Analysis
-
max time kernel
93s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe
Resource
win10v2004-20240704-en
General
-
Target
b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe
-
Size
3.4MB
-
MD5
10092d3106ee645c3b2d9d18b6198298
-
SHA1
5c8a5432e12df1ecdb33499e0c142a6ba37165f0
-
SHA256
b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a
-
SHA512
82e71b255671e08199986101747092359a2be592344058e4ddc264b6f65d2033fa41051e7a7b853df78cc27aaaba4da6080b1f3bac67cb563fb550d7f0aacb98
-
SSDEEP
49152:IBJTrDS1bJ+05CiD5LIYUcfjEGJT8TpIfYttDqrWEn5PjfHyejpdQ8y7uBxbPEKF:y9rGrXZTjupIf2ODxzSeFP64EKIjFZE/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\dllhost.exe\", \"C:\\Windows\\security\\winlogon.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\dllhost.exe\", \"C:\\Windows\\security\\winlogon.exe\", \"C:\\Users\\Default\\Favorites\\SppExtComObj.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\dllhost.exe\", \"C:\\Windows\\security\\winlogon.exe\", \"C:\\Users\\Default\\Favorites\\SppExtComObj.exe\", \"C:\\Users\\Default User\\csrss.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\dllhost.exe\", \"C:\\Windows\\security\\winlogon.exe\", \"C:\\Users\\Default\\Favorites\\SppExtComObj.exe\", \"C:\\Users\\Default User\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\spoolsv.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\dllhost.exe\", \"C:\\Windows\\security\\winlogon.exe\", \"C:\\Users\\Default\\Favorites\\SppExtComObj.exe\", \"C:\\Users\\Default User\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\spoolsv.exe\", \"C:\\Users\\Admin\\AppData\\Roaming\\WinRAR\\HyperServerFont.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default\\dllhost.exe\"" HyperServerFont.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3360 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4488 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3608 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4860 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3632 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3276 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3932 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3952 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4376 620 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3920 620 schtasks.exe 88 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation HyperServerFont.exe Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe -
Executes dropped EXE 2 IoCs
pid Process 760 HyperServerFont.exe 452 spoolsv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default\\dllhost.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\security\\winlogon.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\security\\winlogon.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Users\\Default\\Favorites\\SppExtComObj.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default User\\csrss.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Windows Portable Devices\\spoolsv.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Windows Portable Devices\\spoolsv.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HyperServerFont = "\"C:\\Users\\Admin\\AppData\\Roaming\\WinRAR\\HyperServerFont.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HyperServerFont = "\"C:\\Users\\Admin\\AppData\\Roaming\\WinRAR\\HyperServerFont.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Default\\dllhost.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Users\\Default\\Favorites\\SppExtComObj.exe\"" HyperServerFont.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default User\\csrss.exe\"" HyperServerFont.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC7D7B2E3F968745B68A64DE4AC1BC2723.TMP csc.exe File created \??\c:\Windows\System32\07b7vs.exe csc.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\f3b6ecef712a24 HyperServerFont.exe File created C:\Program Files (x86)\Windows Portable Devices\spoolsv.exe HyperServerFont.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\spoolsv.exe HyperServerFont.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\security\winlogon.exe HyperServerFont.exe File created C:\Windows\security\cc11b995f2a76d HyperServerFont.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000_Classes\Local Settings b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000_Classes\Local Settings HyperServerFont.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4728 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1512 schtasks.exe 3276 schtasks.exe 3920 schtasks.exe 4488 schtasks.exe 640 schtasks.exe 3932 schtasks.exe 5028 schtasks.exe 2960 schtasks.exe 3360 schtasks.exe 3048 schtasks.exe 3608 schtasks.exe 1660 schtasks.exe 4860 schtasks.exe 3036 schtasks.exe 4376 schtasks.exe 2396 schtasks.exe 3632 schtasks.exe 3952 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe 760 HyperServerFont.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 760 HyperServerFont.exe Token: SeDebugPrivilege 452 spoolsv.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4920 4656 b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe 84 PID 4656 wrote to memory of 4920 4656 b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe 84 PID 4656 wrote to memory of 4920 4656 b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe 84 PID 4920 wrote to memory of 4224 4920 WScript.exe 85 PID 4920 wrote to memory of 4224 4920 WScript.exe 85 PID 4920 wrote to memory of 4224 4920 WScript.exe 85 PID 4224 wrote to memory of 760 4224 cmd.exe 87 PID 4224 wrote to memory of 760 4224 cmd.exe 87 PID 760 wrote to memory of 220 760 HyperServerFont.exe 92 PID 760 wrote to memory of 220 760 HyperServerFont.exe 92 PID 220 wrote to memory of 1476 220 csc.exe 94 PID 220 wrote to memory of 1476 220 csc.exe 94 PID 760 wrote to memory of 1952 760 HyperServerFont.exe 110 PID 760 wrote to memory of 1952 760 HyperServerFont.exe 110 PID 1952 wrote to memory of 4028 1952 cmd.exe 112 PID 1952 wrote to memory of 4028 1952 cmd.exe 112 PID 1952 wrote to memory of 4728 1952 cmd.exe 113 PID 1952 wrote to memory of 4728 1952 cmd.exe 113 PID 1952 wrote to memory of 452 1952 cmd.exe 114 PID 1952 wrote to memory of 452 1952 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe"C:\Users\Admin\AppData\Local\Temp\b1ab7ae36965a9b7bfe0f46123cabeee9260f0816b118cf102deb4480b63b86a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinRAR\zAABOcyJ2bBgkpH6Xhk3lnmdvCX3caSCc9GQdkeF.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WinRAR\Teg6emHMlLt57vxkHLDGu6vtBrgy1f5AzyvH4iCxDeNGgB7UyEG1SG.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Roaming\WinRAR\HyperServerFont.exe"C:\Users\Admin\AppData\Roaming\WinRAR/HyperServerFont.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\31ol30cv\31ol30cv.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2DE1.tmp" "c:\Windows\System32\CSC7D7B2E3F968745B68A64DE4AC1BC2723.TMP"6⤵PID:1476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8q8wCj7Gzm.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:4028
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:4728
-
-
C:\Program Files (x86)\Windows Portable Devices\spoolsv.exe"C:\Program Files (x86)\Windows Portable Devices\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Default\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Default\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\security\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\security\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Windows\security\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Favorites\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Default\Favorites\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Favorites\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "HyperServerFontH" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Roaming\WinRAR\HyperServerFont.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "HyperServerFont" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\WinRAR\HyperServerFont.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "HyperServerFontH" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\Roaming\WinRAR\HyperServerFont.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5696c74908e3c146178ae9ac9afd79640
SHA106db92bc13870196cb58a17fec919d5a64ec9c85
SHA256dd58d0e30852b7feaf81a16c32324abf88488af01c0d875fbd85ec714583731e
SHA512c0e1aead52b2906d57d4e41e9c1dbd521c658b99490b935fa5725c3b2fa6b8cc1217ec423d4cb4a6f257140d747a9f4d56ebc7cc248bc7387e9c38a1e1a866c3
-
Filesize
1KB
MD58df631b9cc8d0103f0e63d144a0a83f8
SHA1074aec0fd9ba2eff4a42c179d630c3625ebdce15
SHA2561bb5dd8e063adaa2ef1d3b24f45a939a5df8d739f263410ed1ce17c269e573b0
SHA5125dfe41f2225d608fb75673f39fd870b6373511dd7330a84fd9b9f37e60e080dd2f809581865b100699e6bf9b6c41a3dfd42827dea880f6a69115441055a43a8d
-
Filesize
3.5MB
MD5e6096483a8f2600535d5c540898501ee
SHA1988f6c02d6d8fc54ef7c74e2982b606229f084c9
SHA2564abfb6c4719bf650b60ce4e9088ab59a24a33f06627a8a5cbddd4ed5ab59c14d
SHA5129e682b3bd8984b8f72f129c1f79f6c53b38ee2291ebfaa892a40f282f0bba5e17bdf144fdbc10953f9e0c14b657febe3daa860ba871070f8d61e5282ddb3a90e
-
Filesize
85B
MD56fb0cede604bc60a8b56d06517fc275b
SHA12ff60f4528e919d7c8856a96d8ab2ecf8adec2d1
SHA2566e320f0bbc930d2f1106e791a79547b0b14507ccefd9154571a4a4d4c2105c80
SHA512d54e559522844b79e7c396d2eaffcdb093c71779c248fc2637fa067ce21149b0f3d4a2d1ad2295d6c685f9e280be86b931c95efe0cf9b84a942c33f126885d25
-
Filesize
245B
MD511d88d852b26c866aa883701afb373ec
SHA1a88acf9a42805f23575bf4bfc518d8ae6db11a36
SHA256c2d4bc12a60d049699f9693568a1a14d3849257966470b28978d9922ff17b12a
SHA5122851d70cb66c93b87fa35ee9684d66ec884acaa12ddde5b38cad802e623b02b6cf49fc9ab18876c4885615a9915f47fbce64de6ab75d0f7be3b7dea8ca217283
-
Filesize
360B
MD5c6d8da19c08273efa93b56ae1c5da84e
SHA1137fa6f03ba30863c8742db1d19bde608f8bbdaf
SHA2561f8dffdf027e3001864cbe7941266a2e4e58b1b15008fac4fd740422084dc503
SHA5122fc26046b1c2e2d03aafe98156f175055e895cbfc198a2a96d79e71caf2360332d1c89f874214d81a113072737ca437d52295ade48dba0635e445539bc0aa03a
-
Filesize
235B
MD52fc1a9b1bb818e35ce4a5a086c8a7983
SHA13974841108e6cc93a8289f89cccfa386027b139a
SHA256a40a50dc7aa7aa9824cea285b5686aafc91723a29ec45fe816d47db248138a26
SHA512667154b5b9bb783ad6278b4ac720e9078132d76173945d36639e8f002f9f86ce9dfceb3f0fea7f23e2010be1b80702445a540944f56139ea1942c654c4cc1a2d
-
Filesize
1KB
MD50e3a860c4637ae1a42e589f2ba0d0851
SHA1450889245cbb0c239fa7be7b7ecc29befee8b963
SHA25608011eec6a7c02281e0011f4ca12358e145f80b7e0e20e73c4d24df979052eba
SHA5125d848dc8b161bf731e7b51948ea9d4c856d7471ad1814e6e13bd7c867726367c4f741f1fe41d3d151b7784b0545821ae7b7db5d0dc043c8059232fd9703cf5a6