Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe
-
Size
22KB
-
MD5
89bce4ab9a378ee68a3e3530100a2027
-
SHA1
f7b0ba175fd0d0704dbdc1fe8ad4f07b1e258464
-
SHA256
40a58a77003f43a2b91b0b86447d25ca46e3f185773fd4f66d9e1b7025bbc9c0
-
SHA512
e633eb966251315b4d40f4485ff4358301c64e52cd421fe27ab3bb095a660722b811104418308d61b41a8880fb0174e9cf53b2325c3c2022a4c36ac07218967b
-
SSDEEP
384:hSBdZloPjR4H86977jX717zesClsBgd1Wj2lqFINw6MOqtUQ:hKdXoPl4Hl7jL1S2k1C9OGl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 rund1132.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 rund1132.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\rund1132.exe 89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe File created C:\WINDOWS\SystemDir.bat rund1132.exe File created C:\WINDOWS\Teniyingxiong.ini rund1132.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3312 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rund1132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2376 rund1132.exe 2376 rund1132.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 rund1132.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3784 89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe 2376 rund1132.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 2376 3784 89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe 87 PID 3784 wrote to memory of 2376 3784 89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe 87 PID 3784 wrote to memory of 2376 3784 89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe 87 PID 2376 wrote to memory of 4632 2376 rund1132.exe 88 PID 2376 wrote to memory of 4632 2376 rund1132.exe 88 PID 2376 wrote to memory of 4632 2376 rund1132.exe 88 PID 4632 wrote to memory of 3312 4632 cmd.exe 90 PID 4632 wrote to memory of 3312 4632 cmd.exe 90 PID 4632 wrote to memory of 3312 4632 cmd.exe 90 PID 4632 wrote to memory of 2360 4632 cmd.exe 91 PID 4632 wrote to memory of 2360 4632 cmd.exe 91 PID 4632 wrote to memory of 2360 4632 cmd.exe 91 PID 2360 wrote to memory of 5112 2360 net.exe 92 PID 2360 wrote to memory of 5112 2360 net.exe 92 PID 2360 wrote to memory of 5112 2360 net.exe 92 PID 4632 wrote to memory of 3560 4632 cmd.exe 93 PID 4632 wrote to memory of 3560 4632 cmd.exe 93 PID 4632 wrote to memory of 3560 4632 cmd.exe 93 PID 4632 wrote to memory of 2032 4632 cmd.exe 94 PID 4632 wrote to memory of 2032 4632 cmd.exe 94 PID 4632 wrote to memory of 2032 4632 cmd.exe 94 PID 4632 wrote to memory of 3552 4632 cmd.exe 95 PID 4632 wrote to memory of 3552 4632 cmd.exe 95 PID 4632 wrote to memory of 3552 4632 cmd.exe 95 PID 4632 wrote to memory of 2240 4632 cmd.exe 96 PID 4632 wrote to memory of 2240 4632 cmd.exe 96 PID 4632 wrote to memory of 2240 4632 cmd.exe 96 PID 4632 wrote to memory of 3444 4632 cmd.exe 97 PID 4632 wrote to memory of 3444 4632 cmd.exe 97 PID 4632 wrote to memory of 3444 4632 cmd.exe 97 PID 4632 wrote to memory of 3920 4632 cmd.exe 98 PID 4632 wrote to memory of 3920 4632 cmd.exe 98 PID 4632 wrote to memory of 3920 4632 cmd.exe 98 PID 4632 wrote to memory of 3548 4632 cmd.exe 99 PID 4632 wrote to memory of 3548 4632 cmd.exe 99 PID 4632 wrote to memory of 3548 4632 cmd.exe 99 PID 4632 wrote to memory of 5024 4632 cmd.exe 100 PID 4632 wrote to memory of 5024 4632 cmd.exe 100 PID 4632 wrote to memory of 5024 4632 cmd.exe 100 PID 4632 wrote to memory of 3092 4632 cmd.exe 101 PID 4632 wrote to memory of 3092 4632 cmd.exe 101 PID 4632 wrote to memory of 3092 4632 cmd.exe 101 PID 4632 wrote to memory of 4088 4632 cmd.exe 102 PID 4632 wrote to memory of 4088 4632 cmd.exe 102 PID 4632 wrote to memory of 4088 4632 cmd.exe 102 PID 4632 wrote to memory of 3948 4632 cmd.exe 103 PID 4632 wrote to memory of 3948 4632 cmd.exe 103 PID 4632 wrote to memory of 3948 4632 cmd.exe 103 PID 4632 wrote to memory of 4084 4632 cmd.exe 104 PID 4632 wrote to memory of 4084 4632 cmd.exe 104 PID 4632 wrote to memory of 4084 4632 cmd.exe 104 PID 4632 wrote to memory of 3440 4632 cmd.exe 105 PID 4632 wrote to memory of 3440 4632 cmd.exe 105 PID 4632 wrote to memory of 3440 4632 cmd.exe 105 PID 4632 wrote to memory of 4256 4632 cmd.exe 106 PID 4632 wrote to memory of 4256 4632 cmd.exe 106 PID 4632 wrote to memory of 4256 4632 cmd.exe 106 PID 4632 wrote to memory of 3168 4632 cmd.exe 107 PID 4632 wrote to memory of 3168 4632 cmd.exe 107 PID 4632 wrote to memory of 3168 4632 cmd.exe 107 PID 4632 wrote to memory of 544 4632 cmd.exe 108 PID 4632 wrote to memory of 544 4632 cmd.exe 108 PID 4632 wrote to memory of 544 4632 cmd.exe 108 PID 4632 wrote to memory of 3388 4632 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\WINDOWS\rund1132.exeC:\WINDOWS\rund1132.exe C:\Users\Admin\AppData\Local\Temp\89bce4ab9a378ee68a3e3530100a2027_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\WINDOWS\SystemDir.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\sc.exesc config Schedule start= AUTO4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\net.exenet start schedule4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule5⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
C:\Windows\SysWOW64\at.exeAT 0:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Windows\SysWOW64\at.exeAT 1:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\at.exeAT 2:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\SysWOW64\at.exeAT 3:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\at.exeAT 4:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\at.exeAT 5:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\at.exeAT 6:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Windows\SysWOW64\at.exeAT 7:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:5024
-
-
C:\Windows\SysWOW64\at.exeAT 8:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Windows\SysWOW64\at.exeAT 9:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\at.exeAT 10:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\SysWOW64\at.exeAT 11:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Windows\SysWOW64\at.exeAT 12:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Windows\SysWOW64\at.exeAT 13:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\at.exeAT 14:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3168
-
-
C:\Windows\SysWOW64\at.exeAT 15:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Windows\SysWOW64\at.exeAT 16:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\at.exeAT 17:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1288
-
-
C:\Windows\SysWOW64\at.exeAT 18:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\at.exeAT 19:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\at.exeAT 20:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Windows\SysWOW64\at.exeAT 21:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:992
-
-
C:\Windows\SysWOW64\at.exeAT 22:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\at.exeAT 23:00 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:732
-
-
C:\Windows\SysWOW64\at.exeAT 0:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Windows\SysWOW64\at.exeAT 1:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Windows\SysWOW64\at.exeAT 2:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:3972
-
-
C:\Windows\SysWOW64\at.exeAT 3:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\SysWOW64\at.exeAT 4:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\at.exeAT 5:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\at.exeAT 6:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\at.exeAT 7:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\at.exeAT 8:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\at.exeAT 9:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\at.exeAT 10:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\at.exeAT 11:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Windows\SysWOW64\at.exeAT 12:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\at.exeAT 13:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\SysWOW64\at.exeAT 14:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\at.exeAT 15:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\at.exeAT 16:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4712
-
-
C:\Windows\SysWOW64\at.exeAT 17:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Windows\SysWOW64\at.exeAT 18:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\at.exeAT 19:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\SysWOW64\at.exeAT 20:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\at.exeAT 21:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\at.exeAT 22:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\at.exeAT 23:30 /interactive /every:M,T,W,Th,F,S,Su C:\WINDOWS\rund1132.exe4⤵
- System Location Discovery: System Language Discovery
PID:4268
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD510e2f7de449e709034d8e3f645ffbfd0
SHA1c1af15c66194014a7bc3433ea764f609a3a357dd
SHA256021189bf84dd3ba86178cd85a903d4ef41e80396710a368f5d6b0586e987662e
SHA512a16925febe5e39b3c89843f151544b71d62843ee7d0090c20a3f323b91739a8fd5e365d32f5b3473102689b30bfd5763015897b75137ef6dba9da5beead08dee
-
Filesize
22KB
MD559d7bf47a8d769e2b8587ff1bb8d8f80
SHA15481e9456d3d9ced9fc0eb1084c8edac3e1f5a1c
SHA25678cb850c4314896c6d88af6fc688762cbb1eca6a7e7335692f32183450e245a4
SHA5127488666f2b7701bbf795cab7a49d6fb01c35d0f259415908cf2da6b211c9e173b88bfb10dd13fdf8dcb4ca36b30a8ff1c1ca20362e4ecb88777e29888c974d63