Analysis
-
max time kernel
119s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe
Resource
win10v2004-20241007-en
General
-
Target
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe
-
Size
1.9MB
-
MD5
38c14805a17436bc0118dfaa6547eec0
-
SHA1
77ee261fd0d14577058bd1114bfd4a34aa0990e6
-
SHA256
afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081
-
SHA512
bfec5fa0c4d45ebcc26bf18f3ccf0ea9b6bc6de62ce1ddfc012ef69f42c2bf45d90a3dc5f6537e62e6d0e30247eb0c2b5495249b01d0b158b6a73dd29e657754
-
SSDEEP
24576:W7/weHc1lJq2tB/pw97SSwEWJSwDFrs7+6pa7gv6a9MrYetY5Q62xo2CPV84uMY1:qqpji7SxFgz7XM7metv6s2N8W
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\", \"C:\\MSOCache\\All Users\\WMIADAP.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\", \"C:\\MSOCache\\All Users\\WMIADAP.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\OSPPSVC.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\", \"C:\\MSOCache\\All Users\\WMIADAP.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\OSPPSVC.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\sppsvc.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\", \"C:\\MSOCache\\All Users\\WMIADAP.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\OSPPSVC.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\sppsvc.exe\", \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\1033\\dllhost.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\", \"C:\\MSOCache\\All Users\\WMIADAP.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\OSPPSVC.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\sppsvc.exe\", \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\1033\\dllhost.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1472 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 2964 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 2964 schtasks.exe 31 -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2364 powershell.exe 816 powershell.exe 2344 powershell.exe 2080 powershell.exe 2512 powershell.exe 2180 powershell.exe 2352 powershell.exe 2552 powershell.exe 1156 powershell.exe 996 powershell.exe 588 powershell.exe 2940 powershell.exe 1804 powershell.exe 916 powershell.exe 1148 powershell.exe 324 powershell.exe 2296 powershell.exe 2304 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\MSOCache\\All Users\\WMIADAP.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\sppsvc.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\1033\\dllhost.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\wininit.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\MSOCache\\All Users\\WMIADAP.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\OSPPSVC.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Microsoft.NET\\Primary Interop Assemblies\\OSPPSVC.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\sppsvc.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\1033\\dllhost.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe\"" afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC685A51B84928445FB710A1E5C0EE7DD3.TMP csc.exe File created \??\c:\Windows\System32\9w3j6e.exe csc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\OSPPSVC.exe afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\1610b97d3ab4a7 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2996 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2996 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2136 schtasks.exe 2008 schtasks.exe 2424 schtasks.exe 2196 schtasks.exe 2636 schtasks.exe 2036 schtasks.exe 1472 schtasks.exe 1616 schtasks.exe 3056 schtasks.exe 2844 schtasks.exe 2996 schtasks.exe 2244 schtasks.exe 332 schtasks.exe 2200 schtasks.exe 2676 schtasks.exe 1636 schtasks.exe 1440 schtasks.exe 3048 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 588 powershell.exe Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 996 powershell.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeDebugPrivilege 816 powershell.exe Token: SeDebugPrivilege 2296 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeDebugPrivilege 2272 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2428 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 35 PID 1056 wrote to memory of 2428 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 35 PID 1056 wrote to memory of 2428 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 35 PID 2428 wrote to memory of 1864 2428 csc.exe 37 PID 2428 wrote to memory of 1864 2428 csc.exe 37 PID 2428 wrote to memory of 1864 2428 csc.exe 37 PID 1056 wrote to memory of 2364 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 53 PID 1056 wrote to memory of 2364 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 53 PID 1056 wrote to memory of 2364 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 53 PID 1056 wrote to memory of 2552 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 54 PID 1056 wrote to memory of 2552 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 54 PID 1056 wrote to memory of 2552 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 54 PID 1056 wrote to memory of 1156 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 55 PID 1056 wrote to memory of 1156 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 55 PID 1056 wrote to memory of 1156 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 55 PID 1056 wrote to memory of 996 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 56 PID 1056 wrote to memory of 996 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 56 PID 1056 wrote to memory of 996 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 56 PID 1056 wrote to memory of 2180 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 57 PID 1056 wrote to memory of 2180 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 57 PID 1056 wrote to memory of 2180 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 57 PID 1056 wrote to memory of 2352 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 58 PID 1056 wrote to memory of 2352 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 58 PID 1056 wrote to memory of 2352 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 58 PID 1056 wrote to memory of 588 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 59 PID 1056 wrote to memory of 588 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 59 PID 1056 wrote to memory of 588 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 59 PID 1056 wrote to memory of 2940 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 60 PID 1056 wrote to memory of 2940 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 60 PID 1056 wrote to memory of 2940 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 60 PID 1056 wrote to memory of 1804 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 61 PID 1056 wrote to memory of 1804 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 61 PID 1056 wrote to memory of 1804 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 61 PID 1056 wrote to memory of 916 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 62 PID 1056 wrote to memory of 916 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 62 PID 1056 wrote to memory of 916 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 62 PID 1056 wrote to memory of 2080 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 63 PID 1056 wrote to memory of 2080 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 63 PID 1056 wrote to memory of 2080 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 63 PID 1056 wrote to memory of 2344 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 64 PID 1056 wrote to memory of 2344 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 64 PID 1056 wrote to memory of 2344 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 64 PID 1056 wrote to memory of 816 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 65 PID 1056 wrote to memory of 816 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 65 PID 1056 wrote to memory of 816 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 65 PID 1056 wrote to memory of 1148 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 66 PID 1056 wrote to memory of 1148 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 66 PID 1056 wrote to memory of 1148 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 66 PID 1056 wrote to memory of 324 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 67 PID 1056 wrote to memory of 324 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 67 PID 1056 wrote to memory of 324 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 67 PID 1056 wrote to memory of 2512 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 68 PID 1056 wrote to memory of 2512 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 68 PID 1056 wrote to memory of 2512 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 68 PID 1056 wrote to memory of 2296 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 70 PID 1056 wrote to memory of 2296 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 70 PID 1056 wrote to memory of 2296 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 70 PID 1056 wrote to memory of 2304 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 71 PID 1056 wrote to memory of 2304 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 71 PID 1056 wrote to memory of 2304 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 71 PID 1056 wrote to memory of 1956 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 89 PID 1056 wrote to memory of 1956 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 89 PID 1056 wrote to memory of 1956 1056 afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe 89 PID 1956 wrote to memory of 3024 1956 cmd.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe"C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ddjce1jp\ddjce1jp.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5E.tmp" "c:\Windows\System32\CSC685A51B84928445FB710A1E5C0EE7DD3.TMP"3⤵PID:1864
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\WMIADAP.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\OSPPSVC.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bCyKkots12.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe"C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081Na" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081Na" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD538c14805a17436bc0118dfaa6547eec0
SHA177ee261fd0d14577058bd1114bfd4a34aa0990e6
SHA256afe966f7d7d027792cc718eba58d9ee3e7b2929e9cb3eed8902537d8c375e081
SHA512bfec5fa0c4d45ebcc26bf18f3ccf0ea9b6bc6de62ce1ddfc012ef69f42c2bf45d90a3dc5f6537e62e6d0e30247eb0c2b5495249b01d0b158b6a73dd29e657754
-
Filesize
1KB
MD5bdfddd8b50f363e7a32baab1de69a583
SHA1d806aae10ebe017dd9c9cb77fed50d655728ed47
SHA2567e1cf0ee30681949e87d1c6364ad9f3c17fa599784f82bc613c9bdc16507f10d
SHA512e40d720c44f2be99227caeb5226e609c7fa274436b9dbd2a050f8bf65fc77d7a9502499c3b9f567bcf3029d9f4f5fafa109b78f213644df95cb3c0f2a0d4ebb9
-
Filesize
231B
MD5b4f7aa1299251f289f2130fb4899a70a
SHA18c88ae53cf29cbd59c68ef1ea2a5bba5b736b71f
SHA25680651dcd7ee8d1b4a78959abc0f16f2a66137918a95064366522b8c7acb63f69
SHA512f2dae4f40a7c27478c944089c24500dddb47aa794ea67371881eb53dd54c95adb90585ccf70bc618769411430fe73debafe18d2915315dc3aee7b201e6272d36
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8H01JCG3S7MD9KCI5323.temp
Filesize7KB
MD5bc5e0af80f7d8ead9c227f97ad359ad4
SHA1463ac8aac993284363cf173c5349ee5931a596cd
SHA25624b8033f5496602dba57da8edf9bbe67e94fed3c5a080cc7cd5004f7bf70b5e3
SHA512acc853dbf62ee9e8630ff1d87b7610ccb7deebe56948c672445668c913f5620ceaa3e12e1a492267b34aa3c112fe9170b8c14008e947b73d5773061432b632ee
-
Filesize
392B
MD5ceaed59eeac03431d20f0bd67f32750f
SHA18c2373b565b78939c1569eabe64e672c2faf11d7
SHA256a4e534d4f3680e35a8c7e413a02b89667c5dfab35744ccf850a23e6651da24c8
SHA5128e3df332687424479dfe9da25c409dbcf9258678af6cc1d0c8768c236ee1663c23ef41b26ead34b5ec3a1f833fe66fba251948af3f945eecaf557ead47583fe7
-
Filesize
235B
MD5209e6d90c9388d04febb43209c3e0b12
SHA147d738f2ad28f19df99bce6ca22181f0547579a2
SHA25605e7e93c854156d85d721970bfb6680e02891ef6400b613517ebccd2014fd6de
SHA512e86f0f039b5cbf9c41746f2145c955797fba759615f0a517a0efe6b5aa647f016ef38c9cbf93a9a58a325a20cd8c4a05c836bf586fdef21673603f54136b22a4
-
Filesize
1KB
MD570046c6c63d509bb29450ef32b59dda3
SHA126802b73997ee22a7cd3d07ae77016969603cf00
SHA256dd0e7409cd9412eafdd8f881d6094fb539ad19c7a54d76043de655a00f80f5d0
SHA512d7b8d4ed84b8e1f5e416c378872bb7bc6d884341f0aa76f2c3b664f1ad0324a2d749c51718f3940d61663d152c35ba241ce0def03a002c6423a4d0957866c96f