Analysis
-
max time kernel
118s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
a6c13cc1c95a8d702d322eecabe62ec0N.exe
Resource
win7-20240729-en
General
-
Target
a6c13cc1c95a8d702d322eecabe62ec0N.exe
-
Size
4.9MB
-
MD5
a6c13cc1c95a8d702d322eecabe62ec0
-
SHA1
c2602eee962ef0f3cbf932f02685307360dc59c6
-
SHA256
02f5ff240230a7a694c5dbd8a8dba3374cabdbe49888969359a6c1f8f7e6cd0f
-
SHA512
1927d49c951621757b1127c3c13b58eaaa7ebaeda99de33ed0f2f434b507b7845ff306b2d586e96382ac36c56815fdea838c16a551cdff172d27d956ee524803
-
SSDEEP
49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 412 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4088 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 516 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 812 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3848 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5056 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 208 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 632 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5008 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3424 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 3464 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 3464 schtasks.exe 85 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a6c13cc1c95a8d702d322eecabe62ec0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a6c13cc1c95a8d702d322eecabe62ec0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a6c13cc1c95a8d702d322eecabe62ec0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe -
resource yara_rule behavioral2/memory/3688-3-0x000000001BF50000-0x000000001C07E000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4504 powershell.exe 4924 powershell.exe 4048 powershell.exe 2356 powershell.exe 3852 powershell.exe 1880 powershell.exe 2980 powershell.exe 2840 powershell.exe 2068 powershell.exe 404 powershell.exe 1888 powershell.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation a6c13cc1c95a8d702d322eecabe62ec0N.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wininit.exe -
Executes dropped EXE 35 IoCs
pid Process 940 tmp2F9.tmp.exe 2544 tmp2F9.tmp.exe 4152 wininit.exe 3448 tmp41E6.tmp.exe 392 tmp41E6.tmp.exe 1492 wininit.exe 536 tmp6145.tmp.exe 2320 tmp6145.tmp.exe 2400 wininit.exe 1732 tmp7E72.tmp.exe 4360 tmp7E72.tmp.exe 4980 tmp7E72.tmp.exe 4348 tmp7E72.tmp.exe 1340 tmp7E72.tmp.exe 3420 wininit.exe 2552 tmpAFB3.tmp.exe 3744 tmpAFB3.tmp.exe 3956 wininit.exe 3620 tmpE0F5.tmp.exe 316 tmpE0F5.tmp.exe 2716 wininit.exe 720 tmpFDC4.tmp.exe 1392 tmpFDC4.tmp.exe 1792 wininit.exe 2384 tmp2F34.tmp.exe 4472 tmp2F34.tmp.exe 2648 wininit.exe 3100 tmp5FF8.tmp.exe 944 tmp5FF8.tmp.exe 2840 wininit.exe 2844 tmp90AD.tmp.exe 4916 tmp90AD.tmp.exe 3208 wininit.exe 3120 tmpC152.tmp.exe 3952 tmpC152.tmp.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a6c13cc1c95a8d702d322eecabe62ec0N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a6c13cc1c95a8d702d322eecabe62ec0N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 940 set thread context of 2544 940 tmp2F9.tmp.exe 121 PID 3448 set thread context of 392 3448 tmp41E6.tmp.exe 167 PID 536 set thread context of 2320 536 tmp6145.tmp.exe 173 PID 4348 set thread context of 1340 4348 tmp7E72.tmp.exe 184 PID 2552 set thread context of 3744 2552 tmpAFB3.tmp.exe 190 PID 3620 set thread context of 316 3620 tmpE0F5.tmp.exe 196 PID 720 set thread context of 1392 720 tmpFDC4.tmp.exe 202 PID 2384 set thread context of 4472 2384 tmp2F34.tmp.exe 208 PID 3100 set thread context of 944 3100 tmp5FF8.tmp.exe 214 PID 2844 set thread context of 4916 2844 tmp90AD.tmp.exe 220 PID 3120 set thread context of 3952 3120 tmpC152.tmp.exe 226 -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\upfc.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\dllhost.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\StartMenuExperienceHost.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\RCX1AFD.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\RCX2AA3.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files (x86)\Windows Portable Devices\dllhost.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files (x86)\Windows Portable Devices\5940a34987c991 a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\StartMenuExperienceHost.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files\Internet Explorer\fr-FR\e6c9b481da804f a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\services.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\RCX269B.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\OfficeClickToRun.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\55b276f4edf653 a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\services.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\ea1d8f6d871115 a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCX11E1.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\RCX13F5.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\upfc.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\c5b4cb5e9653cc a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files\WindowsApps\dllhost.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Program Files\Internet Explorer\fr-FR\OfficeClickToRun.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\PLA\fontdrvhost.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Windows\twain_32\RCX1677.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Windows\twain_32\dwm.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Windows\ja-JP\wininit.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Windows\twain_32\dwm.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Windows\ja-JP\wininit.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Windows\PLA\5b884080fd4f94 a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Windows\ja-JP\RCX1D7F.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Windows\PLA\RCX2215.tmp a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Windows\twain_32\6cb0b6c459d5d3 a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Windows\ja-JP\56085415360792 a6c13cc1c95a8d702d322eecabe62ec0N.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..interface.resources_31bf3856ad364e35_10.0.19041.1_en-us_b21354e62a788585\Idle.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe File opened for modification C:\Windows\PLA\fontdrvhost.exe a6c13cc1c95a8d702d322eecabe62ec0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp41E6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7E72.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7E72.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7E72.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE0F5.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFDC4.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp2F34.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpC152.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp90AD.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp5FF8.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp2F9.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp6145.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7E72.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAFB3.tmp.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a6c13cc1c95a8d702d322eecabe62ec0N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings wininit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1900 schtasks.exe 516 schtasks.exe 4168 schtasks.exe 2828 schtasks.exe 2408 schtasks.exe 2384 schtasks.exe 412 schtasks.exe 4464 schtasks.exe 5064 schtasks.exe 632 schtasks.exe 2552 schtasks.exe 1840 schtasks.exe 5028 schtasks.exe 2944 schtasks.exe 4888 schtasks.exe 5056 schtasks.exe 208 schtasks.exe 5008 schtasks.exe 2956 schtasks.exe 3024 schtasks.exe 764 schtasks.exe 748 schtasks.exe 1812 schtasks.exe 1708 schtasks.exe 1452 schtasks.exe 1104 schtasks.exe 5020 schtasks.exe 2700 schtasks.exe 812 schtasks.exe 1172 schtasks.exe 2572 schtasks.exe 840 schtasks.exe 2784 schtasks.exe 1344 schtasks.exe 3848 schtasks.exe 3808 schtasks.exe 4908 schtasks.exe 3424 schtasks.exe 4052 schtasks.exe 2952 schtasks.exe 4912 schtasks.exe 4088 schtasks.exe 1080 schtasks.exe 4916 schtasks.exe 3032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 1880 powershell.exe 1880 powershell.exe 1888 powershell.exe 1888 powershell.exe 3852 powershell.exe 3852 powershell.exe 2356 powershell.exe 2356 powershell.exe 2980 powershell.exe 2980 powershell.exe 2068 powershell.exe 2068 powershell.exe 404 powershell.exe 404 powershell.exe 2840 powershell.exe 2840 powershell.exe 4504 powershell.exe 4504 powershell.exe 4924 powershell.exe 4924 powershell.exe 4048 powershell.exe 4048 powershell.exe 4504 powershell.exe 1880 powershell.exe 1888 powershell.exe 3852 powershell.exe 2980 powershell.exe 404 powershell.exe 2356 powershell.exe 2068 powershell.exe 2840 powershell.exe 4048 powershell.exe 4924 powershell.exe 4152 wininit.exe 4152 wininit.exe 1492 wininit.exe 2400 wininit.exe 3420 wininit.exe 3956 wininit.exe 2716 wininit.exe 1792 wininit.exe 2648 wininit.exe 2840 wininit.exe 3208 wininit.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 404 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 4152 wininit.exe Token: SeDebugPrivilege 1492 wininit.exe Token: SeDebugPrivilege 2400 wininit.exe Token: SeDebugPrivilege 3420 wininit.exe Token: SeDebugPrivilege 3956 wininit.exe Token: SeDebugPrivilege 2716 wininit.exe Token: SeDebugPrivilege 1792 wininit.exe Token: SeDebugPrivilege 2648 wininit.exe Token: SeDebugPrivilege 2840 wininit.exe Token: SeDebugPrivilege 3208 wininit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 940 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 119 PID 3688 wrote to memory of 940 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 119 PID 3688 wrote to memory of 940 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 119 PID 940 wrote to memory of 2544 940 tmp2F9.tmp.exe 121 PID 940 wrote to memory of 2544 940 tmp2F9.tmp.exe 121 PID 940 wrote to memory of 2544 940 tmp2F9.tmp.exe 121 PID 940 wrote to memory of 2544 940 tmp2F9.tmp.exe 121 PID 940 wrote to memory of 2544 940 tmp2F9.tmp.exe 121 PID 940 wrote to memory of 2544 940 tmp2F9.tmp.exe 121 PID 940 wrote to memory of 2544 940 tmp2F9.tmp.exe 121 PID 3688 wrote to memory of 4048 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 140 PID 3688 wrote to memory of 4048 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 140 PID 3688 wrote to memory of 2068 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 141 PID 3688 wrote to memory of 2068 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 141 PID 3688 wrote to memory of 404 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 142 PID 3688 wrote to memory of 404 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 142 PID 3688 wrote to memory of 1888 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 143 PID 3688 wrote to memory of 1888 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 143 PID 3688 wrote to memory of 1880 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 144 PID 3688 wrote to memory of 1880 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 144 PID 3688 wrote to memory of 2356 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 145 PID 3688 wrote to memory of 2356 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 145 PID 3688 wrote to memory of 3852 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 146 PID 3688 wrote to memory of 3852 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 146 PID 3688 wrote to memory of 4504 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 147 PID 3688 wrote to memory of 4504 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 147 PID 3688 wrote to memory of 2980 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 148 PID 3688 wrote to memory of 2980 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 148 PID 3688 wrote to memory of 4924 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 149 PID 3688 wrote to memory of 4924 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 149 PID 3688 wrote to memory of 2840 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 150 PID 3688 wrote to memory of 2840 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 150 PID 3688 wrote to memory of 4152 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 162 PID 3688 wrote to memory of 4152 3688 a6c13cc1c95a8d702d322eecabe62ec0N.exe 162 PID 4152 wrote to memory of 3132 4152 wininit.exe 163 PID 4152 wrote to memory of 3132 4152 wininit.exe 163 PID 4152 wrote to memory of 3688 4152 wininit.exe 164 PID 4152 wrote to memory of 3688 4152 wininit.exe 164 PID 4152 wrote to memory of 3448 4152 wininit.exe 165 PID 4152 wrote to memory of 3448 4152 wininit.exe 165 PID 4152 wrote to memory of 3448 4152 wininit.exe 165 PID 3448 wrote to memory of 392 3448 tmp41E6.tmp.exe 167 PID 3448 wrote to memory of 392 3448 tmp41E6.tmp.exe 167 PID 3448 wrote to memory of 392 3448 tmp41E6.tmp.exe 167 PID 3448 wrote to memory of 392 3448 tmp41E6.tmp.exe 167 PID 3448 wrote to memory of 392 3448 tmp41E6.tmp.exe 167 PID 3448 wrote to memory of 392 3448 tmp41E6.tmp.exe 167 PID 3448 wrote to memory of 392 3448 tmp41E6.tmp.exe 167 PID 3132 wrote to memory of 1492 3132 WScript.exe 168 PID 3132 wrote to memory of 1492 3132 WScript.exe 168 PID 1492 wrote to memory of 4888 1492 wininit.exe 169 PID 1492 wrote to memory of 4888 1492 wininit.exe 169 PID 1492 wrote to memory of 5020 1492 wininit.exe 170 PID 1492 wrote to memory of 5020 1492 wininit.exe 170 PID 1492 wrote to memory of 536 1492 wininit.exe 171 PID 1492 wrote to memory of 536 1492 wininit.exe 171 PID 1492 wrote to memory of 536 1492 wininit.exe 171 PID 536 wrote to memory of 2320 536 tmp6145.tmp.exe 173 PID 536 wrote to memory of 2320 536 tmp6145.tmp.exe 173 PID 536 wrote to memory of 2320 536 tmp6145.tmp.exe 173 PID 536 wrote to memory of 2320 536 tmp6145.tmp.exe 173 PID 536 wrote to memory of 2320 536 tmp6145.tmp.exe 173 PID 536 wrote to memory of 2320 536 tmp6145.tmp.exe 173 PID 536 wrote to memory of 2320 536 tmp6145.tmp.exe 173 -
System policy modification 1 TTPs 33 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a6c13cc1c95a8d702d322eecabe62ec0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a6c13cc1c95a8d702d322eecabe62ec0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a6c13cc1c95a8d702d322eecabe62ec0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6c13cc1c95a8d702d322eecabe62ec0N.exe"C:\Users\Admin\AppData\Local\Temp\a6c13cc1c95a8d702d322eecabe62ec0N.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\tmp2F9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2F9.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\tmp2F9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2F9.tmp.exe"3⤵
- Executes dropped EXE
PID:2544
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\ja-JP\wininit.exe"C:\Windows\ja-JP\wininit.exe"2⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4152 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cd9a2262-5a20-40eb-be5e-6a4eb9079a86.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe4⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1492 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8f92b97b-9842-4ce9-a44d-13a5fafe8cb9.vbs"5⤵PID:4888
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe6⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2400 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3c402476-f750-4fd5-83c3-c823167ea394.vbs"7⤵PID:3456
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe8⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3420 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4e151040-8b5e-452f-a3be-e426e7bbae58.vbs"9⤵PID:4152
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe10⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3956 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0373ac34-0ba1-472c-93d9-5f0e678cbc18.vbs"11⤵PID:1700
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe12⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2716 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\34a1d6fb-87d1-48d4-8bdf-3e9407d9abf2.vbs"13⤵PID:2684
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe14⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1792 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f5746ec9-0791-486a-a10c-c24fe0aea4dd.vbs"15⤵PID:3724
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe16⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2648 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a8a77a22-0ef1-4ab5-918c-88637aaa275e.vbs"17⤵PID:3632
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe18⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2840 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3c21bc56-a3bc-4986-a169-24f0b37082c3.vbs"19⤵PID:4200
-
C:\Windows\ja-JP\wininit.exeC:\Windows\ja-JP\wininit.exe20⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3208 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eed7b46d-98b5-4c9e-92b8-f73774f3e1eb.vbs"21⤵PID:1464
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\df3e9824-7521-46de-be5b-c3794c3c72ba.vbs"21⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\tmpC152.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpC152.tmp.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\tmpC152.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpC152.tmp.exe"22⤵
- Executes dropped EXE
PID:3952
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e8eb994e-14ac-4214-9727-2da3a315e9a0.vbs"19⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\tmp90AD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp90AD.tmp.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\tmp90AD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp90AD.tmp.exe"20⤵
- Executes dropped EXE
PID:4916
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\86eb7f32-f3b9-4cb7-bc4f-737b97ce28c5.vbs"17⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5FF8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5FF8.tmp.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\tmp5FF8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5FF8.tmp.exe"18⤵
- Executes dropped EXE
PID:944
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3f54fa21-bb2c-4661-9624-e639edc670fb.vbs"15⤵PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2F34.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2F34.tmp.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\tmp2F34.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2F34.tmp.exe"16⤵
- Executes dropped EXE
PID:4472
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\039cdab9-8ed8-4ad7-ba3c-0bf819c4d8b1.vbs"13⤵PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\tmpFDC4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFDC4.tmp.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:720 -
C:\Users\Admin\AppData\Local\Temp\tmpFDC4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFDC4.tmp.exe"14⤵
- Executes dropped EXE
PID:1392
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\735599db-3bd4-4531-a569-023c5ae8c9f1.vbs"11⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\tmpE0F5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE0F5.tmp.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\tmpE0F5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE0F5.tmp.exe"12⤵
- Executes dropped EXE
PID:316
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dfc64997-5582-4bcd-98f7-4ce6f1bd3517.vbs"9⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\tmpAFB3.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAFB3.tmp.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\tmpAFB3.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAFB3.tmp.exe"10⤵
- Executes dropped EXE
PID:3744
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\95321496-e65d-4875-aeff-8ed938f599ee.vbs"7⤵PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7E72.tmp.exe"11⤵
- Executes dropped EXE
PID:1340
-
-
-
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fcd10ad4-6b56-4bbf-a729-8bd6ecfa4670.vbs"5⤵PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\tmp6145.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6145.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\tmp6145.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6145.tmp.exe"6⤵
- Executes dropped EXE
PID:2320
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0b2b04f4-a755-42a3-95fa-ac4a60441a73.vbs"3⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\tmp41E6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp41E6.tmp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\tmp41E6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp41E6.tmp.exe"4⤵
- Executes dropped EXE
PID:392
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Windows\twain_32\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\twain_32\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Windows\twain_32\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Windows\ja-JP\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\ja-JP\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Windows\ja-JP\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\PLA\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\PLA\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Windows\PLA\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\fr-FR\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\fr-FR\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Program Files\Internet Explorer\fr-FR\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Public\AccountPictures\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Public\AccountPictures\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4052
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD585cabb1f1792e994127b3d59a7dd4c7b
SHA15d614cbd601b053551ba6a6553566955b8df4318
SHA256e95ba84b9c9e71f4d3d0dfe58cad3ebd734fd715da0c252ae3a5a3d9e03c1a53
SHA5120ff1e0a01850c02b8be0273f0a1208efcc8897ed070cd0926aba5dd672bf9f341b5caf62ca0c6e0ab5b540bf47081d20d3ef44f09d23e7a4d19564a4f2e93268
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD54a667f150a4d1d02f53a9f24d89d53d1
SHA1306e125c9edce66f28fdb63e6c4ca5c9ad6e8c97
SHA256414659decfd237dde09625a49811e03b5b30ee06ee2ee97ea8bcfac394d281fd
SHA5124edd8e73ce03488a6d92750a782cd4042fbb54a5b3f8d8ba3ea227fda0653c2cd84f0c5d64976c7cdc1f518a2fdc8ff10e2a015ec7acf3cd01b0d62bc98542d8
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
704B
MD5b2b1debc24b242ae5281241747c1f366
SHA1b9fc25f3d86603643a00ea09b5691657c24e3cb5
SHA256858ff67f23b12bf5db78f72d5c1b656b1b649e66bc8ec24e20c885c1caceb3da
SHA51273fec248241967f3d6257cfcb1da56f5135f717d865b23c2f498b6cd2f05214e0d28e509a9d3d2ae60b7af10186f7dd8bcf7c69ce1e3f34828488d45c06e4904
-
Filesize
480B
MD58faf8748326b16abeea08c58cad5d1e7
SHA1b9e7ecf37237896640deac5d7efa0fabbdfdc3b5
SHA256738b006a86272b06b94a72a3d5a5366392b31ed3a080ccba2c74798f7e841274
SHA512e0769ac959fcdf8e699895209ddb602ed782a131358b1b6dc791cc7d330c5d6f0097cfe830d38a8d6bf60535b71d0fe48c9b6e1b836b410df9af1d8f0831b85d
-
Filesize
704B
MD5d89d28070b405a34d35a084763de0abe
SHA13983cf99460c77301c04904072ffe3baf5219ccb
SHA2565184869cc9e033a7efbb18f3f746fc8ebf14e0d328d8474dc1fc269c197370ad
SHA512aea96fd23d5d955134b6a41fc52c67f1f54854b44f71205da0a35dac66160d81a5e5cdcb461b4e718ee0a92fd900839d121b9e780c82c7499754f03547f21379
-
Filesize
704B
MD55f07ba94f4193b8a3cd2786c37a1b9d2
SHA1061e2cdb58b59b6f5dd107724f6da4d69643a189
SHA2568ca73ee1818c0881875d0cfe0f4b16774ed3b1f87305d1cfcfccf9f56b251226
SHA5127b0d108ef965596e178c014a944e6779663f225d02cdfaf3a68dd550b149a1a67dc1bf8f72dedf1007b8b1fec6bd162b46000c1401ab87de95ff3e6dad034ea5
-
Filesize
704B
MD5dc3cae5f422c9d847cb48c112a378622
SHA162b16ad90fcf0a0346420276bbb7921ce31b70d4
SHA256ce709ef725b15de64c03d10af374959a1193d2e148dff8107b5758ee8e15cb49
SHA512b555de253835a9f936e5fcb21471e80d1cce0912f07b7f272cb2118fb78c0053e52c081ecd4cc329cdc8adecf956288a1dd83987a7e86b87583e95f6a7efd837
-
Filesize
704B
MD5687806beef859cbefdf8516f64887706
SHA1575ed503512d2a0cda6335d16fcc53ecf95bc308
SHA256f7e0bac10e77c25a428831631df1864f6a8bb00a02423daf513bd0da2b12f2d9
SHA51278c7a26e0cff8908ff18da40ac39be97def0d0c7cfa7d4d68d549396d8629aefde2beb07279e1eac1b05100b74ba46b091f650a91cd1c283c2fcae32ec4fc9f0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
704B
MD5fab332fc72635747b2dd47a0e5f00c4e
SHA16d2ee68b0db7fa4d014c383cf4713e178272b140
SHA2566c646578f3bd843498ca2a9e7f3c49c2d06d17c66580aba6a47f83f5e51e370d
SHA5126f16d7b8060631785db9f9c43e62f886340e8148ea3898f18f0c844b0f383f391f44eb45f9c967289680de8b8605c1c64d068c6029dee9b00a0a35df53fa59a6
-
Filesize
704B
MD57b3e7e6a1860e7f308233762a73d4e7a
SHA1e2f18ebec96ee4142877c5825ec1c67115087609
SHA256ad7a82da2d61048199ce6b3d5273426efa384a5451e636d9a8ac0f7a53303ab6
SHA5125e3ebd0443ce5f5f84888f29e081983089e10980090b36d78361a7ce203604c2e48efbc43d93f729355299cd4f83a0453ec50b308772ac6a8ada13c99cd539f7
-
Filesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
Filesize
4.9MB
MD542b28f99458b66f9a17bbdf74284b06e
SHA1a4b3af9f23e26048b14666f679fdbfd188aa421e
SHA2565ad0beffdfb4a6229967f2e65668b517afe8156fcfb27ab7e43bf362094c22e3
SHA512e332045638d4b52511c6620061e271061d98b2e57a418bf97b21530142e527d98774c976efd09b0eb27edecb7e96ca6b2c75108896ac420a32fab35952d620f4
-
Filesize
4.9MB
MD5b9da4011b6b168aa1c270d4475695504
SHA143aaa90f55a427387bd148e2bc0595270671a931
SHA2567daa2eb1d7e96c9a51c0e12d25560c5999ed9cd31c6d614d0f64afae5b3a65b8
SHA51205205c489b0ac9a6007b66ebcc1ec437f6559ae2f4effb3a726cd359223e843cdc318b45462c219a2ef82ebd0e5928bca867470ef7e7b8d92bcb56f0c134a0d4
-
Filesize
4.9MB
MD50ad26f42b50d8564a7a2a00c2765ae3b
SHA1dce44c1742a95be95856daa5c782aedd20c0e0b8
SHA25677d2e06f7864978751c7a3960a92958eb79765865fb50a3dbe557666e10b53f9
SHA512a40efc80b06ce588444e17069b25b8bad194915352dfc2fb1db78a62391bdcf91fb80d8af25ad3f3a609281c9358b04738bd9c48c88331b6530524399d0cfe6f
-
Filesize
4.9MB
MD5a6c13cc1c95a8d702d322eecabe62ec0
SHA1c2602eee962ef0f3cbf932f02685307360dc59c6
SHA25602f5ff240230a7a694c5dbd8a8dba3374cabdbe49888969359a6c1f8f7e6cd0f
SHA5121927d49c951621757b1127c3c13b58eaaa7ebaeda99de33ed0f2f434b507b7845ff306b2d586e96382ac36c56815fdea838c16a551cdff172d27d956ee524803