schtasks.exe 1508 schtasks.exe 4972 schtasks.exe 668 schtasks.exe 3500 schtasks.exe 3520 schtasks.exe 1088 schtasks.exe 1428 schtasks.exe 2272 schtasks.exe 1924 schtasks.exe 1148 schtasks.exe 3772 schtasks.exe 1320 schtasks.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe:Zone.Identifier:$DATA 97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 960 97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe 960 97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe 4760 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4536 RegAsm.exe Token: SeDebugPrivilege 3948 cvtres.exe Token: SeDebugPrivilege 4420 cvtres.exe Token: SeDebugPrivilege 4892 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4536 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 960 wrote to memory of 4760 960 97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe 85 PID 960 wrote to memory of 4760 960 97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe 85 PID 960 wrote to memory of 4760 960 97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe 85 PID 4760 wrote to memory of 4536 4760 jhdfkldfhndfkjdfnbfklfnf.exe 86 PID 4760 wrote to memory of 4536 4760 jhdfkldfhndfkjdfnbfklfnf.exe 86 PID 4760 wrote to memory of 4536 4760 jhdfkldfhndfkjdfnbfklfnf.exe 86 PID 4760 wrote to memory of 4536 4760 jhdfkldfhndfkjdfnbfklfnf.exe 86 PID 4760 wrote to memory of 4536 4760 jhdfkldfhndfkjdfnbfklfnf.exe 86 PID 4760 wrote to memory of 440 4760 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 4760 wrote to memory of 440 4760 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 4760 wrote to memory of 440 4760 jhdfkldfhndfkjdfnbfklfnf.exe 87 PID 4536 wrote to memory of 3948 4536 RegAsm.exe 89 PID 4536 wrote to memory of 3948 4536 RegAsm.exe 89 PID 4536 wrote to memory of 3948 4536 RegAsm.exe 89 PID 4536 wrote to memory of 3948 4536 RegAsm.exe 89 PID 4536 wrote to memory of 3948 4536 RegAsm.exe 89 PID 4536 wrote to memory of 3948 4536 RegAsm.exe 89 PID 4536 wrote to memory of 3948 4536 RegAsm.exe 89 PID 4536 wrote to memory of 4420 4536 RegAsm.exe 91 PID 4536 wrote to memory of 4420 4536 RegAsm.exe 91 PID 4536 wrote to memory of 4420 4536 RegAsm.exe 91 PID 4536 wrote to memory of 4420 4536 RegAsm.exe 91 PID 4536 wrote to memory of 4420 4536 RegAsm.exe 91 PID 4536 wrote to memory of 4420 4536 RegAsm.exe 91 PID 4536 wrote to memory of 4420 4536 RegAsm.exe 91 PID 4536 wrote to memory of 4892 4536 RegAsm.exe 93 PID 4536 wrote to memory of 4892 4536 RegAsm.exe 93 PID 4536 wrote to memory of 4892 4536 RegAsm.exe 93 PID 4536 wrote to memory of 4892 4536 RegAsm.exe 93 PID 4536 wrote to memory of 4892 4536 RegAsm.exe 93 PID 4536 wrote to memory of 4892 4536 RegAsm.exe 93 PID 4760 wrote to memory of 1428 4760 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 4760 wrote to memory of 1428 4760 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 4760 wrote to memory of 1428 4760 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 4760 wrote to memory of 1320 4760 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 4760 wrote to memory of 1320 4760 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 4760 wrote to memory of 1320 4760 jhdfkldfhndfkjdfnbfklfnf.exe 99 PID 4760 wrote to memory of 2272 4760 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 4760 wrote to memory of 2272 4760 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 4760 wrote to memory of 2272 4760 jhdfkldfhndfkjdfnbfklfnf.exe 101 PID 4760 wrote to memory of 668 4760 jhdfkldfhndfkjdfnbfklfnf.exe 106 PID 4760 wrote to memory of 668 4760 jhdfkldfhndfkjdfnbfklfnf.exe 106 PID 4760 wrote to memory of 668 4760 jhdfkldfhndfkjdfnbfklfnf.exe 106 PID 4760 wrote to memory of 2764 4760 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 4760 wrote to memory of 2764 4760 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 4760 wrote to memory of 2764 4760 jhdfkldfhndfkjdfnbfklfnf.exe 109 PID 4760 wrote to memory of 5112 4760 jhdfkldfhndfkjdfnbfklfnf.exe 112 PID 4760 wrote to memory of 5112 4760 jhdfkldfhndfkjdfnbfklfnf.exe 112 PID 4760 wrote to memory of 5112 4760 jhdfkldfhndfkjdfnbfklfnf.exe 112 PID 4760 wrote to memory of 2220 4760 jhdfkldfhndfkjdfnbfklfnf.exe 114 PID 4760 wrote to memory of 2220 4760 jhdfkldfhndfkjdfnbfklfnf.exe 114 PID 4760 wrote to memory of 2220 4760 jhdfkldfhndfkjdfnbfklfnf.exe 114 PID 4760 wrote to memory of 4300 4760 jhdfkldfhndfkjdfnbfklfnf.exe 116 PID 4760 wrote to memory of 4300 4760 jhdfkldfhndfkjdfnbfklfnf.exe 116 PID 4760 wrote to memory of 4300 4760 jhdfkldfhndfkjdfnbfklfnf.exe 116 PID 4760 wrote to memory of 3228 4760 jhdfkldfhndfkjdfnbfklfnf.exe 118 PID 4760 wrote to memory of 3228 4760 jhdfkldfhndfkjdfnbfklfnf.exe 118 PID 4760 wrote to memory of 3228 4760 jhdfkldfhndfkjdfnbfklfnf.exe 118 PID 4760 wrote to memory of 1332 4760 jhdfkldfhndfkjdfnbfklfnf.exe 120 PID 4760 wrote to memory of 1332 4760 jhdfkldfhndfkjdfnbfklfnf.exe 120 PID 4760 wrote to memory of 1332 4760 jhdfkldfhndfkjdfnbfklfnf.exe 120 PID 4760 wrote to memory of 1924 4760 jhdfkldfhndfkjdfnbfklfnf.exe 122 PID 4760 wrote to memory of 1924 4760 jhdfkldfhndfkjdfnbfklfnf.exe 122 PID 4760 wrote to memory of 1924 4760 jhdfkldfhndfkjdfnbfklfnf.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe"C:\Users\Admin\AppData\Local\Temp\97ffb71b7d384521262998c17aba15cb2c89794d53b26173bb40e5bdc0066b30.exe"1⤵
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpBBBE.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpBE30.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpBE60.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:440
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1428
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1320
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2272
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:668
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2764
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:5112
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2220
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4300
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3228
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1332
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1924
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3500
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1564
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1508
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4972
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1088
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2372
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1148
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3348
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3772
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3520
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3632
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD503026194eab9097b106cf067d27c47b0
SHA133029fc5ef074a20f8706e93e37a491cbd8db715
SHA2563ad2728c17921e0a9954f4c760119a4609423a35debbcf736c342656506f39f0
SHA512c577c04cc40e61f0547832cae741eca302cca433c6878aa5d7d148a61621affdb3e58f4afa6309083b81ac7b22106458e4bcecee96946ab5d57618e619a13885
-
Filesize
1KB
MD5b0cc2e6f2d8036c9b5fef218736fa9c9
SHA164fd3017625979c95ba09d7cbea201010a82f73f
SHA256997aceeb78143e057d4ea0ed699db3cc1c723f699b4532663b7b85c83baa5c50
SHA512a1fe80b2971c4d1141a594f27eaea61500bf701cd1b8fbdb5ac2204a63c8ef862344f8c30f65ce769f0acf2b0718ed33a02744dd1a152c4a62a5318333d29b9b
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986