Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
Resource
win10v2004-20240802-en
General
-
Target
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe
-
Size
3.5MB
-
MD5
8784f682b99ff4d525e623544ae67e24
-
SHA1
4bc752a2fbe5964b1cdfe57f62ab80531c181912
-
SHA256
2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d
-
SHA512
08a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf
-
SSDEEP
98304:74qk4B+JfG/r17Z64wNlnadfucOS+MgZk:7HJr/r17Z64SaebRy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\", \"C:\\Users\\Admin\\RuntimeBroker.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\", \"C:\\Users\\Admin\\RuntimeBroker.exe\", \"C:\\Program Files\\Windows Portable Devices\\System.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\", \"C:\\Users\\Admin\\RuntimeBroker.exe\", \"C:\\Program Files\\Windows Portable Devices\\System.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\", \"C:\\Users\\Admin\\RuntimeBroker.exe\", \"C:\\Program Files\\Windows Portable Devices\\System.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\", \"C:\\Users\\Admin\\RuntimeBroker.exe\", \"C:\\Program Files\\Windows Portable Devices\\System.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\RuntimeBroker.exe\", \"C:\\Program Files\\Windows Portable Devices\\System.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows Portable Devices\\System.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Process spawned unexpected child process 30 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 440 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4704 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3912 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3144 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4068 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3432 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5248 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4672 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6004 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1456 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3424 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5988 3736 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4048 3736 schtasks.exe 86 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 376 powershell.exe 5036 powershell.exe 4652 powershell.exe 1560 powershell.exe 1504 powershell.exe 1600 powershell.exe 2344 powershell.exe 2548 powershell.exe 4424 powershell.exe 1704 powershell.exe 3756 powershell.exe 1072 powershell.exe 3976 powershell.exe 2912 powershell.exe 4116 powershell.exe 2760 powershell.exe 864 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Deletes itself 1 IoCs
pid Process 5568 System.exe -
Executes dropped EXE 1 IoCs
pid Process 5568 System.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Program Files (x86)\\Windows Defender\\de-DE\\backgroundTaskHost.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\Admin\\RuntimeBroker.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Windows Portable Devices\\System.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Windows NT\\RuntimeBroker.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\SearchApp.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\Admin\\RuntimeBroker.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Windows Portable Devices\\System.exe\"" 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCF1277D10748B4DACAD868CBF3B7BAC.TMP csc.exe File created \??\c:\Windows\System32\9hsi6j.exe csc.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Windows NT\9e8d7a4ca61bd9 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files (x86)\Windows Defender\de-DE\eddb19405b7ce1 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files\Windows NT\RuntimeBroker.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files\Windows Portable Devices\System.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File opened for modification C:\Program Files\Windows Portable Devices\System.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files\Windows Portable Devices\27d1bcfc3c54e0 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files (x86)\Windows Multimedia Platform\SearchApp.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files (x86)\Windows Multimedia Platform\38384e6a620884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe File created C:\Program Files (x86)\Windows Defender\de-DE\backgroundTaskHost.exe 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5156 PING.EXE 4068 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings System.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5156 PING.EXE 4068 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2892 schtasks.exe 1008 schtasks.exe 3432 schtasks.exe 1740 schtasks.exe 1388 schtasks.exe 2036 schtasks.exe 4800 schtasks.exe 1644 schtasks.exe 2408 schtasks.exe 3172 schtasks.exe 440 schtasks.exe 4704 schtasks.exe 3912 schtasks.exe 4068 schtasks.exe 5092 schtasks.exe 4732 schtasks.exe 4936 schtasks.exe 3144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 3976 powershell.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 1560 powershell.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 4652 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 3756 powershell.exe Token: SeDebugPrivilege 4116 powershell.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeDebugPrivilege 1072 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeDebugPrivilege 5568 System.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3960 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 90 PID 2884 wrote to memory of 3960 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 90 PID 3960 wrote to memory of 4676 3960 csc.exe 92 PID 3960 wrote to memory of 4676 3960 csc.exe 92 PID 2884 wrote to memory of 4116 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 108 PID 2884 wrote to memory of 4116 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 108 PID 2884 wrote to memory of 376 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 109 PID 2884 wrote to memory of 376 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 109 PID 2884 wrote to memory of 2344 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 110 PID 2884 wrote to memory of 2344 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 110 PID 2884 wrote to memory of 2760 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 111 PID 2884 wrote to memory of 2760 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 111 PID 2884 wrote to memory of 2912 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 112 PID 2884 wrote to memory of 2912 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 112 PID 2884 wrote to memory of 3976 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 113 PID 2884 wrote to memory of 3976 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 113 PID 2884 wrote to memory of 1704 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 114 PID 2884 wrote to memory of 1704 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 114 PID 2884 wrote to memory of 1600 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 115 PID 2884 wrote to memory of 1600 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 115 PID 2884 wrote to memory of 1072 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 116 PID 2884 wrote to memory of 1072 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 116 PID 2884 wrote to memory of 1504 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 117 PID 2884 wrote to memory of 1504 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 117 PID 2884 wrote to memory of 1560 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 118 PID 2884 wrote to memory of 1560 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 118 PID 2884 wrote to memory of 4652 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 120 PID 2884 wrote to memory of 4652 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 120 PID 2884 wrote to memory of 4424 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 121 PID 2884 wrote to memory of 4424 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 121 PID 2884 wrote to memory of 2548 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 122 PID 2884 wrote to memory of 2548 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 122 PID 2884 wrote to memory of 864 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 123 PID 2884 wrote to memory of 864 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 123 PID 2884 wrote to memory of 5036 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 124 PID 2884 wrote to memory of 5036 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 124 PID 2884 wrote to memory of 3756 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 125 PID 2884 wrote to memory of 3756 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 125 PID 2884 wrote to memory of 2336 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 142 PID 2884 wrote to memory of 2336 2884 2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe 142 PID 2336 wrote to memory of 5808 2336 cmd.exe 144 PID 2336 wrote to memory of 5808 2336 cmd.exe 144 PID 2336 wrote to memory of 5156 2336 cmd.exe 145 PID 2336 wrote to memory of 5156 2336 cmd.exe 145 PID 2336 wrote to memory of 5568 2336 cmd.exe 146 PID 2336 wrote to memory of 5568 2336 cmd.exe 146 PID 5568 wrote to memory of 6108 5568 System.exe 161 PID 5568 wrote to memory of 6108 5568 System.exe 161 PID 6108 wrote to memory of 4736 6108 cmd.exe 163 PID 6108 wrote to memory of 4736 6108 cmd.exe 163 PID 6108 wrote to memory of 4068 6108 cmd.exe 164 PID 6108 wrote to memory of 4068 6108 cmd.exe 164 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f3vmvu3z\f3vmvu3z.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBA28.tmp" "c:\Windows\System32\CSCF1277D10748B4DACAD868CBF3B7BAC.TMP"3⤵PID:4676
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\de-DE\backgroundTaskHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\SearchApp.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uhpf48iHoY.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5808
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5156
-
-
C:\Program Files\Windows Portable Devices\System.exe"C:\Program Files\Windows Portable Devices\System.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yvohz7Nokj.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:6108 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4068
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows NT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d2" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d2" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3172
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "RuntimeBroker" /f1⤵
- Process spawned unexpected child process
PID:5248
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "RuntimeBrokerR" /f1⤵
- Process spawned unexpected child process
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "backgroundTaskHost" /f1⤵
- Process spawned unexpected child process
PID:4672
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "backgroundTaskHostb" /f1⤵
- Process spawned unexpected child process
PID:6004
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "SearchApp" /f1⤵
- Process spawned unexpected child process
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "SearchAppS" /f1⤵
- Process spawned unexpected child process
PID:1456
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "RuntimeBroker" /f1⤵
- Process spawned unexpected child process
PID:3424
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "RuntimeBrokerR" /f1⤵
- Process spawned unexpected child process
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "System" /f1⤵
- Process spawned unexpected child process
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "SystemS" /f1⤵
- Process spawned unexpected child process
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d" /f1⤵
- Process spawned unexpected child process
PID:5988
-
C:\Windows\system32\schtasks.exeschtasks.exe /delete /tn "2615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d2" /f1⤵
- Process spawned unexpected child process
PID:4048
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD55e55154f678d614a716dce1117b9b97d
SHA129c862ccebfbdbb78be83b998ce47f14844c3d98
SHA256a9a8ffa9d701ec7ca0aa6a53514555f556e4733f7a2bb4744d76c3a077314c33
SHA5126ecfe3394ce7edb1707e7b2f48d42929e98a9f09f3ce1e6b0e614557bccf1c82b5ffdc7bf7da8fa62f568809572706513b5acf36b1e6654a16ff210fb336ba12
-
Filesize
245B
MD5c747c899b5b1fd21df9800ea3721f798
SHA1378e7101b32c84b238c526bc51ed0828ba457ef1
SHA256c84304cd623dca0149b104c6d880c549f87f7a4de88f391d865e6cd41807fc74
SHA5120f2b4ffa52d5c390b1cd193049f16aa6aede34a15be022097235af71522a725cba002416e9066856e25eca6bda09c70af4850bf6aa0df70f9c324633b59462fc
-
Filesize
463B
MD59d59b3bbe87893a47fca77be6173378a
SHA1da3adda02b678a6b90f912c3c9615e0d67d2252b
SHA256c5c95175fb9e5cd6d16aab620de2e456675f3c81f9751a4db0a2345beaa26ec9
SHA51219b751b1256e238fff140aafbd6033af4e0ceee8f7ebb1f5e82d63912d8ba63a87232485013e869b7be241fb779aebcac23e09ad81d908cb05cb615270cb8776
-
Filesize
3.5MB
MD58784f682b99ff4d525e623544ae67e24
SHA14bc752a2fbe5964b1cdfe57f62ab80531c181912
SHA2562615270e7885e810c6aecd156b2e926271134966a21813eac8136d5ec7a4d23d
SHA51208a376c53e2488067e6145d7583478ceef1ae7d01aeedc185d84e849fba89dd201bc8720ff291c65ceb3e4b7223fe08d2e7ae01c070ef4bf0461f3e6531eaeaf
-
Filesize
390B
MD56ef3deed3ff571d08621cbae72d3a92d
SHA15ec540ef96667cf093663514fc887b199e93b51b
SHA256009ed7d9db3b210e64990171ce64c8156354aab5c853ccd47dbb67d4bd404aae
SHA512184b39310392680ab50b2176dc411a0cf7ba5250c8d5a605f21bb56459158995cf3ae3d0a2761d36bb38e55fc26c678d94dd2f3fdf68b8b630656fa44b20c4fe
-
Filesize
943B
MD523aeb76ad87e6cc58de0e9e7b8deacb1
SHA12a5fae50b55de5d4c232cbfac4f1b430e04d1bca
SHA25698861d786e810edba50d7e03c2b8350320c973a8a600564eae58b0877910d2e4
SHA5120516e131ee7286ec288b37a90229e3287c7c559b7fb5b5a65290ba2b3a52739243e3d4d01a075a0da76a5d49a09ce1948b78db5c5efb3d2bb24d7955ef222d0e
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
Filesize
944B
MD5aaaac7c68d2b7997ed502c26fd9f65c2
SHA17c5a3731300d672bf53c43e2f9e951c745f7fbdf
SHA2568724dc2c3c8e8f17aeefae44a23741b1ea3b43c490fbc52fd61575ffe1cd82bb
SHA512c526febd9430413b48bed976edd9a795793ad1f06c8ff4f6b768b4ad63f4d2f06b9da72d4fcfa7cb9530a64e2dc3554f5ad97fd0ab60129701d175f2724ef1ac
-
Filesize
240B
MD5a78e291abdfa0d2ccef2efdf89b2d733
SHA1e3119ffe4ce1c2818ad2dc45b0c674043f1266d2
SHA2568ed45f48573af117248a0a971ab9befec5ca75a399c7e57e220396f3df02d32c
SHA5127fa89055ed017ec3c17a4ea2febcba5301bc721a7418f8e9738d405766737054fa857ffff81f0f880665767085498349f3e1d0d2cdc9b7b681514bd2be3732b8
-
Filesize
1KB
MD55d9765b168a0ced24aa6c7f18274ba97
SHA1f2328e2d58bb1314145ac869f62157bd64e04046
SHA2564cb7a2566b3bf33051b9737151a31229e6bcd9bc7a740f533a055cd151ce63d9
SHA5124b4737a7d6faa7b3b8e37309b3bd66f93586c9a4bb8b89fde7c31fde609577f36e26ecf8c713cf57fa6458ca9337bd3a3cec617f98343c7e6e61b4942bf96813
-
Filesize
257B
MD54f4a01b674489260cbba62a5ccb58fae
SHA152ff83c6095431fb01f7de0b1507b9fcd3a97942
SHA256e348a037c37471adc099938a8130eca2e35189d380839b09167311bc6d2b0757
SHA512b9f824fa7e0465e50fee66c4413b3a9e632f06f3e830fb71012490701c84c210181188d63da3e6d73fe3284b112dc5af87dfa1df4cc27a1c5ede257586ddd527
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
62B
MD51456f967e6b322fa81c31f73cbb61229
SHA17c4a30f62c8352177231b1216b74e7ae3728c46d
SHA2565d0da1b898487cf23dd7783bdde813ca5f3b9da92fb95268061792c7229d9c6f
SHA512a5531161775fdc3af25729f40cf2be61b9a9997aaeeedb8ec81b89943ee0f1f43a81cbcfbd50eaeede421746e190758f2d670f8c106a3b3340aa8a4f55598c45
-
Filesize
180B
MD5a3daf25779aacc2571e9974032840cfb
SHA124206a07a5960acbaa7e99291e5f2cda71391813
SHA2566e941adc8ef12132ef7b0f8f93238dc18b2bf4904c01a1c826684c536d0575e9
SHA5127013811b50e6dd32897a030489c36fee9c2bd4429bf272f059dd125f8bee3028219bd5d973f207da66f3f3d9ed4823c3a68fe57a435577971ddddcb1bc45d465
-
Filesize
4KB
MD57ffa7abcc7bc9974913a1fd014f3f822
SHA1b839ca344c192676d29e7ca87cee076cc5ec00fc
SHA256e56a223a4d827f7b4912632f586a41d12cc3a944446c57d4002f37b9a5ac1062
SHA5126c7e1678cce66f65b8d613b29c3cb8282823fc6185ee561adf2638c0ecfb313fea9a223656fd41cfec0ccd86e9a78ff91b319e4e7327767b731ec705d284c2c1
-
Filesize
377B
MD544b39f64cf24edb3f2be8bd18dc06f1b
SHA1471e5c6472aac405baf0fcf2e85126144fb99492
SHA2561d53c7456e3f3e85a158006c59bcd27e52f470d2e7fe42d1a84d480bcfb07276
SHA512b021b2fba83a9a4a39848d71da4e38e0796c5c548024e6e06284fabaa0978f0414ac7f6e0cb689985dc2cdb558dc9af3cc76bf1a0f2322fb1e1bc9aff949ce49
-
Filesize
235B
MD5f27106fc9bafeef06439a8fd3535d7b1
SHA1bb18a00f5c075e6801a7cbf36d87fb19cc5ce4f2
SHA256e2b048ba5f232612ae5925bea43288051d3c6a6d4b3bd75a959a163e148e3ccf
SHA51215170c15e6074cead633258fa6423c5b6823e3d2ccd1cf4ce0ca91003031b153d21ef6aca510bede23c10050c987091c4b925bb1d44f9810deaa9a44b3594710
-
Filesize
1KB
MD5da358acc1c776804f760de9f97ab5559
SHA1038168a232be9db3c170b6d8dccac62cfbb8e969
SHA256f46ed0361ae7838e338b8dad157daf7c0848d76dfe0f2d9db12bb64bed6ef343
SHA51297cea7270ba86a760adf14409ecad511999f591b680fb6ac62c6c75957257feb22f6a2fefe673b2c648a3935ffe192bc3cb16e965c2bdf83d6140b38dfeb9f3b