Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 19:04
Behavioral task
behavioral1
Sample
JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe
-
Size
1.3MB
-
MD5
2dc1b0fa6b9ddfa76ffc8435a4bb5b12
-
SHA1
45899195faa8c728a887677fd4548196a6743e04
-
SHA256
03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552
-
SHA512
f8daa566116c4262819fae3038c797936e2b1fd3dc4343b30dbdb7defd6edfccff9975c970218144c0181d4c1ed50524675fddf85ab77a3ee6e65576e34d4154
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3616 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3476 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3828 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2232 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4376 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 912 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 668 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3112 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4260 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4528 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4132 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2876 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3188 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4932 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4104 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3604 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3480 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4572 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 900 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3104 840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3208 840 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000a000000023b71-9.dat dcrat behavioral2/memory/2196-13-0x0000000000760000-0x0000000000870000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4348 powershell.exe 4840 powershell.exe 1540 powershell.exe 4052 powershell.exe 4672 powershell.exe 868 powershell.exe 4928 powershell.exe 2556 powershell.exe 3376 powershell.exe 2696 powershell.exe 536 powershell.exe 1464 powershell.exe 1840 powershell.exe 1068 powershell.exe 3780 powershell.exe 2720 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 14 IoCs
pid Process 2196 DllCommonsvc.exe 1444 conhost.exe 2104 conhost.exe 1560 conhost.exe 804 conhost.exe 3616 conhost.exe 4764 conhost.exe 5024 conhost.exe 1560 conhost.exe 3032 conhost.exe 1396 conhost.exe 1820 conhost.exe 2440 conhost.exe 5024 conhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 48 raw.githubusercontent.com 49 raw.githubusercontent.com 50 raw.githubusercontent.com 15 raw.githubusercontent.com 16 raw.githubusercontent.com 24 raw.githubusercontent.com 35 raw.githubusercontent.com 41 raw.githubusercontent.com 51 raw.githubusercontent.com 52 raw.githubusercontent.com 36 raw.githubusercontent.com 40 raw.githubusercontent.com 42 raw.githubusercontent.com -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\5b884080fd4f94 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\ee2ad38f3d4382 DllCommonsvc.exe File created C:\Program Files\Microsoft Office\dllhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\upfc.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\ea1d8f6d871115 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft\fontdrvhost.exe DllCommonsvc.exe File created C:\Program Files\Microsoft Office\5940a34987c991 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\Idle.exe DllCommonsvc.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\RemotePackages\RemoteApps\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Windows\Performance\csrss.exe DllCommonsvc.exe File created C:\Windows\Performance\886983d96e3d3e DllCommonsvc.exe File created C:\Windows\IME\smss.exe DllCommonsvc.exe File created C:\Windows\IME\69ddcba757bf72 DllCommonsvc.exe File created C:\Windows\RemotePackages\RemoteApps\System.exe DllCommonsvc.exe File opened for modification C:\Windows\RemotePackages\RemoteApps\System.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings conhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4528 schtasks.exe 4132 schtasks.exe 5088 schtasks.exe 3188 schtasks.exe 3040 schtasks.exe 3828 schtasks.exe 2284 schtasks.exe 932 schtasks.exe 4572 schtasks.exe 900 schtasks.exe 3208 schtasks.exe 2432 schtasks.exe 2068 schtasks.exe 1220 schtasks.exe 3480 schtasks.exe 684 schtasks.exe 5080 schtasks.exe 2876 schtasks.exe 764 schtasks.exe 3476 schtasks.exe 4872 schtasks.exe 3612 schtasks.exe 1900 schtasks.exe 4588 schtasks.exe 4932 schtasks.exe 4104 schtasks.exe 5084 schtasks.exe 4376 schtasks.exe 912 schtasks.exe 668 schtasks.exe 4900 schtasks.exe 2656 schtasks.exe 4904 schtasks.exe 2936 schtasks.exe 1488 schtasks.exe 3112 schtasks.exe 1604 schtasks.exe 3604 schtasks.exe 2632 schtasks.exe 3616 schtasks.exe 2232 schtasks.exe 4908 schtasks.exe 3172 schtasks.exe 4260 schtasks.exe 3104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 2196 DllCommonsvc.exe 4672 powershell.exe 4672 powershell.exe 868 powershell.exe 868 powershell.exe 2696 powershell.exe 2696 powershell.exe 3780 powershell.exe 3780 powershell.exe 4052 powershell.exe 4052 powershell.exe 3376 powershell.exe 3376 powershell.exe 1068 powershell.exe 1068 powershell.exe 1840 powershell.exe 1840 powershell.exe 1464 powershell.exe 1464 powershell.exe 4348 powershell.exe 4348 powershell.exe 4840 powershell.exe 4840 powershell.exe 2556 powershell.exe 2556 powershell.exe 1540 powershell.exe 1540 powershell.exe 536 powershell.exe 536 powershell.exe 2720 powershell.exe 2720 powershell.exe 1540 powershell.exe 4928 powershell.exe 4928 powershell.exe 3376 powershell.exe 868 powershell.exe 868 powershell.exe 4672 powershell.exe 4672 powershell.exe 4052 powershell.exe 4928 powershell.exe 3780 powershell.exe 2696 powershell.exe 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 2196 DllCommonsvc.exe Token: SeDebugPrivilege 4672 powershell.exe Token: SeDebugPrivilege 868 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 4052 powershell.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeDebugPrivilege 4348 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 4840 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 1444 conhost.exe Token: SeDebugPrivilege 2104 conhost.exe Token: SeDebugPrivilege 1560 conhost.exe Token: SeDebugPrivilege 804 conhost.exe Token: SeDebugPrivilege 3616 conhost.exe Token: SeDebugPrivilege 4764 conhost.exe Token: SeDebugPrivilege 5024 conhost.exe Token: SeDebugPrivilege 1560 conhost.exe Token: SeDebugPrivilege 3032 conhost.exe Token: SeDebugPrivilege 1396 conhost.exe Token: SeDebugPrivilege 1820 conhost.exe Token: SeDebugPrivilege 2440 conhost.exe Token: SeDebugPrivilege 5024 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 3636 4388 JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe 83 PID 4388 wrote to memory of 3636 4388 JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe 83 PID 4388 wrote to memory of 3636 4388 JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe 83 PID 3636 wrote to memory of 992 3636 WScript.exe 85 PID 3636 wrote to memory of 992 3636 WScript.exe 85 PID 3636 wrote to memory of 992 3636 WScript.exe 85 PID 992 wrote to memory of 2196 992 cmd.exe 87 PID 992 wrote to memory of 2196 992 cmd.exe 87 PID 2196 wrote to memory of 4348 2196 DllCommonsvc.exe 135 PID 2196 wrote to memory of 4348 2196 DllCommonsvc.exe 135 PID 2196 wrote to memory of 1068 2196 DllCommonsvc.exe 136 PID 2196 wrote to memory of 1068 2196 DllCommonsvc.exe 136 PID 2196 wrote to memory of 2696 2196 DllCommonsvc.exe 137 PID 2196 wrote to memory of 2696 2196 DllCommonsvc.exe 137 PID 2196 wrote to memory of 3780 2196 DllCommonsvc.exe 138 PID 2196 wrote to memory of 3780 2196 DllCommonsvc.exe 138 PID 2196 wrote to memory of 536 2196 DllCommonsvc.exe 139 PID 2196 wrote to memory of 536 2196 DllCommonsvc.exe 139 PID 2196 wrote to memory of 4672 2196 DllCommonsvc.exe 140 PID 2196 wrote to memory of 4672 2196 DllCommonsvc.exe 140 PID 2196 wrote to memory of 868 2196 DllCommonsvc.exe 141 PID 2196 wrote to memory of 868 2196 DllCommonsvc.exe 141 PID 2196 wrote to memory of 1464 2196 DllCommonsvc.exe 142 PID 2196 wrote to memory of 1464 2196 DllCommonsvc.exe 142 PID 2196 wrote to memory of 2556 2196 DllCommonsvc.exe 143 PID 2196 wrote to memory of 2556 2196 DllCommonsvc.exe 143 PID 2196 wrote to memory of 2720 2196 DllCommonsvc.exe 144 PID 2196 wrote to memory of 2720 2196 DllCommonsvc.exe 144 PID 2196 wrote to memory of 4840 2196 DllCommonsvc.exe 145 PID 2196 wrote to memory of 4840 2196 DllCommonsvc.exe 145 PID 2196 wrote to memory of 1540 2196 DllCommonsvc.exe 146 PID 2196 wrote to memory of 1540 2196 DllCommonsvc.exe 146 PID 2196 wrote to memory of 1840 2196 DllCommonsvc.exe 147 PID 2196 wrote to memory of 1840 2196 DllCommonsvc.exe 147 PID 2196 wrote to memory of 4928 2196 DllCommonsvc.exe 148 PID 2196 wrote to memory of 4928 2196 DllCommonsvc.exe 148 PID 2196 wrote to memory of 4052 2196 DllCommonsvc.exe 149 PID 2196 wrote to memory of 4052 2196 DllCommonsvc.exe 149 PID 2196 wrote to memory of 3376 2196 DllCommonsvc.exe 150 PID 2196 wrote to memory of 3376 2196 DllCommonsvc.exe 150 PID 2196 wrote to memory of 4708 2196 DllCommonsvc.exe 167 PID 2196 wrote to memory of 4708 2196 DllCommonsvc.exe 167 PID 4708 wrote to memory of 2780 4708 cmd.exe 170 PID 4708 wrote to memory of 2780 4708 cmd.exe 170 PID 4708 wrote to memory of 1444 4708 cmd.exe 177 PID 4708 wrote to memory of 1444 4708 cmd.exe 177 PID 1444 wrote to memory of 3504 1444 conhost.exe 181 PID 1444 wrote to memory of 3504 1444 conhost.exe 181 PID 3504 wrote to memory of 2084 3504 cmd.exe 183 PID 3504 wrote to memory of 2084 3504 cmd.exe 183 PID 3504 wrote to memory of 2104 3504 cmd.exe 189 PID 3504 wrote to memory of 2104 3504 cmd.exe 189 PID 2104 wrote to memory of 1084 2104 conhost.exe 193 PID 2104 wrote to memory of 1084 2104 conhost.exe 193 PID 1084 wrote to memory of 3176 1084 cmd.exe 195 PID 1084 wrote to memory of 3176 1084 cmd.exe 195 PID 1084 wrote to memory of 1560 1084 cmd.exe 198 PID 1084 wrote to memory of 1560 1084 cmd.exe 198 PID 1560 wrote to memory of 620 1560 conhost.exe 200 PID 1560 wrote to memory of 620 1560 conhost.exe 200 PID 620 wrote to memory of 2052 620 cmd.exe 202 PID 620 wrote to memory of 2052 620 cmd.exe 202 PID 620 wrote to memory of 804 620 cmd.exe 204 PID 620 wrote to memory of 804 620 cmd.exe 204 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03a152a1815481d353ca65607ec1b67caed513269d0765354ccd513eaf9fd552.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:992 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\RemotePackages\RemoteApps\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\unsecapp.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\es-ES\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Performance\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\sihost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\SIGNUP\upfc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\IME\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Videos\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Links\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nRMuZtnwRT.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2780
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dIJBhaqFKS.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2084
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dIJBhaqFKS.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:3176
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mJIFszAWFu.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2052
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lHuJ4aKJis.bat"13⤵PID:2416
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:4568
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\410ZzJtAuR.bat"15⤵PID:4388
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:3544
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\o4pIGJu18c.bat"17⤵PID:1628
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:4872
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FgAoPiAcVL.bat"19⤵PID:1064
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:3828
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9kwbr7Wkdx.bat"21⤵PID:4220
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:4380
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GX2kvMhQbI.bat"23⤵PID:4596
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:1032
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TZCyxGcg3L.bat"25⤵PID:3796
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:1600
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hGj9C4kLBH.bat"27⤵PID:3604
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:3968
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VJj2LbMAw3.bat"29⤵PID:4864
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:230⤵PID:2940
-
-
C:\Users\Admin\Videos\conhost.exe"C:\Users\Admin\Videos\conhost.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\RemotePackages\RemoteApps\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\RemotePackages\RemoteApps\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\RemotePackages\RemoteApps\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\providercommon\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\providercommon\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\providercommon\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Office\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Admin\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\es-ES\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\es-ES\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\es-ES\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Performance\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\Performance\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Desktop\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Admin\Desktop\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Desktop\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Windows\IME\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\IME\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\IME\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Videos\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Admin\Videos\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Videos\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Links\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Admin\Links\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Links\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
198B
MD53c62bebf8832ae9123c88a241327c3ee
SHA1371ed506f0489a4d8e573c6856c1323e3bb2125a
SHA256edd71c7ff983c6c843d44e347b58a50113b1c964a0bc1a461c5e429d5846a2c0
SHA5129aa80d7e558125e0146cfb77994fdca55bd5d42d3c08516405da2036f58df53d0c04e792eb4299350e91c9afbd6c0bb4a313c41147ac0edbff07755d0ce10004
-
Filesize
198B
MD50c1ec4845d5406d951237bc28cdff211
SHA19772bfb1784bb329ad2f933116281eb63ace42f2
SHA2560a65018361be4cbce1e850bcc31c4c252d0382fbfa062c112fae8b7c7a187bbc
SHA512bd2fdfd78efc7e389e3a8c3e8ce1b25df53d2e5b06d42b677c7e9bce5aef9bb4e61b4f41753e7c60ba2e757893fedfef962e8ab7d9f483fa0698bfe0fa6a4d0e
-
Filesize
198B
MD51fb35b59c9ad531afa73eebb7ccb88ee
SHA15398db747e7f121ca1e45a449787b3baa5e487ae
SHA25645c518e8855fed37e04c4bb5a895deb0fde3c1be3b246676b792f3f80d393123
SHA512b0d43a4e07e34a208e99ad21a5380108b847e047e3e1800438d55712839a99390a9abfb83f7e412a58b0226ef9aba14685c9ae238ad58c9ed3a6a9d2c1d43d81
-
Filesize
198B
MD51ea000ba90408851e6d4248e76f6856e
SHA1ff1cd2155b2f3b985467d90c1bf9726d54a3cca1
SHA256788a202d330d7ab13b06f8cac9461dc873c3501b073139c041848041b838be94
SHA512407ebc78e29c7f2a6a0d2dad7cff28b05a375169dc2c713b2679de411614ca9a618e92579beba7a2c1fa0401656f8b9c13d5fd3710eda8175154bca1758cbcc8
-
Filesize
198B
MD5d59f6b6230aab0a581888101291d02d8
SHA1eaac8208d769c77cb75e78a88c21d57f9df271ba
SHA256b2f4c162b505cd06d8bc8a16f8677426186d3314914c37976ab92263801dfb7f
SHA512be25d6891539de52a636700df0fdc269af0ec4b1e053015deb0b51f8989714b566f6caf7393bc63211d5325b63a1e3af057a2c5c0e50bf5e39abaa9e99b8a912
-
Filesize
198B
MD5e1b4ddbbe122d099c571bb448195b9bf
SHA14497bba4c20e8c2ffd7bf2f69544110093bcf7b1
SHA2566a09a4c4b48b3c23d3b1af368115b47eaf9e22ca707a44e7b8d0841581d352d8
SHA512aede476a2e048667b7a05fc6c1e2fca85c0cba42a7a4845e8d859546952808eae61056f87a4bbb1985c90eb60b507ab221c4aabb810859253f303b609aa751dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
198B
MD53a8ddddf2aea0de4479efd89a6879f0c
SHA1af01e04f7ba4de58afc9e454e034ef5e1a28db00
SHA256bcda221202fa5d9f9b641e328a1df879e60fdc8c683270deff5cf6538564b826
SHA512081ff94680316e3cabf2c26e3d341459fdad3ee634be06a4ca7929c47e201847dd8da07db7e3af11b51c27b09d7d15a274cfa28f1158805729f8b25610350657
-
Filesize
198B
MD54490b2686de1bd21d89878b909fe111d
SHA1e9358adeda1f822922a067c2c9355d8b40278955
SHA25663246bee3e7387722318df986d72e414aacdd2ff31ab8528021740ec469c9738
SHA5127053895dcd3e92711f2c267660c8f85b8714b444a18b4459444864b17641d3babc0093658e90c2ce353bcaa92e58318aaec7eb1a45c4f95c6626cf1dcbeedb87
-
Filesize
198B
MD527a5133719f9e1135dac354c0be1c062
SHA1a7a48ab975398e97f0616e839cf607e3803b3321
SHA256052ad8044eced31eb63ba3d6323556374a09e2d3cdc7ab4bfce38f62aa1ef587
SHA512d5f7029de1e2bb3a98fc48bf89512411e27b55592902969282718f93d13670162511c3ea1b9614f51c7441e3ed9eaaa6affa5e7fdb8bc1193aed389fcc998116
-
Filesize
198B
MD52662ba28b2c77510062780d76a804b2a
SHA15492615603f3b25091e6db357eb81bc7be0e80f4
SHA25652fe88cd34fa05d1f8787a5350595f12bc7daef1c671ea63793a37bf25219d8e
SHA512d9ed3f16b6d25d0039a719cff6e28291672524edea979a8be35730d4e05685b8fb76d9c2b2e5cbf06813ecaab8aaf4bf9d06b7eac44c8d85ce2c8e83f917bcce
-
Filesize
198B
MD543111b79694265dd1921456fedbe10bd
SHA171b12acc434039d062e3032ff231c884ff8aea72
SHA256fea9cd40c08d852bf8729fd255ac4d273ff2c6b5a3c0dd00ace37cb3c11a6bac
SHA512e7fda90daa82fe16ba1de2b0fc71e2814bc5cc2bab5838c568da5252fb948e20966bff189e7ab010fb43bea8c35e51203b06e18f087fd7bbaa2a4c46d196ea52
-
Filesize
198B
MD5dd863fc723cc4dbe1f1460444dfea6f8
SHA1bf5062cf5ce5ca57e25a1d4f1f24b90b9fbe9546
SHA256d2490d668a7f1cc5b0ddc96da0a09393249ffbd55d9f1e1ebea03352ef1cd97c
SHA512d8e181163c632c4b8150edd6374cc2eb6ad82f6d281179d41a8402adf68c12c3d8d1c279ca99a597ab36bc81032a9cd96173c75d7aa5e0290e6e5e3d9d390853
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478