Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe
Resource
win10v2004-20240730-en
General
-
Target
25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe
-
Size
624KB
-
MD5
14b4c5168cc9eb39e0cbe83c7a87e37f
-
SHA1
dcf9a453797efbe11f2dfc847270e3494142c456
-
SHA256
25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e
-
SHA512
7d539543947c50ac97a8988fc36fc196fed878755bf25204ac70571e491a5ce29ed8e1ec45e6d53e4251ef3d4102339d4bece8199b66ea1d6eb06bb7a7427bf5
-
SSDEEP
12288:50b7bqwCyGXBCPVle82FvkiEEiNlJJJQN0Q:yvbqty+BTiW0Q
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Windows\\Sub\\xdwdClient.exe" 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 42 IoCs
pid Process 3440 Process not Found 4084 Process not Found 4796 Process not Found 3152 Process not Found 4540 Process not Found 2320 Process not Found 4596 Process not Found 1136 Process not Found 452 Process not Found 2804 Process not Found 4672 Process not Found 1064 Process not Found 3116 Process not Found 752 Process not Found 3516 Process not Found 4832 Process not Found 4100 Process not Found 1360 Process not Found 4412 Process not Found 3980 Process not Found 1016 Process not Found 4956 Process not Found 4296 Process not Found 3972 Process not Found 2064 Process not Found 2748 Process not Found 2852 Process not Found 968 Process not Found 2244 Process not Found 2724 Process not Found 704 Process not Found 2888 Process not Found 2388 Process not Found 4044 Process not Found 3904 Process not Found 2664 Process not Found 2852 Process not Found 1028 Process not Found 692 Process not Found 4188 Process not Found 4972 Process not Found 2280 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xdwdfghfghfg = "C:\\Windows\\Sub\\xdwdWatchDog.exe" 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\xdwd.dll 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe File created C:\Windows\Sub\xdwdClient.exe 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe File opened for modification C:\Windows\Sub\xdwdClient.exe 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe File opened for modification C:\Windows\Sub 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe File created C:\Windows\Sub\xdwdWatchDog.exe 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe File opened for modification C:\Windows\Sub\xdwdWatchDog.exe 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 44 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4712 schtasks.exe 5004 schtasks.exe 1720 schtasks.exe 4196 schtasks.exe 1452 schtasks.exe 4368 schtasks.exe 3964 schtasks.exe 2136 schtasks.exe 2900 schtasks.exe 732 schtasks.exe 4064 schtasks.exe 3752 schtasks.exe 2984 schtasks.exe 1208 schtasks.exe 2632 schtasks.exe 3504 schtasks.exe 5092 schtasks.exe 3132 schtasks.exe 8 schtasks.exe 1432 schtasks.exe 2364 schtasks.exe 4888 schtasks.exe 3944 schtasks.exe 3752 schtasks.exe 1688 schtasks.exe 1804 schtasks.exe 4572 schtasks.exe 2240 schtasks.exe 2464 schtasks.exe 3856 schtasks.exe 1744 schtasks.exe 4976 schtasks.exe 4344 schtasks.exe 1568 schtasks.exe 4592 schtasks.exe 1524 schtasks.exe 1872 schtasks.exe 3872 schtasks.exe 1868 schtasks.exe 1064 schtasks.exe 5112 schtasks.exe 1712 schtasks.exe 1192 schtasks.exe 4420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 4784 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 87 PID 556 wrote to memory of 4784 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 87 PID 4784 wrote to memory of 4592 4784 CMD.exe 89 PID 4784 wrote to memory of 4592 4784 CMD.exe 89 PID 556 wrote to memory of 4032 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 90 PID 556 wrote to memory of 4032 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 90 PID 4032 wrote to memory of 1688 4032 CMD.exe 92 PID 4032 wrote to memory of 1688 4032 CMD.exe 92 PID 556 wrote to memory of 3600 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 93 PID 556 wrote to memory of 3600 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 93 PID 3600 wrote to memory of 1804 3600 CMD.exe 95 PID 3600 wrote to memory of 1804 3600 CMD.exe 95 PID 556 wrote to memory of 1360 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 96 PID 556 wrote to memory of 1360 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 96 PID 1360 wrote to memory of 1524 1360 CMD.exe 98 PID 1360 wrote to memory of 1524 1360 CMD.exe 98 PID 556 wrote to memory of 3196 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 99 PID 556 wrote to memory of 3196 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 99 PID 3196 wrote to memory of 732 3196 CMD.exe 101 PID 3196 wrote to memory of 732 3196 CMD.exe 101 PID 556 wrote to memory of 748 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 102 PID 556 wrote to memory of 748 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 102 PID 748 wrote to memory of 5092 748 CMD.exe 104 PID 748 wrote to memory of 5092 748 CMD.exe 104 PID 556 wrote to memory of 1512 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 105 PID 556 wrote to memory of 1512 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 105 PID 1512 wrote to memory of 4064 1512 CMD.exe 107 PID 1512 wrote to memory of 4064 1512 CMD.exe 107 PID 556 wrote to memory of 1936 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 108 PID 556 wrote to memory of 1936 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 108 PID 1936 wrote to memory of 3752 1936 CMD.exe 110 PID 1936 wrote to memory of 3752 1936 CMD.exe 110 PID 556 wrote to memory of 3968 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 112 PID 556 wrote to memory of 3968 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 112 PID 3968 wrote to memory of 3856 3968 CMD.exe 114 PID 3968 wrote to memory of 3856 3968 CMD.exe 114 PID 556 wrote to memory of 412 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 116 PID 556 wrote to memory of 412 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 116 PID 412 wrote to memory of 2364 412 CMD.exe 118 PID 412 wrote to memory of 2364 412 CMD.exe 118 PID 556 wrote to memory of 3552 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 119 PID 556 wrote to memory of 3552 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 119 PID 3552 wrote to memory of 5004 3552 CMD.exe 121 PID 3552 wrote to memory of 5004 3552 CMD.exe 121 PID 556 wrote to memory of 4872 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 122 PID 556 wrote to memory of 4872 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 122 PID 4872 wrote to memory of 1720 4872 CMD.exe 124 PID 4872 wrote to memory of 1720 4872 CMD.exe 124 PID 556 wrote to memory of 4420 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 125 PID 556 wrote to memory of 4420 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 125 PID 4420 wrote to memory of 4196 4420 CMD.exe 127 PID 4420 wrote to memory of 4196 4420 CMD.exe 127 PID 556 wrote to memory of 3216 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 128 PID 556 wrote to memory of 3216 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 128 PID 3216 wrote to memory of 5112 3216 CMD.exe 130 PID 3216 wrote to memory of 5112 3216 CMD.exe 130 PID 556 wrote to memory of 1844 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 131 PID 556 wrote to memory of 1844 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 131 PID 1844 wrote to memory of 3132 1844 CMD.exe 133 PID 1844 wrote to memory of 3132 1844 CMD.exe 133 PID 556 wrote to memory of 1724 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 134 PID 556 wrote to memory of 1724 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 134 PID 556 wrote to memory of 4056 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 137 PID 556 wrote to memory of 4056 556 25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe"C:\Users\Admin\AppData\Local\Temp\25f09e7a45466953a34615a5fbc6312b39a5222eb8d6bb95e89f57bc2334bd1e.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "USER OOBE BROKER" /tr "C:\Windows\Sub\xdwdClient.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "USER OOBE BROKER" /tr "C:\Windows\Sub\xdwdClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4592
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "xdwdhuitebeaneratnik" /tr "C:\Windows\Sub\xdwdWatchDog.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "xdwdhuitebeaneratnik" /tr "C:\Windows\Sub\xdwdWatchDog.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1804
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1524
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:732
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5092
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4064
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3752
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3856
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2364
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5004
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1720
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4196
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5112
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3132
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:1724
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2984
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:4056
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1712
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:3220
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4368
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:3112
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1744
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:4692
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1192
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:772
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:8
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:2044
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4420
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:2024
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1872
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:1340
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4976
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:2148
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1432
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:3340
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4572
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:528
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3872
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:3488
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4888
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:4784
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:2236
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2240
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:3700
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3504
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:3168
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3964
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:748
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4344
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:1792
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3752
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:4472
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2136
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:1228
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3944
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:4288
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2900
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:5080
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1452
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:2992
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:452
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1208
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:2488
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2464
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:4824
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1868
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:4440
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1064
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST & exit2⤵PID:3732
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "XDWDidinaxui" /tr "C:\Windows\Sub\xdwdClient.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6