Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Skinchanger.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Skinchanger.exe
Resource
win10v2004-20240802-en
General
-
Target
Skinchanger.exe
-
Size
503KB
-
MD5
a31499a51d98949c002bf07a1f9430a7
-
SHA1
5af999343e3a9849b2c911732163e7ec1be8d284
-
SHA256
5763f72b8578f7bbf16a4aab0e8aa476815275bf1f85d2266859dd81d7c9b7cf
-
SHA512
10581919f3149a8c1cbeb4114ad42c4e3bfac742148a901ce22e88bcbdafe7c2810f0f20bd60a506ba92856a8023f3f3cf7bd8653566773a49d7ba7822506722
-
SSDEEP
6144:Oe86D4AB4ibqHBxZLWIBe6VlWT8b9IHo54K/Wzr/kbS7o8gtxyY8jg5I8ebSd:J5B8KSPVle8WHf8jvtve
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\xdwdChrome.exe" Skinchanger.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\WPS Office = "C:\\Windows\\xdwdGoogle Updater.exe" Skinchanger.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xdwdGoogle Updater.exe Skinchanger.exe File created C:\Windows\xdwd.dll Skinchanger.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 44 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1480 schtasks.exe 2444 schtasks.exe 1752 schtasks.exe 1648 schtasks.exe 1908 schtasks.exe 2832 schtasks.exe 1720 schtasks.exe 760 schtasks.exe 760 schtasks.exe 2896 schtasks.exe 2028 schtasks.exe 2700 schtasks.exe 2244 schtasks.exe 2924 schtasks.exe 2520 schtasks.exe 2972 schtasks.exe 1760 schtasks.exe 2920 schtasks.exe 1812 schtasks.exe 2864 schtasks.exe 1100 schtasks.exe 1356 schtasks.exe 2144 schtasks.exe 2764 schtasks.exe 1640 schtasks.exe 2904 schtasks.exe 1732 schtasks.exe 2232 schtasks.exe 544 schtasks.exe 2716 schtasks.exe 2676 schtasks.exe 564 schtasks.exe 2064 schtasks.exe 2172 schtasks.exe 2436 schtasks.exe 2808 schtasks.exe 2244 schtasks.exe 904 schtasks.exe 1412 schtasks.exe 780 schtasks.exe 1472 schtasks.exe 2844 schtasks.exe 2124 schtasks.exe 1764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 schtasks.exe 1668 Skinchanger.exe 2628 CMD.exe 2972 schtasks.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 3000 CMD.exe 2832 schtasks.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 2280 CMD.exe 2244 schtasks.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1232 CMD.exe 2920 schtasks.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe 1668 Skinchanger.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 Skinchanger.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2900 1668 Skinchanger.exe 31 PID 1668 wrote to memory of 2900 1668 Skinchanger.exe 31 PID 1668 wrote to memory of 2900 1668 Skinchanger.exe 31 PID 2900 wrote to memory of 2764 2900 CMD.exe 33 PID 2900 wrote to memory of 2764 2900 CMD.exe 33 PID 2900 wrote to memory of 2764 2900 CMD.exe 33 PID 1668 wrote to memory of 2836 1668 Skinchanger.exe 34 PID 1668 wrote to memory of 2836 1668 Skinchanger.exe 34 PID 1668 wrote to memory of 2836 1668 Skinchanger.exe 34 PID 2836 wrote to memory of 1640 2836 CMD.exe 36 PID 2836 wrote to memory of 1640 2836 CMD.exe 36 PID 2836 wrote to memory of 1640 2836 CMD.exe 36 PID 1668 wrote to memory of 2720 1668 Skinchanger.exe 37 PID 1668 wrote to memory of 2720 1668 Skinchanger.exe 37 PID 1668 wrote to memory of 2720 1668 Skinchanger.exe 37 PID 2720 wrote to memory of 2808 2720 CMD.exe 39 PID 2720 wrote to memory of 2808 2720 CMD.exe 39 PID 2720 wrote to memory of 2808 2720 CMD.exe 39 PID 1668 wrote to memory of 2628 1668 Skinchanger.exe 40 PID 1668 wrote to memory of 2628 1668 Skinchanger.exe 40 PID 1668 wrote to memory of 2628 1668 Skinchanger.exe 40 PID 2628 wrote to memory of 2972 2628 CMD.exe 42 PID 2628 wrote to memory of 2972 2628 CMD.exe 42 PID 2628 wrote to memory of 2972 2628 CMD.exe 42 PID 1668 wrote to memory of 3000 1668 Skinchanger.exe 43 PID 1668 wrote to memory of 3000 1668 Skinchanger.exe 43 PID 1668 wrote to memory of 3000 1668 Skinchanger.exe 43 PID 3000 wrote to memory of 2832 3000 CMD.exe 45 PID 3000 wrote to memory of 2832 3000 CMD.exe 45 PID 3000 wrote to memory of 2832 3000 CMD.exe 45 PID 1668 wrote to memory of 2280 1668 Skinchanger.exe 46 PID 1668 wrote to memory of 2280 1668 Skinchanger.exe 46 PID 1668 wrote to memory of 2280 1668 Skinchanger.exe 46 PID 2280 wrote to memory of 2244 2280 CMD.exe 48 PID 2280 wrote to memory of 2244 2280 CMD.exe 48 PID 2280 wrote to memory of 2244 2280 CMD.exe 48 PID 1668 wrote to memory of 1232 1668 Skinchanger.exe 49 PID 1668 wrote to memory of 1232 1668 Skinchanger.exe 49 PID 1668 wrote to memory of 1232 1668 Skinchanger.exe 49 PID 1232 wrote to memory of 2920 1232 CMD.exe 51 PID 1232 wrote to memory of 2920 1232 CMD.exe 51 PID 1232 wrote to memory of 2920 1232 CMD.exe 51 PID 1668 wrote to memory of 1496 1668 Skinchanger.exe 52 PID 1668 wrote to memory of 1496 1668 Skinchanger.exe 52 PID 1668 wrote to memory of 1496 1668 Skinchanger.exe 52 PID 1496 wrote to memory of 1812 1496 CMD.exe 54 PID 1496 wrote to memory of 1812 1496 CMD.exe 54 PID 1496 wrote to memory of 1812 1496 CMD.exe 54 PID 1668 wrote to memory of 420 1668 Skinchanger.exe 55 PID 1668 wrote to memory of 420 1668 Skinchanger.exe 55 PID 1668 wrote to memory of 420 1668 Skinchanger.exe 55 PID 420 wrote to memory of 2864 420 CMD.exe 57 PID 420 wrote to memory of 2864 420 CMD.exe 57 PID 420 wrote to memory of 2864 420 CMD.exe 57 PID 1668 wrote to memory of 2852 1668 Skinchanger.exe 58 PID 1668 wrote to memory of 2852 1668 Skinchanger.exe 58 PID 1668 wrote to memory of 2852 1668 Skinchanger.exe 58 PID 2852 wrote to memory of 1760 2852 CMD.exe 60 PID 2852 wrote to memory of 1760 2852 CMD.exe 60 PID 2852 wrote to memory of 1760 2852 CMD.exe 60 PID 1668 wrote to memory of 556 1668 Skinchanger.exe 61 PID 1668 wrote to memory of 556 1668 Skinchanger.exe 61 PID 1668 wrote to memory of 556 1668 Skinchanger.exe 61 PID 556 wrote to memory of 760 556 CMD.exe 63 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Skinchanger.exe"C:\Users\Admin\AppData\Local\Temp\Skinchanger.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Skinchanger" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Skinchanger" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1640
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft 365" /tr "C:\Windows\xdwdGoogle Updater.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft 365" /tr "C:\Windows\xdwdGoogle Updater.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1812
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2864
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1760
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:760
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1316
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2124
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2740
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:780
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2172
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1720
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1648
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2896
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2004
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1100
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1432
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1472
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:788
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1480
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1856
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1764
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2892
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1356
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1772
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2028
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1280
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2232
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1928
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:544
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:744
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2144
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1684
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2812
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2732
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2716
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2604
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2444
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2552
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2676
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1512
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1752
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2440
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2244
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1696
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:904
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1232
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2924
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2468
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:564
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2624
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2052
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2520
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:580
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:760
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:924
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1732
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1972
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1364
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2172
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1780
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1648
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1976
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2436
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2392
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1908
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2960
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503KB
MD5a31499a51d98949c002bf07a1f9430a7
SHA15af999343e3a9849b2c911732163e7ec1be8d284
SHA2565763f72b8578f7bbf16a4aab0e8aa476815275bf1f85d2266859dd81d7c9b7cf
SHA51210581919f3149a8c1cbeb4114ad42c4e3bfac742148a901ce22e88bcbdafe7c2810f0f20bd60a506ba92856a8023f3f3cf7bd8653566773a49d7ba7822506722
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6