Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Skinchanger.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Skinchanger.exe
Resource
win10v2004-20240802-en
General
-
Target
Skinchanger.exe
-
Size
503KB
-
MD5
a31499a51d98949c002bf07a1f9430a7
-
SHA1
5af999343e3a9849b2c911732163e7ec1be8d284
-
SHA256
5763f72b8578f7bbf16a4aab0e8aa476815275bf1f85d2266859dd81d7c9b7cf
-
SHA512
10581919f3149a8c1cbeb4114ad42c4e3bfac742148a901ce22e88bcbdafe7c2810f0f20bd60a506ba92856a8023f3f3cf7bd8653566773a49d7ba7822506722
-
SSDEEP
6144:Oe86D4AB4ibqHBxZLWIBe6VlWT8b9IHo54K/Wzr/kbS7o8gtxyY8jg5I8ebSd:J5B8KSPVle8WHf8jvtve
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCookies\\xdwdChrome.exe" Skinchanger.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 42 IoCs
pid Process 3460 Process not Found 928 Process not Found 1432 Process not Found 3664 Process not Found 4940 Process not Found 1072 Process not Found 4804 Process not Found 412 Process not Found 2108 Process not Found 2808 Process not Found 740 Process not Found 212 Process not Found 2844 Process not Found 5000 Process not Found 3432 Process not Found 1548 Process not Found 4668 Process not Found 588 Process not Found 4560 Process not Found 3124 Process not Found 448 Process not Found 1760 Process not Found 4524 Process not Found 1084 Process not Found 1336 Process not Found 5012 Process not Found 3240 Process not Found 5116 Process not Found 4024 Process not Found 4480 Process not Found 2352 Process not Found 2128 Process not Found 912 Process not Found 4600 Process not Found 4264 Process not Found 560 Process not Found 3860 Process not Found 960 Process not Found 4912 Process not Found 2704 Process not Found 3792 Process not Found 3800 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WPS Office = "C:\\Windows\\xdwdGoogle Updater.exe" Skinchanger.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xdwd.dll Skinchanger.exe File created C:\Windows\xdwdGoogle Updater.exe Skinchanger.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 44 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2780 schtasks.exe 1204 schtasks.exe 2184 schtasks.exe 1136 schtasks.exe 2188 schtasks.exe 4864 schtasks.exe 2504 schtasks.exe 3384 schtasks.exe 4152 schtasks.exe 1432 schtasks.exe 1956 schtasks.exe 2732 schtasks.exe 2808 schtasks.exe 4268 schtasks.exe 1140 schtasks.exe 4232 schtasks.exe 212 schtasks.exe 4768 schtasks.exe 4132 schtasks.exe 3792 schtasks.exe 2012 schtasks.exe 4908 schtasks.exe 4988 schtasks.exe 3876 schtasks.exe 3524 schtasks.exe 1604 schtasks.exe 4788 schtasks.exe 2068 schtasks.exe 1972 schtasks.exe 5064 schtasks.exe 3616 schtasks.exe 4476 schtasks.exe 5008 schtasks.exe 2456 schtasks.exe 2336 schtasks.exe 4636 schtasks.exe 2692 schtasks.exe 1076 schtasks.exe 60 schtasks.exe 1460 schtasks.exe 3308 schtasks.exe 3656 schtasks.exe 4176 schtasks.exe 4648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe 4736 Skinchanger.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 Skinchanger.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2360 4736 Skinchanger.exe 87 PID 4736 wrote to memory of 2360 4736 Skinchanger.exe 87 PID 2360 wrote to memory of 3876 2360 CMD.exe 89 PID 2360 wrote to memory of 3876 2360 CMD.exe 89 PID 4736 wrote to memory of 5048 4736 Skinchanger.exe 90 PID 4736 wrote to memory of 5048 4736 Skinchanger.exe 90 PID 5048 wrote to memory of 60 5048 CMD.exe 92 PID 5048 wrote to memory of 60 5048 CMD.exe 92 PID 4736 wrote to memory of 4176 4736 Skinchanger.exe 93 PID 4736 wrote to memory of 4176 4736 Skinchanger.exe 93 PID 4176 wrote to memory of 1460 4176 CMD.exe 95 PID 4176 wrote to memory of 1460 4176 CMD.exe 95 PID 4736 wrote to memory of 3860 4736 Skinchanger.exe 96 PID 4736 wrote to memory of 3860 4736 Skinchanger.exe 96 PID 3860 wrote to memory of 2504 3860 CMD.exe 98 PID 3860 wrote to memory of 2504 3860 CMD.exe 98 PID 4736 wrote to memory of 960 4736 Skinchanger.exe 99 PID 4736 wrote to memory of 960 4736 Skinchanger.exe 99 PID 960 wrote to memory of 3308 960 CMD.exe 101 PID 960 wrote to memory of 3308 960 CMD.exe 101 PID 4736 wrote to memory of 5064 4736 Skinchanger.exe 102 PID 4736 wrote to memory of 5064 4736 Skinchanger.exe 102 PID 5064 wrote to memory of 3384 5064 CMD.exe 104 PID 5064 wrote to memory of 3384 5064 CMD.exe 104 PID 4736 wrote to memory of 4376 4736 Skinchanger.exe 105 PID 4736 wrote to memory of 4376 4736 Skinchanger.exe 105 PID 4376 wrote to memory of 3792 4376 CMD.exe 107 PID 4376 wrote to memory of 3792 4376 CMD.exe 107 PID 4736 wrote to memory of 388 4736 Skinchanger.exe 108 PID 4736 wrote to memory of 388 4736 Skinchanger.exe 108 PID 388 wrote to memory of 2780 388 CMD.exe 110 PID 388 wrote to memory of 2780 388 CMD.exe 110 PID 4736 wrote to memory of 4412 4736 Skinchanger.exe 112 PID 4736 wrote to memory of 4412 4736 Skinchanger.exe 112 PID 4412 wrote to memory of 3524 4412 CMD.exe 114 PID 4412 wrote to memory of 3524 4412 CMD.exe 114 PID 4736 wrote to memory of 2412 4736 Skinchanger.exe 115 PID 4736 wrote to memory of 2412 4736 Skinchanger.exe 115 PID 2412 wrote to memory of 3616 2412 CMD.exe 117 PID 2412 wrote to memory of 3616 2412 CMD.exe 117 PID 4736 wrote to memory of 1008 4736 Skinchanger.exe 118 PID 4736 wrote to memory of 1008 4736 Skinchanger.exe 118 PID 1008 wrote to memory of 2012 1008 CMD.exe 120 PID 1008 wrote to memory of 2012 1008 CMD.exe 120 PID 4736 wrote to memory of 4952 4736 Skinchanger.exe 122 PID 4736 wrote to memory of 4952 4736 Skinchanger.exe 122 PID 4952 wrote to memory of 4152 4952 CMD.exe 124 PID 4952 wrote to memory of 4152 4952 CMD.exe 124 PID 4736 wrote to memory of 3260 4736 Skinchanger.exe 125 PID 4736 wrote to memory of 3260 4736 Skinchanger.exe 125 PID 3260 wrote to memory of 1604 3260 CMD.exe 127 PID 3260 wrote to memory of 1604 3260 CMD.exe 127 PID 4736 wrote to memory of 216 4736 Skinchanger.exe 128 PID 4736 wrote to memory of 216 4736 Skinchanger.exe 128 PID 216 wrote to memory of 4476 216 CMD.exe 130 PID 216 wrote to memory of 4476 216 CMD.exe 130 PID 4736 wrote to memory of 2564 4736 Skinchanger.exe 131 PID 4736 wrote to memory of 2564 4736 Skinchanger.exe 131 PID 2564 wrote to memory of 5008 2564 CMD.exe 133 PID 2564 wrote to memory of 5008 2564 CMD.exe 133 PID 4736 wrote to memory of 3612 4736 Skinchanger.exe 134 PID 4736 wrote to memory of 3612 4736 Skinchanger.exe 134 PID 3612 wrote to memory of 2456 3612 CMD.exe 136 PID 3612 wrote to memory of 2456 3612 CMD.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Skinchanger.exe"C:\Users\Admin\AppData\Local\Temp\Skinchanger.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Skinchanger" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Skinchanger" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3876
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:60
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft 365" /tr "C:\Windows\xdwdGoogle Updater.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft 365" /tr "C:\Windows\xdwdGoogle Updater.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1460
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2504
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3308
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3384
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3792
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2780
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3524
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3616
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2012
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4152
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1604
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4476
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5008
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2456
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2528
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3656
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:4424
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:3696
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4176
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:4288
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1552
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1432
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:692
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1204
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:3592
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4788
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:3008
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4232
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:5016
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2068
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:3924
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1956
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1440
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4908
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2696
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1736
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:3852
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2808
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2628
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1076
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:4740
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1972
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:4484
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:212
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2924
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1136
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2844
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2188
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:2712
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4864
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:4980
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4768
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:3672
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4268
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:3156
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4648
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1244
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4636
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1412
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4988
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:1536
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5064
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:4788
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1140
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST & exit2⤵PID:4232
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdChrome.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4132
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503KB
MD5a31499a51d98949c002bf07a1f9430a7
SHA15af999343e3a9849b2c911732163e7ec1be8d284
SHA2565763f72b8578f7bbf16a4aab0e8aa476815275bf1f85d2266859dd81d7c9b7cf
SHA51210581919f3149a8c1cbeb4114ad42c4e3bfac742148a901ce22e88bcbdafe7c2810f0f20bd60a506ba92856a8023f3f3cf7bd8653566773a49d7ba7822506722
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6