Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe
Resource
win10v2004-20240802-en
General
-
Target
f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe
-
Size
874KB
-
MD5
a6a1abaf12a28ea8f6553356c3bdcf57
-
SHA1
b7613fb9944bc3d8e11b5eb6f7ff706f04e8ad53
-
SHA256
f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76
-
SHA512
e525d119128c1ca1c05d379b9ebba9791b7b15390c8999773bff6517fde674178e17ee2c7c126b249c8c54b4dd1c07326ba24d52c8c192f067bc7e8545113a65
-
SSDEEP
24576:rdsjsPnQQYY1U6G34Ck2Eo+sr4Kj6BKGd7a0:Esp566G3w236KjjGd7a0
Malware Config
Signatures
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5056 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1320 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 384 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3548 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 856 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 1788 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 1788 schtasks.exe 93 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3384 powershell.exe 2200 powershell.exe 2728 powershell.exe 4412 powershell.exe 2536 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe -
Executes dropped EXE 1 IoCs
pid Process 4684 dllhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe File created C:\Program Files\Microsoft Office 15\ClientX64\5940a34987c991 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe File created C:\Program Files\7-Zip\Lang\BackgroundTransferHost.exe f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe File created C:\Program Files\7-Zip\Lang\766532ba8a13d2 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\diagnostics\SearchApp.exe f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5064 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5064 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe 3496 schtasks.exe 5056 schtasks.exe 1648 schtasks.exe 2284 schtasks.exe 2324 schtasks.exe 2904 schtasks.exe 4984 schtasks.exe 1500 schtasks.exe 3068 schtasks.exe 1320 schtasks.exe 384 schtasks.exe 3548 schtasks.exe 856 schtasks.exe 2104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4684 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 3384 powershell.exe Token: SeDebugPrivilege 4684 dllhost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3384 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 109 PID 2116 wrote to memory of 3384 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 109 PID 2116 wrote to memory of 2536 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 110 PID 2116 wrote to memory of 2536 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 110 PID 2116 wrote to memory of 2200 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 111 PID 2116 wrote to memory of 2200 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 111 PID 2116 wrote to memory of 4412 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 112 PID 2116 wrote to memory of 4412 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 112 PID 2116 wrote to memory of 2728 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 113 PID 2116 wrote to memory of 2728 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 113 PID 2116 wrote to memory of 4452 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 119 PID 2116 wrote to memory of 4452 2116 f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe 119 PID 4452 wrote to memory of 4344 4452 cmd.exe 121 PID 4452 wrote to memory of 4344 4452 cmd.exe 121 PID 4452 wrote to memory of 5064 4452 cmd.exe 122 PID 4452 wrote to memory of 5064 4452 cmd.exe 122 PID 4452 wrote to memory of 4684 4452 cmd.exe 128 PID 4452 wrote to memory of 4684 4452 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe"C:\Users\Admin\AppData\Local\Temp\f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\upfc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\AccountPictures\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\BackgroundTransferHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\Lang\BackgroundTransferHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wZjsux2jpd.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5064
-
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BackgroundTransferHostB" /sc MINUTE /mo 10 /tr "'C:\Users\Default\BackgroundTransferHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BackgroundTransferHost" /sc ONLOGON /tr "'C:\Users\Default\BackgroundTransferHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BackgroundTransferHostB" /sc MINUTE /mo 8 /tr "'C:\Users\Default\BackgroundTransferHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BackgroundTransferHostB" /sc MINUTE /mo 9 /tr "'C:\Program Files\7-Zip\Lang\BackgroundTransferHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BackgroundTransferHost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\BackgroundTransferHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BackgroundTransferHostB" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\BackgroundTransferHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1500
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
874KB
MD5a6a1abaf12a28ea8f6553356c3bdcf57
SHA1b7613fb9944bc3d8e11b5eb6f7ff706f04e8ad53
SHA256f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76
SHA512e525d119128c1ca1c05d379b9ebba9791b7b15390c8999773bff6517fde674178e17ee2c7c126b249c8c54b4dd1c07326ba24d52c8c192f067bc7e8545113a65
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
186B
MD5016f2a32277c695675ed7642ff26aaee
SHA170cf4aeb86f2e96ac52a2785bb07e190c3774616
SHA256a05f33836ddd3a4b268d62332141309da9c0ee91b1a67d8dcb59d47714280000
SHA5122ba1d2e1a046b83dac93063cf7262639d38346768256b32a16f3fdd6b1fbf023a51f404aa3e224534049ef6d40236e939976158a440505e80957d3468f43b873