Analysis
-
max time kernel
127s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 12:45
Behavioral task
behavioral1
Sample
javaw.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
javaw.exe
Resource
win10ltsc2021-20241023-en
Errors
General
-
Target
javaw.exe
-
Size
858KB
-
MD5
ea2dd294adcba588fb4e947640fc6274
-
SHA1
5c6aaee79b68a9aadd5635600c35b26032347191
-
SHA256
6cb03004ec84fff242274e857dde5879044fc6e482c29ce9a06bc8e83cb5ddba
-
SHA512
e91cca7e41aa6f3415206e7ae445f7c25bc408f91f5037ca7333c66bc13ee094d582772d4fcfd502c423ff22928fb07085954e51175b99bdc2da3fef38785a4f
-
SSDEEP
12288:Bez6kUa93Bd4pgZ82pK60gXz5EOPIMI/jS5wzqMVv:BapV938pgq21+voFM
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exejavaw.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4132 schtasks.exe 4616 schtasks.exe 3760 schtasks.exe 544 schtasks.exe 3488 schtasks.exe 1384 schtasks.exe 1448 schtasks.exe 3656 schtasks.exe 2340 schtasks.exe 4708 schtasks.exe 2628 schtasks.exe 1696 schtasks.exe 2760 schtasks.exe 3320 schtasks.exe 4532 schtasks.exe 2036 schtasks.exe 2404 schtasks.exe 3932 schtasks.exe 972 schtasks.exe File created C:\Windows\LiveKernelReports\5940a34987c991 javaw.exe 4032 schtasks.exe 1356 schtasks.exe 3012 schtasks.exe 3776 schtasks.exe 4544 schtasks.exe 4308 schtasks.exe 3120 schtasks.exe 2888 schtasks.exe 2292 schtasks.exe 2908 schtasks.exe 2272 schtasks.exe 4804 schtasks.exe 4560 schtasks.exe 2216 schtasks.exe 1052 schtasks.exe 1852 schtasks.exe 1316 schtasks.exe 3164 schtasks.exe 5112 schtasks.exe 2936 schtasks.exe 4380 schtasks.exe 1856 schtasks.exe 1216 schtasks.exe 4784 schtasks.exe 2888 schtasks.exe 5012 schtasks.exe 1084 schtasks.exe 4456 schtasks.exe 2968 schtasks.exe 5076 schtasks.exe File created C:\Windows\Tasks\c5b4cb5e9653cc javaw.exe 2676 schtasks.exe 4312 schtasks.exe 2144 schtasks.exe 2620 schtasks.exe 328 schtasks.exe 824 schtasks.exe 1916 schtasks.exe 1436 schtasks.exe 1660 schtasks.exe 4380 schtasks.exe 4460 schtasks.exe 2964 schtasks.exe 704 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1384 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3320 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3488 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1356 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4784 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5112 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4804 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4380 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 736 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1428 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 704 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3628 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4336 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3776 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4032 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3996 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4308 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3656 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3120 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4380 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 328 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4132 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 824 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4708 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4392 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4616 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4460 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 4904 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 4904 schtasks.exe -
Processes:
resource yara_rule behavioral1/memory/2196-1-0x0000000000B80000-0x0000000000C5C000-memory.dmp dcrat C:\Windows\Tasks\services.exe dcrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
javaw.exejavaw.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation javaw.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation javaw.exe -
Executes dropped EXE 1 IoCs
Processes:
backgroundTaskHost.exepid process 2676 backgroundTaskHost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 ipinfo.io 26 ipinfo.io -
Drops file in Program Files directory 22 IoCs
Processes:
javaw.exejavaw.exedescription ioc process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\dllhost.exe javaw.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\5940a34987c991 javaw.exe File created C:\Program Files (x86)\Windows Mail\sppsvc.exe javaw.exe File created C:\Program Files\Windows Defender\fr-FR\cf2222726e2100 javaw.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\winlogon.exe javaw.exe File created C:\Program Files\Windows Defender\ja-JP\RuntimeBroker.exe javaw.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe javaw.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\9e8d7a4ca61bd9 javaw.exe File created C:\Program Files (x86)\Windows Portable Devices\services.exe javaw.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\taskhostw.exe javaw.exe File created C:\Program Files (x86)\Windows Mail\0a1fd5f707cd16 javaw.exe File created C:\Program Files\Common Files\DESIGNER\upfc.exe javaw.exe File created C:\Program Files\Windows Defender\fr-FR\Taskmgr.exe javaw.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\cc11b995f2a76d javaw.exe File created C:\Program Files (x86)\Windows Portable Devices\c5b4cb5e9653cc javaw.exe File created C:\Program Files\Windows Mail\66fc9ff0ee96c2 javaw.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\ea9f0e6c9e2dcd javaw.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\dwm.exe javaw.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\6cb0b6c459d5d3 javaw.exe File created C:\Program Files\Windows Defender\ja-JP\9e8d7a4ca61bd9 javaw.exe File created C:\Program Files\Windows Mail\sihost.exe javaw.exe File created C:\Program Files\Common Files\DESIGNER\ea1d8f6d871115 javaw.exe -
Drops file in Windows directory 8 IoCs
Processes:
javaw.exejavaw.exedescription ioc process File created C:\Windows\Performance\WinSAT\DataStore\RuntimeBroker.exe javaw.exe File created C:\Windows\Performance\WinSAT\DataStore\9e8d7a4ca61bd9 javaw.exe File created C:\Windows\ShellComponents\fontdrvhost.exe javaw.exe File created C:\Windows\ShellComponents\5b884080fd4f94 javaw.exe File created C:\Windows\LiveKernelReports\dllhost.exe javaw.exe File created C:\Windows\LiveKernelReports\5940a34987c991 javaw.exe File created C:\Windows\Tasks\services.exe javaw.exe File created C:\Windows\Tasks\c5b4cb5e9653cc javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 8752 taskkill.exe 8444 taskkill.exe 7488 taskkill.exe 8252 taskkill.exe -
Modifies registry class 2 IoCs
Processes:
javaw.exetaskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings javaw.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2964 schtasks.exe 2404 schtasks.exe 2676 schtasks.exe 2760 schtasks.exe 3012 schtasks.exe 2144 schtasks.exe 736 schtasks.exe 5012 schtasks.exe 2272 schtasks.exe 4616 schtasks.exe 2700 schtasks.exe 1216 schtasks.exe 4784 schtasks.exe 5112 schtasks.exe 4336 schtasks.exe 4544 schtasks.exe 544 schtasks.exe 1288 schtasks.exe 4784 schtasks.exe 704 schtasks.exe 2292 schtasks.exe 4460 schtasks.exe 3480 schtasks.exe 3932 schtasks.exe 2888 schtasks.exe 2908 schtasks.exe 3760 schtasks.exe 2236 schtasks.exe 1008 schtasks.exe 1140 schtasks.exe 2376 schtasks.exe 3216 schtasks.exe 4804 schtasks.exe 972 schtasks.exe 3752 schtasks.exe 1856 schtasks.exe 1052 schtasks.exe 4708 schtasks.exe 1084 schtasks.exe 1476 schtasks.exe 3120 schtasks.exe 328 schtasks.exe 824 schtasks.exe 2620 schtasks.exe 1696 schtasks.exe 4456 schtasks.exe 1384 schtasks.exe 2552 schtasks.exe 4392 schtasks.exe 4544 schtasks.exe 1448 schtasks.exe 2240 schtasks.exe 3776 schtasks.exe 5068 schtasks.exe 1660 schtasks.exe 4380 schtasks.exe 4132 schtasks.exe 3164 schtasks.exe 1852 schtasks.exe 2340 schtasks.exe 1356 schtasks.exe 2936 schtasks.exe 2628 schtasks.exe 2216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
javaw.exetaskmgr.exejavaw.exebackgroundTaskHost.exepid process 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2196 javaw.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 5028 javaw.exe 2596 taskmgr.exe 2596 taskmgr.exe 5028 javaw.exe 5028 javaw.exe 2676 backgroundTaskHost.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2676 backgroundTaskHost.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2596 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
javaw.exetaskmgr.exejavaw.exebackgroundTaskHost.exedescription pid process Token: SeDebugPrivilege 2196 javaw.exe Token: SeDebugPrivilege 2596 taskmgr.exe Token: SeSystemProfilePrivilege 2596 taskmgr.exe Token: SeCreateGlobalPrivilege 2596 taskmgr.exe Token: SeDebugPrivilege 5028 javaw.exe Token: SeDebugPrivilege 2676 backgroundTaskHost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe 2596 taskmgr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
javaw.execmd.exejavaw.exedescription pid process target process PID 2196 wrote to memory of 1640 2196 javaw.exe cmd.exe PID 2196 wrote to memory of 1640 2196 javaw.exe cmd.exe PID 1640 wrote to memory of 800 1640 cmd.exe w32tm.exe PID 1640 wrote to memory of 800 1640 cmd.exe w32tm.exe PID 1640 wrote to memory of 5028 1640 cmd.exe javaw.exe PID 1640 wrote to memory of 5028 1640 cmd.exe javaw.exe PID 5028 wrote to memory of 2676 5028 javaw.exe backgroundTaskHost.exe PID 5028 wrote to memory of 2676 5028 javaw.exe backgroundTaskHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\javaw.exe"C:\Users\Admin\AppData\Local\Temp\javaw.exe"1⤵
- DcRat
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oX8JZZHZ8s.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\javaw.exe"C:\Users\Admin\AppData\Local\Temp\javaw.exe"3⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Default\Pictures\backgroundTaskHost.exe"C:\Users\Default\Pictures\backgroundTaskHost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:544
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1140
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:1824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:2200
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:2052
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:1144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1200
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:4740
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:3024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:3556
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:3896
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:2528
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:3516
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:1896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:3480
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1608
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:3212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:4184
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:1080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5000
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:796
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:3216
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:1596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1440
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:3352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1068
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1052
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1100
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1384
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1944
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:2956
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5220
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:4352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5300
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5356
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5412
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5476
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5604
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5704
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5808
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5852
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5900
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5936
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6008
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:5444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6068
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5240
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1280
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:5492
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6156
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7328
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6232
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6328
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6412
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6480
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6584
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6680
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im crss.exe & taskkill /f /im wininit.exe & taskkill /f /im winlogon.exe & taskkill /f /im svchost.exe5⤵PID:6696
-
C:\Windows\system32\taskkill.exetaskkill /f /im crss.exe6⤵
- Kills process with taskkill
PID:7488
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im wininit.exe6⤵
- Kills process with taskkill
PID:8252
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im winlogon.exe6⤵
- Kills process with taskkill
PID:8752
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im svchost.exe6⤵
- Kills process with taskkill
PID:8444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6776
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6852
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7140
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6720
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:6104
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:2712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7212
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:7532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7300
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7448
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7544
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7640
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7884
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:7968
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8012
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8092
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8132
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:8732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:4636
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:9020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:1020
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:9004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:3572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8224
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:9136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8516
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:9036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8956
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:2024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:9028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:9144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:8252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Or3SRhMf8V.bat" "5⤵PID:3312
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\LiveKernelReports\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\LiveKernelReports\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Links\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Links\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Links\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\Default\NetHood\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Default\NetHood\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Users\Default\NetHood\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Windows\Tasks\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\Tasks\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Windows\Tasks\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Pictures\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Public\Pictures\TextInputHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Pictures\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Defender\ja-JP\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\ja-JP\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\ja-JP\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Local Settings\upfc.exe'" /f1⤵
- Process spawned unexpected child process
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Default\Local Settings\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Local Settings\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4032
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Mail\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Saved Games\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Saved Games\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Common Files\DESIGNER\upfc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\Common Files\DESIGNER\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\DESIGNER\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Windows\Performance\WinSAT\DataStore\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Windows\Performance\WinSAT\DataStore\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Common Files\Adobe\Acrobat\dwm.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe\Acrobat\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\Adobe\Acrobat\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:4456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaaSMedicAgentW" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Desktop\WaaSMedicAgent.exe'" /f1⤵PID:4760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaaSMedicAgent" /sc ONLOGON /tr "'C:\Users\Admin\Desktop\WaaSMedicAgent.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaaSMedicAgentW" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Desktop\WaaSMedicAgent.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:3164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Pictures\backgroundTaskHost.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Default\Pictures\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Pictures\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:3760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Windows\ShellComponents\fontdrvhost.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\ShellComponents\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Windows\ShellComponents\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TaskmgrT" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\fr-FR\Taskmgr.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Taskmgr" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\fr-FR\Taskmgr.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TaskmgrT" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\fr-FR\Taskmgr.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:3932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\winlogon.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\winlogon.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57f3c0ae41f0d9ae10a8985a2c327b8fb
SHA1d58622bf6b5071beacf3b35bb505bde2000983e3
SHA256519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900
SHA5128a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125
-
Filesize
19B
MD52020ae7235e4ca2d098b2a6acfd6a923
SHA1b390363f25cf5539bbaefffe4805893a3fd4f016
SHA256caec56565830252605e355886227771736c3d40808a423e97f93a2dcb632a34e
SHA51213a3b1ebec1f09d0eee9866e8c403c66a29fb530b0c9056246d623e495fac915b5868471b51d95c869636eded94b6115d234a645971d27e7b14eeeda5ecbf9fa
-
Filesize
208B
MD5257382920af9718588314be02d411761
SHA12926b87524964d3ddf931ce27cb720a05a20aa99
SHA256053644d9f635d5287094af8f88f8a632102b6609113318b36afbab3c36018dd0
SHA512507493eae14303b2185829fdc18d285d72d67ef18335be0d05ebce77d5e7b8269d7a30ee76b7e7c9ab946e198b838e4c8c1e709fba0c7763b65cdd526389aec2
-
Filesize
858KB
MD5ea2dd294adcba588fb4e947640fc6274
SHA15c6aaee79b68a9aadd5635600c35b26032347191
SHA2566cb03004ec84fff242274e857dde5879044fc6e482c29ce9a06bc8e83cb5ddba
SHA512e91cca7e41aa6f3415206e7ae445f7c25bc408f91f5037ca7333c66bc13ee094d582772d4fcfd502c423ff22928fb07085954e51175b99bdc2da3fef38785a4f