Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 21:37
Behavioral task
behavioral1
Sample
JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe
-
Size
1.3MB
-
MD5
a27a81c22b49aa80b27ff875be43948d
-
SHA1
d63e2a6b68582d8d3da3e7e1f8f98919336c9e23
-
SHA256
d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413
-
SHA512
09e431375191f3e7ca433219ed8a831bcd74a1410b5899ea67e19e1406edc098b0526439d22e9d5411f062ab38890bcc10eba4d0666a1a608121cd077c5eeb2e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 208 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3456 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3388 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 116 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4932 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3160 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3980 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3672 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4304 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 912 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3080 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3788 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2096 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 2096 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x0007000000023c82-9.dat dcrat behavioral2/memory/372-13-0x00000000003E0000-0x00000000004F0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1572 powershell.exe 3716 powershell.exe 3972 powershell.exe 4628 powershell.exe 3360 powershell.exe 4492 powershell.exe 4980 powershell.exe 3056 powershell.exe 4500 powershell.exe 3484 powershell.exe 2956 powershell.exe 2896 powershell.exe 696 powershell.exe 2788 powershell.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dllhost.exe -
Executes dropped EXE 15 IoCs
pid Process 372 DllCommonsvc.exe 528 dllhost.exe 2364 dllhost.exe 2300 dllhost.exe 1660 dllhost.exe 3536 dllhost.exe 2788 dllhost.exe 1380 dllhost.exe 3008 dllhost.exe 4288 dllhost.exe 3568 dllhost.exe 3408 dllhost.exe 4024 dllhost.exe 3356 dllhost.exe 1376 dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 55 raw.githubusercontent.com 57 raw.githubusercontent.com 14 raw.githubusercontent.com 38 raw.githubusercontent.com 44 raw.githubusercontent.com 52 raw.githubusercontent.com 54 raw.githubusercontent.com 15 raw.githubusercontent.com 39 raw.githubusercontent.com 46 raw.githubusercontent.com 40 raw.githubusercontent.com 45 raw.githubusercontent.com 25 raw.githubusercontent.com 56 raw.githubusercontent.com -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\System\ja-JP\5940a34987c991 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files (x86)\Windows NT\conhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows NT\088424020bedd6 DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Registration\CRMLog\OfficeClickToRun.exe DllCommonsvc.exe File created C:\Windows\Registration\CRMLog\e6c9b481da804f DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4356 schtasks.exe 2220 schtasks.exe 4172 schtasks.exe 1232 schtasks.exe 3160 schtasks.exe 912 schtasks.exe 2144 schtasks.exe 4304 schtasks.exe 3668 schtasks.exe 2624 schtasks.exe 3980 schtasks.exe 5032 schtasks.exe 2652 schtasks.exe 2700 schtasks.exe 1552 schtasks.exe 1712 schtasks.exe 956 schtasks.exe 5116 schtasks.exe 3456 schtasks.exe 3388 schtasks.exe 2044 schtasks.exe 116 schtasks.exe 2640 schtasks.exe 3552 schtasks.exe 860 schtasks.exe 2656 schtasks.exe 208 schtasks.exe 2304 schtasks.exe 4548 schtasks.exe 3080 schtasks.exe 1592 schtasks.exe 992 schtasks.exe 2708 schtasks.exe 4932 schtasks.exe 3672 schtasks.exe 1440 schtasks.exe 3788 schtasks.exe 2728 schtasks.exe 3928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 372 DllCommonsvc.exe 4500 powershell.exe 4500 powershell.exe 3972 powershell.exe 3972 powershell.exe 1572 powershell.exe 1572 powershell.exe 696 powershell.exe 696 powershell.exe 3484 powershell.exe 3484 powershell.exe 3716 powershell.exe 3716 powershell.exe 4492 powershell.exe 4492 powershell.exe 2956 powershell.exe 2956 powershell.exe 4980 powershell.exe 4980 powershell.exe 3056 powershell.exe 3056 powershell.exe 3360 powershell.exe 3360 powershell.exe 2896 powershell.exe 2896 powershell.exe 4628 powershell.exe 4628 powershell.exe 528 dllhost.exe 528 dllhost.exe 2788 powershell.exe 2788 powershell.exe 2896 powershell.exe 3972 powershell.exe 3716 powershell.exe 2956 powershell.exe 696 powershell.exe 4500 powershell.exe 1572 powershell.exe 3056 powershell.exe 3484 powershell.exe 4980 powershell.exe 4492 powershell.exe 3360 powershell.exe 2788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 372 DllCommonsvc.exe Token: SeDebugPrivilege 3716 powershell.exe Token: SeDebugPrivilege 4500 powershell.exe Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeDebugPrivilege 3484 powershell.exe Token: SeDebugPrivilege 4492 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 528 dllhost.exe Token: SeDebugPrivilege 3360 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 4628 powershell.exe Token: SeDebugPrivilege 2364 dllhost.exe Token: SeDebugPrivilege 2300 dllhost.exe Token: SeDebugPrivilege 1660 dllhost.exe Token: SeDebugPrivilege 3536 dllhost.exe Token: SeDebugPrivilege 2788 dllhost.exe Token: SeDebugPrivilege 1380 dllhost.exe Token: SeDebugPrivilege 3008 dllhost.exe Token: SeDebugPrivilege 4288 dllhost.exe Token: SeDebugPrivilege 3568 dllhost.exe Token: SeDebugPrivilege 3408 dllhost.exe Token: SeDebugPrivilege 4024 dllhost.exe Token: SeDebugPrivilege 3356 dllhost.exe Token: SeDebugPrivilege 1376 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3124 wrote to memory of 3436 3124 JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe 82 PID 3124 wrote to memory of 3436 3124 JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe 82 PID 3124 wrote to memory of 3436 3124 JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe 82 PID 3436 wrote to memory of 1716 3436 WScript.exe 83 PID 3436 wrote to memory of 1716 3436 WScript.exe 83 PID 3436 wrote to memory of 1716 3436 WScript.exe 83 PID 1716 wrote to memory of 372 1716 cmd.exe 85 PID 1716 wrote to memory of 372 1716 cmd.exe 85 PID 372 wrote to memory of 4628 372 DllCommonsvc.exe 126 PID 372 wrote to memory of 4628 372 DllCommonsvc.exe 126 PID 372 wrote to memory of 4980 372 DllCommonsvc.exe 127 PID 372 wrote to memory of 4980 372 DllCommonsvc.exe 127 PID 372 wrote to memory of 696 372 DllCommonsvc.exe 128 PID 372 wrote to memory of 696 372 DllCommonsvc.exe 128 PID 372 wrote to memory of 2788 372 DllCommonsvc.exe 129 PID 372 wrote to memory of 2788 372 DllCommonsvc.exe 129 PID 372 wrote to memory of 3360 372 DllCommonsvc.exe 130 PID 372 wrote to memory of 3360 372 DllCommonsvc.exe 130 PID 372 wrote to memory of 1572 372 DllCommonsvc.exe 131 PID 372 wrote to memory of 1572 372 DllCommonsvc.exe 131 PID 372 wrote to memory of 3716 372 DllCommonsvc.exe 132 PID 372 wrote to memory of 3716 372 DllCommonsvc.exe 132 PID 372 wrote to memory of 4500 372 DllCommonsvc.exe 133 PID 372 wrote to memory of 4500 372 DllCommonsvc.exe 133 PID 372 wrote to memory of 3484 372 DllCommonsvc.exe 134 PID 372 wrote to memory of 3484 372 DllCommonsvc.exe 134 PID 372 wrote to memory of 3056 372 DllCommonsvc.exe 135 PID 372 wrote to memory of 3056 372 DllCommonsvc.exe 135 PID 372 wrote to memory of 4492 372 DllCommonsvc.exe 136 PID 372 wrote to memory of 4492 372 DllCommonsvc.exe 136 PID 372 wrote to memory of 3972 372 DllCommonsvc.exe 137 PID 372 wrote to memory of 3972 372 DllCommonsvc.exe 137 PID 372 wrote to memory of 2956 372 DllCommonsvc.exe 138 PID 372 wrote to memory of 2956 372 DllCommonsvc.exe 138 PID 372 wrote to memory of 2896 372 DllCommonsvc.exe 139 PID 372 wrote to memory of 2896 372 DllCommonsvc.exe 139 PID 372 wrote to memory of 528 372 DllCommonsvc.exe 153 PID 372 wrote to memory of 528 372 DllCommonsvc.exe 153 PID 528 wrote to memory of 3588 528 dllhost.exe 155 PID 528 wrote to memory of 3588 528 dllhost.exe 155 PID 3588 wrote to memory of 3324 3588 cmd.exe 157 PID 3588 wrote to memory of 3324 3588 cmd.exe 157 PID 3588 wrote to memory of 2364 3588 cmd.exe 161 PID 3588 wrote to memory of 2364 3588 cmd.exe 161 PID 2364 wrote to memory of 3832 2364 dllhost.exe 165 PID 2364 wrote to memory of 3832 2364 dllhost.exe 165 PID 3832 wrote to memory of 804 3832 cmd.exe 167 PID 3832 wrote to memory of 804 3832 cmd.exe 167 PID 3832 wrote to memory of 2300 3832 cmd.exe 169 PID 3832 wrote to memory of 2300 3832 cmd.exe 169 PID 2300 wrote to memory of 4788 2300 dllhost.exe 171 PID 2300 wrote to memory of 4788 2300 dllhost.exe 171 PID 4788 wrote to memory of 4080 4788 cmd.exe 173 PID 4788 wrote to memory of 4080 4788 cmd.exe 173 PID 4788 wrote to memory of 1660 4788 cmd.exe 174 PID 4788 wrote to memory of 1660 4788 cmd.exe 174 PID 1660 wrote to memory of 2084 1660 dllhost.exe 175 PID 1660 wrote to memory of 2084 1660 dllhost.exe 175 PID 2084 wrote to memory of 376 2084 cmd.exe 177 PID 2084 wrote to memory of 376 2084 cmd.exe 177 PID 2084 wrote to memory of 3536 2084 cmd.exe 178 PID 2084 wrote to memory of 3536 2084 cmd.exe 178 PID 3536 wrote to memory of 3668 3536 dllhost.exe 179 PID 3536 wrote to memory of 3668 3536 dllhost.exe 179 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Registration\CRMLog\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\USOShared\Logs\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Documents\My Pictures\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cnsnMHUbNI.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3324
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:804
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wRcBAgH7Mb.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:4080
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kRqsvBC5Qb.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:376
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\biigBqxW9T.bat"14⤵PID:3668
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:3048
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FBiR4PpyYA.bat"16⤵PID:4280
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2764
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WtQmBjXbDh.bat"18⤵PID:4172
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:4436
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2K3DLFE7WC.bat"20⤵PID:4028
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:4964
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WtQmBjXbDh.bat"22⤵PID:4696
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:4968
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3568 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Rn5V8mQYRH.bat"24⤵PID:1444
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:2664
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uVa8TbDE3p.bat"26⤵PID:1552
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:3652
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WzmeI2KvQx.bat"28⤵PID:3672
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:1880
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3356 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UxOjVeUiuv.bat"30⤵PID:620
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:1832
-
-
C:\Users\All Users\USOShared\Logs\dllhost.exe"C:\Users\All Users\USOShared\Logs\dllhost.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Windows\Registration\CRMLog\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Windows\Registration\CRMLog\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\providercommon\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\USOShared\Logs\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\USOShared\Logs\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\USOShared\Logs\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\providercommon\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\providercommon\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\providercommon\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\providercommon\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Documents\My Pictures\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Default\Documents\My Pictures\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Documents\My Pictures\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
944B
MD5e448fe0d240184c6597a31d3be2ced58
SHA1372b8d8c19246d3e38cd3ba123cc0f56070f03cd
SHA256c660f0db85a1e7f0f68db19868979bf50bd541531babf77a701e1b1ce5e6a391
SHA5120b7f7eae7700d32b18eee3677cb7f89b46ace717fa7e6b501d6c47d54f15dff7e12b49f5a7d36a6ffe4c16165c7d55162db4f3621db545b6af638035752beab4
-
Filesize
210B
MD5b3a41eb0885e59ba43b01eb38a0da260
SHA1d5405126a3347a6ef953819c660bb52af3fd8eb5
SHA2560f15c7e3a0d2ff01a99b834629e1f28316f3f9a77b64377d70d0c1582d98d930
SHA5124b8b7a76ddccae3578c75159af41bcd0ae28fe0acae3415cc391c79e443094a8514835d784b7f97567ca8bea81d5347f8dfa8bdca1914ecf4cd0ec677d900be9
-
Filesize
210B
MD586cd906f46d31f92eb795b8190701adc
SHA14193f2b6f7f424f7508f674371f7f97a8c0fb774
SHA256dfe768d604b06aebad6739d612b4104cf743a8758d39de67d0afbb4e1412af30
SHA512a2145685b8e73e0a850919d1a04859e04a2f7e4e7b36f5df411fcb2837f0cae86bba657cfd57937069a0c3a83d8ab981a83ce56ed4000710102f46a325122265
-
Filesize
210B
MD5e16b8d27fe8387b21a9b9cd3d10b72f4
SHA10263a6dc29248c6e381a0a6a2d7d102d24f9ff14
SHA256d75852eb2f98286150ba3efee1e5c85d5c07ecfccd9a841ffe8b0e01f787d89e
SHA512cca7534adef6a5bd33b6b907f5cc3e6a1ce32d1916191f24f74454af62ced54e5ffdc61985f7cc211a079734864d6e05edbaad18880feee7415260c403e9c7df
-
Filesize
210B
MD5e317b2b57ddcd8298f2d3ead786fb4ec
SHA1d2764c45eedc3b4fe1dcfa8f4c52a4e3eaa76794
SHA25630abaf59cba37b8610f5790918c6ccb1a5f72f66a2848ef49de0c84e496a0a88
SHA51261b7a6f70080f721708aca05ae48139cdab01705d1d6d0ebe0094a9e0bc4cdf5e2b2ba5975f47340935bd6f4b039727c690dcc2bee931df5bdecf309989a7654
-
Filesize
210B
MD51c59a9cd0b076c37b5a0909e5a39d90f
SHA1ae11f3604b91dc17369871d17e36efb10745004a
SHA256668bf67137aa2c8ac40a3cd24c96feb4ae057116895ae8e5f41208ae4fe760d9
SHA51282095ab0cd1d892ad868fb0d171fcd64139220cc52f073d071dfa1e75e7f8a23eecf62a483899dc8da7b3c022c3a874f8be2a69dc07c87392dd404c6811dec62
-
Filesize
210B
MD5f30ef1f5794d3d8dbbf5a49fe89d5e24
SHA1c99648ed568bd83137b50d5391c6342826eecb68
SHA2564ad7be6cd954363a51d0c4ecbcd5acd88a413d5cb952bf36a1183ca6fbf930e9
SHA512cb47c1815d47b88f4c89ef9d609fe603068338c7c96e1362a88f550113b2e81117e8bd40551f282aa04ffb5a5b85aaccc1ef293768ffae60d8692a33cfbea0bd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
210B
MD581d5e9e695f1ddc42549222bbfea2351
SHA1cb0d130d61f0a4b72f104a47da9e5e76a18261fb
SHA2560acf89871b65edd13b25ff42872aa3e85dbacaa7f722bd90a04d17bac0eb105d
SHA512568f478baa7b113dda0b868618c0599e654ae9271b9249930a069db107074bfe9665d35c07c4a043e79383809be3a631ddb5cdf03121cdd4a5a522a7a3b07419
-
Filesize
210B
MD5b3453b5b1aae31af3f21797e73e5ab8b
SHA1bf12a63c49775ffbf1aa20a0b29681ea1f1a78dc
SHA256676c347766e01ed641fe78a427ea25604e1b3656fb780f7f1956e4b44494f94d
SHA5120553064db38037d8705193b878814fa291b445a7dc506ecdadb653b382e88158b273b9812afca9dad794b7239925e6a812614d8eb0192dee48305a188d631c3b
-
Filesize
210B
MD5cf1a1ffda28d16cd7b8c1b2cb914174a
SHA1004d11fcf7bc9c508ef73a2259ce14e5e1737c85
SHA256bdf2076847bb02a4992e1f9c195b1926da8121be34fe005cb5c790ebbeb84b00
SHA51270180822911c6714c5354c37b7a3617290c020f7ff777d5de7e3702a9f61fe9d1a965b6cc95170ea4723876a20d1693e01de292ea115c4dbe592d3dc379351ef
-
Filesize
210B
MD5d405182283c5de0f26a384722a3eb3e3
SHA11669a83c79ed82289b3fa373953cb75e1525155a
SHA256c993829f680d0e6f1256ea39910bcd7f0a0c8d5949c0eae40c474abb28ef6e0f
SHA51235e1d11860c127b08840d7968dab93690528bed8aa0b65c2e6b7bef3abc57ccf11be8b7939795d79a1cdacd5d6771b0249a5a8b711f2d39eb976ec32b5741bf2
-
Filesize
210B
MD5559703cd292b5c556bcc7069e903ac68
SHA1a4e67e2caefeb17c7855411711b14489e44acceb
SHA2567f129272c2c52a4bbad3127b055a07931e1e389178a3ac40d25889127441e27d
SHA51267dca6aa0c791b189b487dfddb1ec6173cad6d972ccfaa2058b42738f36559c6a97b62e83c12c47a61fccb31875974cf8e853ce4843d7eecfa12edb1859c918a
-
Filesize
210B
MD59fabee4380f26d2228393044c7e02179
SHA1462596a323218ec12fd9b3b4d9e18661860524fd
SHA2560cdd500c1c609e678a2f14cef533a0b98d08a00a3c576a70ef184ad21fc7b8aa
SHA512d3519bd038e9c8841d3042312690af11cb998ea4e0e5827445831703fc238c26b1d02769b8d515f24319cb1df7656a317115702e46592717d8f4131b3f325f51
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478