Analysis
-
max time kernel
922s -
max time network
849s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 21:29
General
-
Target
liberium executor.exe
-
Size
3.1MB
-
MD5
a83c74ddda692ff3e4279ef4d1e1ab6b
-
SHA1
f807912389ed16a9d7ac3e3e7b73282658c6ecf0
-
SHA256
46136025a4d84640710a3c3ab05588b2ff288c7294ea3d855061b67609839cf6
-
SHA512
70b79b90362b50fa52762554161f962535aff171f4cf3147afb960b5aba302cc8d969eb2168f331653b114b4199201be4ef5cd3bb97c67547708e2622e72874b
-
SSDEEP
49152:Svdt62XlaSFNWPjljiFa2RoUYIsSDsKdpvVoGdqTHHB72eh2NT:Svf62XlaSFNWPjljiFXRoUYIsCsE
Malware Config
Extracted
quasar
1.4.1
Office04
192.0.0.0.1:4782
92adbb05-a27e-42e8-b9a2-c260d01e742b
-
encryption_key
46B4B3697EBEA35C7930856CF4E60FB52D50DE37
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
executor
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2492-1-0x0000000000A20000-0x0000000000D44000-memory.dmp family_quasar behavioral1/files/0x0008000000023c8a-6.dat family_quasar -
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 64 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid Process 2680 Client.exe 3192 Client.exe 5136 Client.exe 5860 Client.exe 1300 Client.exe 4512 Client.exe 6104 Client.exe 6032 Client.exe 2348 Client.exe 4920 Client.exe 5872 Client.exe 4428 Client.exe 3488 Client.exe 220 Client.exe 3844 Client.exe 6072 Client.exe 2288 Client.exe 1672 Client.exe 5396 Client.exe 5572 Client.exe 5564 Client.exe 5752 Client.exe 6128 Client.exe 4324 Client.exe 4024 Client.exe 5952 Client.exe 3624 Client.exe 5824 Client.exe 5376 Client.exe 2124 Client.exe 2752 Client.exe 2676 Client.exe 5028 Client.exe 5948 Client.exe 4520 Client.exe 6016 Client.exe 4276 Client.exe 2592 Client.exe 5308 Client.exe 4680 Client.exe 408 Client.exe 2252 Client.exe 4288 Client.exe 1204 Client.exe 3684 Client.exe 2936 Client.exe 5388 Client.exe 5856 Client.exe 3172 Client.exe 180 Client.exe 2588 Client.exe 2088 Client.exe 2020 Client.exe 5532 Client.exe 5804 Client.exe 1116 Client.exe 5488 Client.exe 2964 Client.exe 2016 Client.exe 3780 Client.exe 5480 Client.exe 5876 Client.exe 5744 Client.exe 6028 Client.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in Program Files directory 64 IoCs
Processes:
liberium executor.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc Process File created C:\Program Files\SubDir\Client.exe liberium executor.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir liberium executor.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe File opened for modification C:\Program Files\SubDir\Client.exe Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 3692 PING.EXE 880 PING.EXE 1892 PING.EXE 460 PING.EXE 1588 PING.EXE 4304 PING.EXE 3312 PING.EXE 3848 PING.EXE 5256 PING.EXE 5832 PING.EXE 4168 PING.EXE 2604 PING.EXE 5700 PING.EXE 5776 PING.EXE 6128 PING.EXE 5656 PING.EXE 5840 PING.EXE 2764 PING.EXE 1072 PING.EXE 2008 PING.EXE 1064 PING.EXE 5712 PING.EXE 4696 PING.EXE 4788 PING.EXE 2456 PING.EXE 2512 PING.EXE 1424 PING.EXE 3936 PING.EXE 2772 PING.EXE 3524 PING.EXE 1484 PING.EXE 5756 PING.EXE 3796 PING.EXE 5764 PING.EXE 3936 PING.EXE 6088 PING.EXE 5532 PING.EXE 5944 PING.EXE 1644 PING.EXE 3804 PING.EXE 5624 PING.EXE 2240 PING.EXE 5424 PING.EXE 4328 PING.EXE 5108 PING.EXE 3460 PING.EXE 3576 PING.EXE 5776 PING.EXE 5936 PING.EXE 5916 PING.EXE 5416 PING.EXE 520 PING.EXE 1104 PING.EXE 5416 PING.EXE 4312 PING.EXE 724 PING.EXE 5432 PING.EXE 4108 PING.EXE 2572 PING.EXE 2248 PING.EXE 5024 PING.EXE 812 PING.EXE 5156 PING.EXE 5360 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Runs ping.exe 1 TTPs 64 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 3312 PING.EXE 3804 PING.EXE 1588 PING.EXE 5256 PING.EXE 5532 PING.EXE 2392 PING.EXE 4304 PING.EXE 4924 PING.EXE 844 PING.EXE 3744 PING.EXE 5944 PING.EXE 1424 PING.EXE 5024 PING.EXE 1656 PING.EXE 5528 PING.EXE 4168 PING.EXE 5432 PING.EXE 5424 PING.EXE 724 PING.EXE 4788 PING.EXE 3692 PING.EXE 5692 PING.EXE 520 PING.EXE 4172 PING.EXE 5776 PING.EXE 2512 PING.EXE 460 PING.EXE 5624 PING.EXE 1892 PING.EXE 3796 PING.EXE 460 PING.EXE 5656 PING.EXE 2248 PING.EXE 5756 PING.EXE 1104 PING.EXE 2928 PING.EXE 1916 PING.EXE 3524 PING.EXE 5712 PING.EXE 5992 PING.EXE 3580 PING.EXE 5156 PING.EXE 3936 PING.EXE 5364 PING.EXE 5776 PING.EXE 3716 PING.EXE 2008 PING.EXE 1644 PING.EXE 3088 PING.EXE 2764 PING.EXE 2572 PING.EXE 1116 PING.EXE 5416 PING.EXE 4312 PING.EXE 4696 PING.EXE 6088 PING.EXE 4108 PING.EXE 812 PING.EXE 5764 PING.EXE 680 PING.EXE 5044 PING.EXE 3460 PING.EXE 3936 PING.EXE 1484 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 2280 schtasks.exe 3560 schtasks.exe 5784 schtasks.exe 1636 schtasks.exe 4328 schtasks.exe 3740 schtasks.exe 4692 schtasks.exe 5744 schtasks.exe 1960 schtasks.exe 5404 schtasks.exe 5744 schtasks.exe 1884 schtasks.exe 1420 schtasks.exe 5808 schtasks.exe 1980 schtasks.exe 1588 schtasks.exe 2572 schtasks.exe 4632 schtasks.exe 5484 schtasks.exe 5696 schtasks.exe 576 schtasks.exe 5288 schtasks.exe 4872 schtasks.exe 1980 schtasks.exe 4304 schtasks.exe 820 schtasks.exe 4124 schtasks.exe 1636 schtasks.exe 644 schtasks.exe 5720 schtasks.exe 4124 schtasks.exe 3164 schtasks.exe 5240 schtasks.exe 1836 schtasks.exe 1364 schtasks.exe 5420 schtasks.exe 1624 schtasks.exe 444 schtasks.exe 5356 schtasks.exe 2396 schtasks.exe 4772 schtasks.exe 1056 schtasks.exe 5604 schtasks.exe 5888 schtasks.exe 2548 schtasks.exe 5876 schtasks.exe 2768 schtasks.exe 5564 schtasks.exe 6044 schtasks.exe 4684 schtasks.exe 644 schtasks.exe 1860 schtasks.exe 5236 schtasks.exe 5188 schtasks.exe 1112 schtasks.exe 2548 schtasks.exe 2176 schtasks.exe 5512 schtasks.exe 2308 schtasks.exe 4784 schtasks.exe 5700 schtasks.exe 5296 schtasks.exe 1616 schtasks.exe 5304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 3300 msedge.exe 3300 msedge.exe 4800 msedge.exe 4800 msedge.exe 1392 identity_helper.exe 1392 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
Processes:
msedge.exepid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
liberium executor.exeClient.exeClient.exeAUDIODG.EXEClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid Process Token: SeDebugPrivilege 2492 liberium executor.exe Token: SeDebugPrivilege 2680 Client.exe Token: SeDebugPrivilege 3192 Client.exe Token: 33 5224 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5224 AUDIODG.EXE Token: SeDebugPrivilege 5136 Client.exe Token: SeDebugPrivilege 5860 Client.exe Token: SeDebugPrivilege 1300 Client.exe Token: SeDebugPrivilege 4512 Client.exe Token: SeDebugPrivilege 6104 Client.exe Token: SeDebugPrivilege 6032 Client.exe Token: SeDebugPrivilege 2348 Client.exe Token: SeDebugPrivilege 4920 Client.exe Token: SeDebugPrivilege 5872 Client.exe Token: SeDebugPrivilege 4428 Client.exe Token: SeDebugPrivilege 3488 Client.exe Token: SeDebugPrivilege 220 Client.exe Token: SeDebugPrivilege 3844 Client.exe Token: SeDebugPrivilege 6072 Client.exe Token: SeDebugPrivilege 2288 Client.exe Token: SeDebugPrivilege 1672 Client.exe Token: SeDebugPrivilege 5396 Client.exe Token: SeDebugPrivilege 5572 Client.exe Token: SeDebugPrivilege 5564 Client.exe Token: SeDebugPrivilege 5752 Client.exe Token: SeDebugPrivilege 6128 Client.exe Token: SeDebugPrivilege 4324 Client.exe Token: SeDebugPrivilege 4024 Client.exe Token: SeDebugPrivilege 5952 Client.exe Token: SeDebugPrivilege 3624 Client.exe Token: SeDebugPrivilege 5824 Client.exe Token: SeDebugPrivilege 5376 Client.exe Token: SeDebugPrivilege 2124 Client.exe Token: SeDebugPrivilege 2752 Client.exe Token: SeDebugPrivilege 2676 Client.exe Token: SeDebugPrivilege 5028 Client.exe Token: SeDebugPrivilege 5948 Client.exe Token: SeDebugPrivilege 4520 Client.exe Token: SeDebugPrivilege 6016 Client.exe Token: SeDebugPrivilege 4276 Client.exe Token: SeDebugPrivilege 2592 Client.exe Token: SeDebugPrivilege 5308 Client.exe Token: SeDebugPrivilege 4680 Client.exe Token: SeDebugPrivilege 408 Client.exe Token: SeDebugPrivilege 2252 Client.exe Token: SeDebugPrivilege 4288 Client.exe Token: SeDebugPrivilege 1204 Client.exe Token: SeDebugPrivilege 3684 Client.exe Token: SeDebugPrivilege 2936 Client.exe Token: SeDebugPrivilege 5388 Client.exe Token: SeDebugPrivilege 5856 Client.exe Token: SeDebugPrivilege 3172 Client.exe Token: SeDebugPrivilege 180 Client.exe Token: SeDebugPrivilege 2588 Client.exe Token: SeDebugPrivilege 2088 Client.exe Token: SeDebugPrivilege 2020 Client.exe Token: SeDebugPrivilege 5532 Client.exe Token: SeDebugPrivilege 5804 Client.exe Token: SeDebugPrivilege 1116 Client.exe Token: SeDebugPrivilege 5488 Client.exe Token: SeDebugPrivilege 2964 Client.exe Token: SeDebugPrivilege 2016 Client.exe Token: SeDebugPrivilege 3780 Client.exe Token: SeDebugPrivilege 5480 Client.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 2680 Client.exe 3192 Client.exe 5136 Client.exe 5860 Client.exe 1300 Client.exe 4512 Client.exe 6104 Client.exe 6032 Client.exe 2348 Client.exe 4920 Client.exe 5872 Client.exe 4428 Client.exe 3488 Client.exe 220 Client.exe 3844 Client.exe 6072 Client.exe 2288 Client.exe 1672 Client.exe 5396 Client.exe 5572 Client.exe 5564 Client.exe 5752 Client.exe 6128 Client.exe 4324 Client.exe 4024 Client.exe 5952 Client.exe 3624 Client.exe 5824 Client.exe 5376 Client.exe 2124 Client.exe 2752 Client.exe 2676 Client.exe 5028 Client.exe 5948 Client.exe 4520 Client.exe 6016 Client.exe 4276 Client.exe 2592 Client.exe 5308 Client.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 2680 Client.exe 3192 Client.exe 5136 Client.exe 5860 Client.exe 1300 Client.exe 4512 Client.exe 6104 Client.exe 6032 Client.exe 2348 Client.exe 4920 Client.exe 5872 Client.exe 4428 Client.exe 3488 Client.exe 220 Client.exe 3844 Client.exe 6072 Client.exe 2288 Client.exe 1672 Client.exe 5396 Client.exe 5572 Client.exe 5564 Client.exe 5752 Client.exe 6128 Client.exe 4324 Client.exe 4024 Client.exe 5952 Client.exe 3624 Client.exe 5824 Client.exe 5376 Client.exe 2124 Client.exe 2752 Client.exe 2676 Client.exe 5028 Client.exe 5948 Client.exe 4520 Client.exe 6016 Client.exe 4276 Client.exe 2592 Client.exe 5308 Client.exe 4680 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
liberium executor.exemsedge.exedescription pid Process procid_target PID 2492 wrote to memory of 4632 2492 liberium executor.exe 84 PID 2492 wrote to memory of 4632 2492 liberium executor.exe 84 PID 2492 wrote to memory of 2680 2492 liberium executor.exe 86 PID 2492 wrote to memory of 2680 2492 liberium executor.exe 86 PID 4800 wrote to memory of 4792 4800 msedge.exe 89 PID 4800 wrote to memory of 4792 4800 msedge.exe 89 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3296 4800 msedge.exe 90 PID 4800 wrote to memory of 3300 4800 msedge.exe 91 PID 4800 wrote to memory of 3300 4800 msedge.exe 91 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 PID 4800 wrote to memory of 4404 4800 msedge.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\liberium executor.exe"C:\Users\Admin\AppData\Local\Temp\liberium executor.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4632
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2680 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WqZsAAIjaG43.bat" "3⤵PID:4780
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:4252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:4172
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3192 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f5⤵PID:4424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2MNFUnZxL8Mc.bat" "5⤵PID:1072
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:2032
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3848
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5136 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lTnp6K60TrZl.bat" "7⤵PID:5404
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:5588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5256
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5860 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:5888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0rvuHqCZPsHI.bat" "9⤵PID:6000
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:6072
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6088
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1300 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:5304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vw1G8XCL9gXv.bat" "11⤵PID:5360
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:1312
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5700
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f13⤵PID:4920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ebBymdyOwvax.bat" "13⤵PID:5732
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:5568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4108
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6104 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f15⤵PID:6124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TchHSeHvxbCf.bat" "15⤵PID:1212
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3000
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2572
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6032 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f17⤵PID:6016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wmMpgfZxLFfB.bat" "17⤵PID:5300
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:5336
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5532
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2348 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tqNVQMjpwSaJ.bat" "19⤵PID:3040
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:1596
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5776
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"20⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4920 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:5808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SXzE6imRchzi.bat" "21⤵PID:5580
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:1328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
PID:1116
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5872 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6MHAjiXyxqAS.bat" "23⤵PID:5260
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:2016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
PID:3580
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4428 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:4304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AiHo3L2aeUKN.bat" "25⤵PID:2396
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:6016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4788
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f27⤵PID:5060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gHCDcwWq1Jao.bat" "27⤵PID:4156
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:4024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5156
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:220 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:5484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0WO9l7qOp6y2.bat" "29⤵PID:5072
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:5800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5776
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3844 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:5564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3fYGzNZAhU93.bat" "31⤵PID:5884
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:1836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5936
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6072 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:5744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OtnTadpAtsHo.bat" "33⤵PID:1312
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4268
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6128
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2288 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f35⤵PID:4288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\n29g1IibaJQG.bat" "35⤵PID:1252
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:5144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3692
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"36⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1672 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:5236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zT3K4mrhL3DI.bat" "37⤵PID:4884
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:2744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5656
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"38⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5396 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:5356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cC8iUWbUrWQm.bat" "39⤵PID:5068
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:4852
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
PID:2392
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5572 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:5512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XIUHtUfdQcLJ.bat" "41⤵PID:5556
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:3260
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5360
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5564 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f43⤵PID:5948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NEzxrTutMYyB.bat" "43⤵PID:1836
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:5244
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵PID:5372
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5752 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:1960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ikUZiQ4XisGM.bat" "45⤵PID:180
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:5108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2456
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6128 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f47⤵PID:1312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oCoLjtAZvlAa.bat" "47⤵PID:3244
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:3176
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4304
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4324 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:5696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RdM43kcFQ3rZ.bat" "49⤵PID:2084
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:820
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
PID:5692
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"50⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4024 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3DsEi7W75yLo.bat" "51⤵PID:2632
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:2148
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2512
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5952 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f53⤵PID:5356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v6VVzEzIuVtY.bat" "53⤵PID:1444
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:1108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
PID:3088
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3624 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:4784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OAv551RGKiNK.bat" "55⤵PID:5612
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:5244
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5832
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5824 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f57⤵PID:2368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Q25wKvcKIHPq.bat" "57⤵PID:5668
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:3256
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1424
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5376 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:5404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wo8ks4LxIWQz.bat" "59⤵PID:6088
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:5144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2248
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"60⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2124 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f61⤵PID:2400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ctkyNbgN7O2h.bat" "61⤵PID:4044
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:1156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- Runs ping.exe
PID:680
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2752 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f63⤵PID:5132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UCtUV9nTZqZ4.bat" "63⤵PID:1916
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:4384
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5024
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2676 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f65⤵PID:2168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4899UZxnZyX0.bat" "65⤵PID:5000
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:2000
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3936
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"66⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:6044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QSqtTvlF7Dj0.bat" "67⤵PID:1444
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:1484
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5916
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"68⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5948 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:2280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X0bF0OLphoIw.bat" "69⤵PID:5848
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:6068
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵PID:2064
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"70⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4520 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f71⤵
- Scheduled Task/Job: Scheduled Task
PID:5744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pnh4OL1pUJxl.bat" "71⤵PID:840
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:2460
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5416
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"72⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6016 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f73⤵PID:6012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4dNmaj1egvDN.bat" "73⤵PID:2900
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:5760
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- Runs ping.exe
PID:1656
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"74⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4276 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IHGuG6vb9FTL.bat" "75⤵PID:3448
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:5608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1072
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"76⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2592 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\w0Ww7OH79OQT.bat" "77⤵PID:5268
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:5944
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:520
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"78⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5308 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f79⤵PID:5356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EpL0jVASX9aQ.bat" "79⤵PID:2604
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:5620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- Runs ping.exe
PID:3716
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"80⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:4680 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:1884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rqYiKPiR4tDA.bat" "81⤵PID:3928
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:5632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2008
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"82⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:408 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:5700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\761HKn3Z83W2.bat" "83⤵PID:5476
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:3792
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5756
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"84⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:1836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7SzUEdTGNy8U.bat" "85⤵PID:5988
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:4780
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- Runs ping.exe
PID:5528
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"86⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f87⤵PID:1660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kwsC0zjdrcMU.bat" "87⤵PID:3692
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:3288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3312
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"88⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:5296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UVqsaudaBl5f.bat" "89⤵PID:3328
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:1716
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1104
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"90⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f91⤵PID:460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kzTK5IZH9zNz.bat" "91⤵PID:1084
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:5368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- Runs ping.exe
PID:4924
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"92⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f93⤵PID:4220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4dWIGto04Crx.bat" "93⤵PID:4168
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:5288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- Runs ping.exe
PID:5364
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"94⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5388 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hi1RIkTOZRT3.bat" "95⤵PID:5804
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:2616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3804
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"96⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:2548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VDzJjFPrna65.bat" "97⤵PID:5920
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:3588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5624
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"98⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:3560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AQvZrwIurU8b.bat" "99⤵PID:5576
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:2444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:880
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"100⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:180 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f101⤵PID:1424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yRtpiYkRkVvb.bat" "101⤵PID:5452
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:4980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2240
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"102⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:1364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ti9iXbVicjvC.bat" "103⤵PID:1608
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:4044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1892
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"104⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b4TqQq8n7Pwb.bat" "105⤵PID:1816
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:2068
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1064
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"106⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f107⤵
- Scheduled Task/Job: Scheduled Task
PID:4124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uzZ9hM6HfweG.bat" "107⤵PID:3280
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:5664
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3796
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"108⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5532 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f109⤵PID:4156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vpZQJ5Tt5ufX.bat" "109⤵PID:2620
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:2228
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵PID:2008
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"110⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5804 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f111⤵
- Scheduled Task/Job: Scheduled Task
PID:5876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MY5v5Xa1wJn7.bat" "111⤵PID:5912
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:432
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:812
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"112⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f113⤵
- Scheduled Task/Job: Scheduled Task
PID:5188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\88e7qjIYJ9FQ.bat" "113⤵PID:5584
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:3616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5416
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"114⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f115⤵PID:1436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BnI1iqU9xkU5.bat" "115⤵PID:5128
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:2240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5424
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"116⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:1636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LB4t4AVfIoVo.bat" "117⤵PID:2056
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:2608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵PID:5764
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"118⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f119⤵PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fvscXKyFFW2n.bat" "119⤵PID:1420
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:5024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- Runs ping.exe
PID:844
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"120⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "executor" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ldms9pm1QlGP.bat" "121⤵PID:3936
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:2632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-