Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
Resource
win10v2004-20240802-en
General
-
Target
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
-
Size
3.5MB
-
MD5
8784f682b99ff4d525e623544ae67e24
-
SHA1
4bc752a2fbe5964b1cdfe57f62ab80531c181912
-
SHA256
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d
-
SHA512
08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf
-
SSDEEP
98304:74qk4B+JfG/r17Z64wNlnadfucOS+MgZk:7HJr/r17Z64SaebRy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\Weather.Gadget\\it-IT\\js\\OSPPSVC.exe\", \"C:\\Users\\Public\\Favorites\\lsass.exe\", \"C:\\MSOCache\\All Users\\spoolsv.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\Weather.Gadget\\it-IT\\js\\OSPPSVC.exe\", \"C:\\Users\\Public\\Favorites\\lsass.exe\", \"C:\\MSOCache\\All Users\\spoolsv.exe\", \"C:\\Program Files\\Windows Portable Devices\\dwm.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\Weather.Gadget\\it-IT\\js\\OSPPSVC.exe\", \"C:\\Users\\Public\\Favorites\\lsass.exe\", \"C:\\MSOCache\\All Users\\spoolsv.exe\", \"C:\\Program Files\\Windows Portable Devices\\dwm.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\csrss.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\Weather.Gadget\\it-IT\\js\\OSPPSVC.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\Weather.Gadget\\it-IT\\js\\OSPPSVC.exe\", \"C:\\Users\\Public\\Favorites\\lsass.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Process spawned unexpected child process 20 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 768 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2792 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 584 2792 schtasks.exe 30 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1928 powershell.exe 844 powershell.exe 444 powershell.exe 548 powershell.exe 2900 powershell.exe 304 powershell.exe 2484 powershell.exe 3016 powershell.exe 1288 powershell.exe 2192 powershell.exe 2028 powershell.exe 1608 powershell.exe 1348 powershell.exe 2588 powershell.exe 688 powershell.exe 916 powershell.exe 3008 powershell.exe 3020 powershell.exe -
Deletes itself 1 IoCs
pid Process 832 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\Weather.Gadget\\it-IT\\js\\OSPPSVC.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Public\\Favorites\\lsass.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\spoolsv.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\MSOCache\\All Users\\spoolsv.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Windows Portable Devices\\dwm.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\All Users\\Documents\\csrss.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\All Users\\Documents\\csrss.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Windows Sidebar\\Gadgets\\Weather.Gadget\\it-IT\\js\\OSPPSVC.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Public\\Favorites\\lsass.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Windows Portable Devices\\dwm.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC5B71691A9E72498D8FE6361356C6FE90.TMP csc.exe File created \??\c:\Windows\System32\8wawgv.exe csc.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\dwm.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File opened for modification C:\Program Files\Windows Portable Devices\dwm.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files\Windows Portable Devices\6cb0b6c459d5d3 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\1610b97d3ab4a7 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2604 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2604 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 768 schtasks.exe 1312 schtasks.exe 1264 schtasks.exe 2984 schtasks.exe 2176 schtasks.exe 2308 schtasks.exe 2700 schtasks.exe 2764 schtasks.exe 2668 schtasks.exe 2108 schtasks.exe 840 schtasks.exe 1672 schtasks.exe 2128 schtasks.exe 2248 schtasks.exe 2812 schtasks.exe 2856 schtasks.exe 2944 schtasks.exe 1988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 688 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 304 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeDebugPrivilege 444 powershell.exe Token: SeDebugPrivilege 2192 powershell.exe Token: SeDebugPrivilege 844 powershell.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 3016 powershell.exe Token: SeDebugPrivilege 2212 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2252 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 34 PID 1728 wrote to memory of 2252 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 34 PID 1728 wrote to memory of 2252 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 34 PID 2252 wrote to memory of 2164 2252 csc.exe 36 PID 2252 wrote to memory of 2164 2252 csc.exe 36 PID 2252 wrote to memory of 2164 2252 csc.exe 36 PID 1728 wrote to memory of 2192 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 52 PID 1728 wrote to memory of 2192 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 52 PID 1728 wrote to memory of 2192 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 52 PID 1728 wrote to memory of 2028 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 53 PID 1728 wrote to memory of 2028 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 53 PID 1728 wrote to memory of 2028 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 53 PID 1728 wrote to memory of 304 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 54 PID 1728 wrote to memory of 304 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 54 PID 1728 wrote to memory of 304 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 54 PID 1728 wrote to memory of 688 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 55 PID 1728 wrote to memory of 688 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 55 PID 1728 wrote to memory of 688 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 55 PID 1728 wrote to memory of 1288 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 56 PID 1728 wrote to memory of 1288 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 56 PID 1728 wrote to memory of 1288 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 56 PID 1728 wrote to memory of 916 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 57 PID 1728 wrote to memory of 916 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 57 PID 1728 wrote to memory of 916 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 57 PID 1728 wrote to memory of 2484 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 58 PID 1728 wrote to memory of 2484 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 58 PID 1728 wrote to memory of 2484 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 58 PID 1728 wrote to memory of 444 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 59 PID 1728 wrote to memory of 444 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 59 PID 1728 wrote to memory of 444 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 59 PID 1728 wrote to memory of 548 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 60 PID 1728 wrote to memory of 548 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 60 PID 1728 wrote to memory of 548 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 60 PID 1728 wrote to memory of 3016 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 61 PID 1728 wrote to memory of 3016 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 61 PID 1728 wrote to memory of 3016 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 61 PID 1728 wrote to memory of 3008 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 62 PID 1728 wrote to memory of 3008 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 62 PID 1728 wrote to memory of 3008 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 62 PID 1728 wrote to memory of 3020 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 63 PID 1728 wrote to memory of 3020 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 63 PID 1728 wrote to memory of 3020 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 63 PID 1728 wrote to memory of 2588 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 64 PID 1728 wrote to memory of 2588 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 64 PID 1728 wrote to memory of 2588 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 64 PID 1728 wrote to memory of 844 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 65 PID 1728 wrote to memory of 844 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 65 PID 1728 wrote to memory of 844 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 65 PID 1728 wrote to memory of 1348 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 66 PID 1728 wrote to memory of 1348 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 66 PID 1728 wrote to memory of 1348 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 66 PID 1728 wrote to memory of 1928 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 67 PID 1728 wrote to memory of 1928 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 67 PID 1728 wrote to memory of 1928 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 67 PID 1728 wrote to memory of 1608 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 69 PID 1728 wrote to memory of 1608 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 69 PID 1728 wrote to memory of 1608 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 69 PID 1728 wrote to memory of 2900 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 70 PID 1728 wrote to memory of 2900 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 70 PID 1728 wrote to memory of 2900 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 70 PID 1728 wrote to memory of 2496 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 76 PID 1728 wrote to memory of 2496 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 76 PID 1728 wrote to memory of 2496 1728 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 76 PID 2496 wrote to memory of 2804 2496 cmd.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pkbvuaq0\pkbvuaq0.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC5BF.tmp" "c:\Windows\System32\CSC5B71691A9E72498D8FE6361356C6FE90.TMP"3⤵PID:2164
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Documents\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Favorites\lsass.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\dwm.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EOnAqtgfsh.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2804
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hprTb2T9jZ.bat"4⤵
- Deletes itself
PID:832 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2740
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:1540
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Documents\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Favorites\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\Favorites\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Favorites\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d2" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d2" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "csrss" /f1⤵
- Process spawned unexpected child process
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "csrssc" /f1⤵
- Process spawned unexpected child process
PID:584
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
679B
MD56e18d4c556747506873b26f332b3228f
SHA1e2f9c6c58c583caee66f04d4a9f6d13896cd9804
SHA2563e0ea90f5df591e5e7da0da1626e4c7fd9924a98788f2584acc59edc63d0a679
SHA512dc767a260d4bea5a4ed88671148a557a10867ceea9badfe11bf0a2413cfb732161768f1d0f227fac4e7807d9df08ff4c4a822df89223053e3c81d7823dd5808c
-
Filesize
386B
MD5316d898c2bdd000c1f68da92d686592d
SHA116c247b03b341011069c2f984704a2142f476703
SHA2560af9c3e9fb9e4ed06ea5730e103c62e366aee2fe9650913e2c996417842a1005
SHA512374171f4781d01aed5da29207dd0e9e0bdad91d750f6c0c31f87b50595387f2ec5bf269e800d555bd3be5b736c3f9885f2b4c409a1d3536b948e1307af6720c7
-
Filesize
622B
MD5f68a9a3550e29e204d898bbb482adea5
SHA14763391a02c8b32c694811c3ddcb675478d3bab5
SHA256c3fb5e4a99410e885e24faf363073dc3e10e60cf543187fe82922c00cf05875b
SHA5123f824de2eddd3482515372235b77c28877b069c35f04a96de53b624120da89d19f2b6d1b9cdd00621c91fdac4c78ff9ef3b97c1fd16618f0559a0b10559bd112
-
Filesize
230B
MD55d892603e184c36fcf819abda1698789
SHA1f7cf3b5b1c8bba57d137514b77201e9ab8906298
SHA25665cf1c01ee8fb54c63e34bda18fbe0d7368b340cebbdc4bb4984044f9950d3b1
SHA5122c0091aac7c39eddc81dd7a79d4501fea9cf302b3ce55b67082c8233a117055a541594d0a6d568564c6ac1a79bbf491ae36ca2e62f4cb44753eaa5c3dfb28f0a
-
Filesize
1KB
MD533e224a561b6685896f98bf4e80b12a0
SHA18e03215e721242d77d731a575797e7b7c01ca65d
SHA256fc6044e90493e3f50ef913d10e17183c7c3e726f7c9209e459ee000abd4a5f8a
SHA512f0cdbb340a9527439d5edf3ba1bb02e989663f6dc90642bd7a1540023c9abc6657b351455692e60d65eae2465fb2c63e90312d845b7a93fd9ea51a76a6ad2f00
-
Filesize
725B
MD50a90b1189a62bd0fce9ac42a6f449e1e
SHA18b31d9e765d09fb70518b11bbb30a0edfd38b476
SHA256fabc64e47a21b048471294d8e5f7e370a7616fc61c4daebb4450f9afa02b78b4
SHA5120b1c431a83988fde45588618880aec9829a18a365ad3314e7792fad8f4f4141a021777d0169d4def4fd27d72192e03a5eb63b4e4fa83831e3f037c9594ba115e
-
Filesize
347B
MD5558c08dec133095dc531ee628653d6a3
SHA1390fa51505b3ebc86a6867bd5933073a024a5f48
SHA2564eabd9c60a553fb810154122c82576f9b92b6052beb3d9d9b7be0145ab04ef48
SHA512b639421fa31819f8a9f7ba6cc9ba30128445f550fc863cd53cb079932c705f0e88cafd0a1c4acc08b6c0c90a528264106a7d31dca0cb3ddedb839f18b33aac92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J6D668GFOQVVVUUOOVS3.temp
Filesize7KB
MD512a502585ac4ad1b8ff7e8d8c1a118ad
SHA105c6c087b5759d67d79435b6a49b7a4c8d4152e7
SHA2563a3d05ac896e37cdb1bcff7108ee7abca93f105652169b916a1ebe069b547cf7
SHA5127f6be7a8a9543be14cbc53b129c798adbfdebc81f34c3263c202611970ff0d916b0fe62ec6a9a68420efd680a0883ef277586175037a4085f73efdf04d87d7f7
-
Filesize
537B
MD599a0202ccd488632a5ffeffe0579e687
SHA1b0ba52be93ad19ea648d89af85eff7f09ea04d35
SHA25618579f0c5a9e09c37219cec0df14dd1fbe16cc81e8778f2c0071c94abcfb3fa5
SHA512060372cd2c918de73a2a394f40942e3bf7bc3d2ec4506e566a5f778e0e0219db5ef95df80ca22b6b94de1a9b23fa8775c6acf7e1007c8fb95f953bbed456e72c
-
Filesize
3.5MB
MD58784f682b99ff4d525e623544ae67e24
SHA14bc752a2fbe5964b1cdfe57f62ab80531c181912
SHA2562615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d
SHA51208a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf
-
Filesize
565B
MD5c1481210245abfff6f5babeb09ee4840
SHA1c844800a0efa7d80923904f96281d4110cdfd900
SHA2569e742f62b092a35e3bf1e3db6be2fbdd80a9d684fa370c4b7103093483bb62fe
SHA51246c01b682df9eb521f93e529143f2b9c2c2eb13db7ab85b4ddccb1a0dd85ef446ca56dabb4c24f3bd71fa347600bf9ce9c9666a9007b3402c96647b9f12eb23f
-
Filesize
4KB
MD5e395b78a4b09227317f6e62893cbb6d7
SHA1ac70c3243b0a76635c523605c4be48d797a94f1f
SHA25673ec7b9407181ac0d453b91e4502bd464ecdff2de40895aaf3fd160584e034f3
SHA512dcb4162fcf950d4a161188875947919ed621d45d728bee9a640cabde7603b5d8f027db0b3948a0dd64ddb24cd023e2fbfaf476a0feaa8ef47623bfe30a5dd63a
-
Filesize
370B
MD5f89d7224ed960771ed94c0d42149086c
SHA1ff7a4c4bc881c13566aab8705d57eecaf634d2b8
SHA2568296286a5b6ec62a303eee124957fa63e936aaca6a4b05c061c899494fc3a01a
SHA5127d5e8667893a5ed0f4b4885f5720f75ad33213c5e73907658eaab1f7dc05348847b0346f1ae909a355d6b4cf15ffa6c729a99b62f94ab6d4caeae9af5441c0d5
-
Filesize
235B
MD5ae935f7d88f7138004af65f6a71d6130
SHA1c0feba81dd5139cb7e4b88dad681433d6e7d6726
SHA2565129c50c47796f43ff887e4e94b4dc1cfe0a334bf1f9a050ec227bccd4f40e91
SHA5126a094f4ed7810ceaf2bc0ce4314d49f5cc946515be4c105f4e2d045a6662d6aae337a1909e62b3d25485f088d019cc7c09c6ad3ca162df9c45c6aad843c2a7e9
-
Filesize
1KB
MD5028d4cd290ab6fe13d6fecce144a32cc
SHA1e1d9531cb2e6bc9cab285b1f19e5d627257a3394
SHA2563f42f68eb3df49cf836fbb0019b8206af735e22f3d528e7b122fa9b2541fdde3
SHA5122f99d37a56444831298f8efaef425e5dadec938ac459bfc0cdaf3708ef8662f12bd8d687a58fc1dd6bbdac6c806214b65a21489a24d3160c1e8575968e3caa6e