Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 21:44

General

  • Target

    JaffaCakes118_406bb034a5040baab41cb60c5feebfc0214b30abc05801a570e1b094402788f9.exe

  • Size

    1.3MB

  • MD5

    574ac67eea69a08e3dfed543be2597ca

  • SHA1

    ecac1e25ea3575d3e4c9fc56ce6f3667fa3be190

  • SHA256

    406bb034a5040baab41cb60c5feebfc0214b30abc05801a570e1b094402788f9

  • SHA512

    e5b221277b0f285ccea38ea885e0ed2febf5c987e2d4654de4da71e70b63b9bf4546c2335c936778a6ffc5e14515a29dfa8b1a2088db65b30e4c03960eee58f6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 24 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_406bb034a5040baab41cb60c5feebfc0214b30abc05801a570e1b094402788f9.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_406bb034a5040baab41cb60c5feebfc0214b30abc05801a570e1b094402788f9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1148
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\it-IT\audiodg.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1972
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Pictures\Sample Pictures\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1004
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\lsass.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2232
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2944
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Cursors\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:404
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1160
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\CrashReports\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1640
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1988
          • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
            "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:544
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5ldsg1wMto.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2440
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:588
                • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                  "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1196
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\r40S8pVzgD.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2980
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:480
                      • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                        "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3000
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X5pWA5YIY7.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2808
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:2784
                            • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                              "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                              11⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:600
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jI650TZYhJ.bat"
                                12⤵
                                  PID:1124
                                  • C:\Windows\system32\w32tm.exe
                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    13⤵
                                      PID:2772
                                    • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                      "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                      13⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2412
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3gUlVaPHfz.bat"
                                        14⤵
                                          PID:2108
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            15⤵
                                              PID:956
                                            • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                              "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                              15⤵
                                              • Executes dropped EXE
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:940
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nfin2KLgOh.bat"
                                                16⤵
                                                  PID:2820
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    17⤵
                                                      PID:2812
                                                    • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                                      "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                                      17⤵
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1992
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Q3ZRkRg4YZ.bat"
                                                        18⤵
                                                          PID:1840
                                                          • C:\Windows\system32\w32tm.exe
                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                            19⤵
                                                              PID:2836
                                                            • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                                              "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                                              19⤵
                                                              • Executes dropped EXE
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2356
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\V68XQM6FdC.bat"
                                                                20⤵
                                                                  PID:2512
                                                                  • C:\Windows\system32\w32tm.exe
                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                    21⤵
                                                                      PID:2444
                                                                    • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                                                      "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                                                      21⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2668
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\n9GQh003RW.bat"
                                                                        22⤵
                                                                          PID:1120
                                                                          • C:\Windows\system32\w32tm.exe
                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                            23⤵
                                                                              PID:1260
                                                                            • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                                                              "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                                                              23⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2340
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HHf3c4kdaf.bat"
                                                                                24⤵
                                                                                  PID:1972
                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                    25⤵
                                                                                      PID:2988
                                                                                    • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                                                                      "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                                                                      25⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2792
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4vYRXbn8bW.bat"
                                                                                        26⤵
                                                                                          PID:2336
                                                                                          • C:\Windows\system32\w32tm.exe
                                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                            27⤵
                                                                                              PID:1428
                                                                                            • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe
                                                                                              "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe"
                                                                                              27⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1128
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\audiodg.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2616
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\audiodg.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2364
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\audiodg.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1424
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Pictures\Sample Pictures\DllCommonsvc.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2924
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\Public\Pictures\Sample Pictures\DllCommonsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2912
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Pictures\Sample Pictures\DllCommonsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3008
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\lsass.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:736
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\lsass.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2628
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Internet Explorer\lsass.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1728
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\services.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1196
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\7-Zip\services.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1664
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\services.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:264
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Windows\Cursors\cmd.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2384
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\Cursors\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1680
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Windows\Cursors\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2856
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1008
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1772
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\wininit.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1296
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\CrashReports\smss.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2964
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\smss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1472
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\CrashReports\smss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1100
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\csrss.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1784
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2188
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:304

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          d98e4b8afd600dbff8f608e01522cf40

                                          SHA1

                                          b4ae51f0fed9891d6c7a6c2d37542f2caf11efd9

                                          SHA256

                                          4b3348a38e509c65378d7afc1a482870cd020e0a26a894f3434ee31d83e93828

                                          SHA512

                                          eab8048b4cb0a76faede19316428b7e55b5850aedda0170843dbd8c952676ce273fc54996fee59d9b0d1636a9f913ac8058069e5c449cedf5295047596c2cd1a

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          d66b663e2e3578c966c96c8f145aa1aa

                                          SHA1

                                          efcf87b10e5372cbc92f5fbd499a22047ac3b356

                                          SHA256

                                          dc5d8942ae1fb955e94006d1732598f632daed68d21f748ca415e543cda8a9bc

                                          SHA512

                                          795fb9b370940cfaba232d7eb5db81c872a600d1a4a00062a2ad34e3f69ad7e4998d4f45d0728d25e2aa5e4b17f794a2df090071dac15a44066fb4b1c60699b5

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          2dc381d10bebe10462323198a3bd3da6

                                          SHA1

                                          80fb71ee1bbe1fb7673e5b4801ac6fb09101829d

                                          SHA256

                                          46e9b09c8a7b165332064e88c863a00f4f931b682046ba2f39e9127d3bba7c85

                                          SHA512

                                          9aea8fec5f1dd50e609ccfad4d54b5df3ddd39a6b9ea4edd63f194ed8a14fa61f60a36edcb46c379d8e4b1e137de13b6934f4d809bdedb19381045bbe82da212

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          c26f98066a397a2d2e17aa6d8f9ca758

                                          SHA1

                                          dd089480edf488d44c58e72ddf6d88ec064a0880

                                          SHA256

                                          6f10a31dda5c7cc31c3a8459b2a844e2a3e700e2156ec899df26af8649fbe63d

                                          SHA512

                                          4ea419ab4a9a37ba408f476574e6fc182904fb8b9e72ecaf7499bd66d11e73b437aa6bd479eb95c930f64bdb26a93609ab77db6fdd30727972ecd0dc7346b7dc

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          3b8adaffefa5698b0ed0a9610bd0e85f

                                          SHA1

                                          8c1efde2157dca86864884dcf3bcb65da062d1b1

                                          SHA256

                                          89879307834611c10963ddf9424a2e4ef803745657fb3194eb62b1dc7b8fccdc

                                          SHA512

                                          e797cd365545d2582cb01dd9062f578de77042a2d0f10f8bad86ecef889b8203ada9de6c8382087217aacf2fa872f40f742956046f62f98ac43310a578a7e49d

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          7e901e72b1c6bd13cdf32c5a452fe31f

                                          SHA1

                                          ddd86b72bcb8cf9d7c1bb15372e994b52110828d

                                          SHA256

                                          2657c44efa7ebf46f36c53a78ed0c767088db5351d52e7cfcc68020038600173

                                          SHA512

                                          c61e62ec1b2059a50099a1962438daebf143d077953b80fa3611e3b6b922d59acd7c4f37a796c4697ef78925f3a1b684c0106d62055f4a95c5166d0db6afc64c

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          b1d466f753e27e9714db504580ccba2a

                                          SHA1

                                          753ed93f51a8440f0aec0f8e115dd3f5c947d0f8

                                          SHA256

                                          17b8f70219b48f23e591969f21105d2e4b39171a97a0a074187a33ce4f41049c

                                          SHA512

                                          bc1e2f5a4353c0a20f1b81856644fb12ff261d61a24be956085023827a4018a33524ffa82a4d6f4e3c2eae85e632d116e45d6cd3f5e4efbd65c3a2b6c57fd4b6

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          f2964ab5e11571b9546cd15d70fb32bc

                                          SHA1

                                          5d8dd32c41d4b9005ac338a5cf433ed77508c413

                                          SHA256

                                          1d67fec6ec2513e2ea7bbd67e6b8265cd46836f3d781ce6dc792c3e20abb031c

                                          SHA512

                                          6557abdf13df0724c8c60297329285c33fc3f172e5145e07f95f55de1b74630b1eb4dc190da9db0e2aa49b063b013f6606e96f3e35d0f4961622529fc0682daf

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          bd85af9be7b579415d25a657dfb8f0c5

                                          SHA1

                                          2f43ed86cdcaf82b5b49ee93cd8b0e68dc179ded

                                          SHA256

                                          c9577f75c5b4bed78e08384be69047e96a9cfca2f7a1afc943b4362b0e2853c2

                                          SHA512

                                          2d36ccf9e499143d836a0de0020d5e4d6560e06ce503879191dbb511c5fdad251c6761e90beffbe725ef68b815385062b58a4dcd2d82e9aca2a31128a4ea875c

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          d749bbbac117aed99104a8a2c66a73fc

                                          SHA1

                                          e4475a2fe09745e7dc6345a05542346dfb1f4ad7

                                          SHA256

                                          770681f198fb805526c63180c7163c444193b10d065f240977e480e3747cf6f9

                                          SHA512

                                          52cdddd570c1ca57d4fb96a058aeedd4997fa7db558681add35407194eddd5ad9c19980bae9939ec5054fa7b8da04ba38e1a861a93363b1f1b87a7f033b2c924

                                        • C:\Users\Admin\AppData\Local\Temp\3gUlVaPHfz.bat

                                          Filesize

                                          225B

                                          MD5

                                          8606f35678cca70bb38003a2f7442b9f

                                          SHA1

                                          07a5d56041cc82d633fbe375712d00bedc39bf35

                                          SHA256

                                          6f95aa72a68c60cdcd02715100d83fe0b0dc30aa24b25f9adea632d2fa988f08

                                          SHA512

                                          a341a2abbd587a66c21e9afc480b5f1c17ed304abb486aa2bbceff9dcd14e3d4f76e9e533f39e9b696f3b627f5782a67d0e2c6eff5a275ec430e2a43ac485f8f

                                        • C:\Users\Admin\AppData\Local\Temp\4vYRXbn8bW.bat

                                          Filesize

                                          225B

                                          MD5

                                          f4228562c875a2b2174710539419dbe9

                                          SHA1

                                          de2d66decd135f63de97a4ddc62b06294c862397

                                          SHA256

                                          de6e171325a3008351d8bbd8352b43e2fa5374c1886c3bfa7936a8009a87e837

                                          SHA512

                                          714214539f8fbd39ca6c821591302466c32f8b87639bc31d7d8e96cde20881eead0daeb927c2380fce346d4610848bfca1502b4a5b2489289e1c1d47a03e153a

                                        • C:\Users\Admin\AppData\Local\Temp\5ldsg1wMto.bat

                                          Filesize

                                          225B

                                          MD5

                                          81d2cd93e73720d9f6ea279bfd155b76

                                          SHA1

                                          eed8c13dac0193512018ade4166031cdcba0fee5

                                          SHA256

                                          01fdfa11930f11dfd92ecb02f4f06727f066eddb18adabeb6ada54a1bd732084

                                          SHA512

                                          1322411411180754194bc3b8b619efb919b5949d74b48c93c94044e88ae9ac18892a59144ef3ce30d343ff426a7e3e36ee48ed65daefdfc6a52e7f0e8e9dae1e

                                        • C:\Users\Admin\AppData\Local\Temp\Cab1FC2.tmp

                                          Filesize

                                          70KB

                                          MD5

                                          49aebf8cbd62d92ac215b2923fb1b9f5

                                          SHA1

                                          1723be06719828dda65ad804298d0431f6aff976

                                          SHA256

                                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                          SHA512

                                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                        • C:\Users\Admin\AppData\Local\Temp\HHf3c4kdaf.bat

                                          Filesize

                                          225B

                                          MD5

                                          a16884fb5af4b3febf3145468cc3d443

                                          SHA1

                                          894c37d19ebe335c99b5b482b528ebb62f5dc264

                                          SHA256

                                          199a1053227288e788554dbc66adaf49c1d31745b31153b553d8407bbbb905aa

                                          SHA512

                                          6ebfc381be50625baa7d0cc2f24b4365a73da4ac934d5fe9706568bd211757b0245084e4ec53648800b8f29d55c8a900013a079ea7aaa523f164fefaa0201acb

                                        • C:\Users\Admin\AppData\Local\Temp\Q3ZRkRg4YZ.bat

                                          Filesize

                                          225B

                                          MD5

                                          4c3a315c53df7e0b89810497d54977c6

                                          SHA1

                                          26425ec8c3cbf701242083070b6014c8418e9f05

                                          SHA256

                                          ec9b7b5390be1a02783a6a48c240b15fabba4fdeb9482e51447bc1e211b5da55

                                          SHA512

                                          cac6e1a7f8b1975f8ff77d3338cdafd33f329a1cb111371f3882509e21fd003a3bae899cdf1c9b8fd0aafa430ebb916495ea0447428336a57cbf45954513775e

                                        • C:\Users\Admin\AppData\Local\Temp\Tar1FD5.tmp

                                          Filesize

                                          181KB

                                          MD5

                                          4ea6026cf93ec6338144661bf1202cd1

                                          SHA1

                                          a1dec9044f750ad887935a01430bf49322fbdcb7

                                          SHA256

                                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                          SHA512

                                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                        • C:\Users\Admin\AppData\Local\Temp\V68XQM6FdC.bat

                                          Filesize

                                          225B

                                          MD5

                                          4b046575932fd02cc39cf6586b880734

                                          SHA1

                                          51a3537e2d12deb17bd0e3ade416888cbca2577e

                                          SHA256

                                          2bf85cfe0eefc77d6cccc9e2973e3a122953b01299b20bf5302147837ed98b24

                                          SHA512

                                          932d9faf2d893c3ce8d970f79bae23d992f24841b8bffd04023a2f86e7a7c18ce82a6c3890560d84601e483837ad6217ad85e65bd1f75cb65e168204f64bef08

                                        • C:\Users\Admin\AppData\Local\Temp\X5pWA5YIY7.bat

                                          Filesize

                                          225B

                                          MD5

                                          692e1e25f97b1e7ed6018234da953d99

                                          SHA1

                                          44ea62ec8b0c4294d2faaefb8a39e40bee0c90eb

                                          SHA256

                                          1ae772a2ae4e222e7420af8f28a2124d301e0acc23262e8368e8797eec7ecbc7

                                          SHA512

                                          f736cf730374ebb1cb7262d5e3036d88694c9468425277b6d55a49f2f84a5b5425410c4191c60c6ef875b1560577acd3c2b90fa7c104a4f8e3a2989ea1444c46

                                        • C:\Users\Admin\AppData\Local\Temp\jI650TZYhJ.bat

                                          Filesize

                                          225B

                                          MD5

                                          8cee60598e9873b98f3146a8c5b9cd87

                                          SHA1

                                          78824eaa647e47e8ea987ff81f69990a70b3e327

                                          SHA256

                                          db15a88f762da1ab105c222da1d7b89dd731202deafa627f9d6b872ace71cacb

                                          SHA512

                                          b12f8cd6ff5f92594b2032ea8d747fd6d46477bcc3b7d896ec21b366db5ce88741e5158b42c33ffcfa4a17450e8df4510524bfd67aa4ee45df75d1b0ddd34d5a

                                        • C:\Users\Admin\AppData\Local\Temp\n9GQh003RW.bat

                                          Filesize

                                          225B

                                          MD5

                                          3f7af9f987bf9ec1c6cb63e69044737c

                                          SHA1

                                          7c36b29009857ebfbe7762f5d62caee2f7bee8e5

                                          SHA256

                                          353b6288d832f0c6b10b7914c849467da1c550928de54875a912455872c31147

                                          SHA512

                                          846437ffc649fed4d567d5a7d9fe897b6472d779105067e92ea5e58860fe588ac1bfb63fdfe77daf4ef1619213082889d8c533cde0952a21588e1de28e3855b3

                                        • C:\Users\Admin\AppData\Local\Temp\nfin2KLgOh.bat

                                          Filesize

                                          225B

                                          MD5

                                          d9225a2389cb503deaf38c2e8c452bba

                                          SHA1

                                          1cc1feba551461eff0749c4f48e2cd27d1083cb1

                                          SHA256

                                          c410691e9179b2695bf6345a81ed3c23266597cb3c17df872f7a2984e292875d

                                          SHA512

                                          9c50e717890a3b0b8fdb0da84ac7a5dc087c9ee262c249a55e1a761450d7d940d6ef866896e46bf0419a36ac275637d84380efc048b2496e859105e1810555e3

                                        • C:\Users\Admin\AppData\Local\Temp\r40S8pVzgD.bat

                                          Filesize

                                          225B

                                          MD5

                                          6d2a0154d9f54a28a055b029bc69ebd3

                                          SHA1

                                          3dbda15d6a1bdb24553f160f3905cedf5ad86b87

                                          SHA256

                                          10f602bef733ca34530567a77b773fb2091edbcced76f221288dc114e812a8c4

                                          SHA512

                                          741a31e2b12fb4fd824e9069bdff158364e9fc1839be099a7880d6eaffc2b582bce6c3d3028a925216741aaa88b9c1674dc427f0dc59d315162eff7c8603591f

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                          Filesize

                                          7KB

                                          MD5

                                          ac536be69c096cde0ee739251dae26c2

                                          SHA1

                                          5c05c783faf4380202efd4966432310c2fe6f15d

                                          SHA256

                                          41f329d9353bd385bca189013d716b5ef64eb4cd5bfffbd7324d3af18bc179c2

                                          SHA512

                                          5b6dc80dde9ca6e69a8bdc18838fdaec4c9393f0ab2f2bd760bd6405116aeca9c320821fd91f5dfe9b4e93a1679c0811cfc287099f8e36f25881a999b75a779d

                                        • C:\providercommon\1zu9dW.bat

                                          Filesize

                                          36B

                                          MD5

                                          6783c3ee07c7d151ceac57f1f9c8bed7

                                          SHA1

                                          17468f98f95bf504cc1f83c49e49a78526b3ea03

                                          SHA256

                                          8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                          SHA512

                                          c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                        • C:\providercommon\DllCommonsvc.exe

                                          Filesize

                                          1.0MB

                                          MD5

                                          bd31e94b4143c4ce49c17d3af46bcad0

                                          SHA1

                                          f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                          SHA256

                                          b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                          SHA512

                                          f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                        • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                          Filesize

                                          197B

                                          MD5

                                          8088241160261560a02c84025d107592

                                          SHA1

                                          083121f7027557570994c9fc211df61730455bb5

                                          SHA256

                                          2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                          SHA512

                                          20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                        • memory/544-40-0x0000000000EE0000-0x0000000000FF0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/600-264-0x0000000000180000-0x0000000000192000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/940-384-0x0000000001070000-0x0000000001180000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/940-385-0x00000000002B0000-0x00000000002C2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1128-744-0x00000000012D0000-0x00000000013E0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/1196-145-0x0000000000340000-0x0000000000352000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2148-17-0x0000000000370000-0x000000000037C000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/2148-15-0x0000000000350000-0x000000000035C000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/2148-16-0x0000000000360000-0x000000000036C000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/2148-14-0x0000000000340000-0x0000000000352000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2148-13-0x0000000000F30000-0x0000000001040000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2340-623-0x0000000000330000-0x0000000000342000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2412-324-0x0000000000310000-0x0000000000420000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2668-563-0x0000000001200000-0x0000000001310000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2792-683-0x0000000000140000-0x0000000000250000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2792-684-0x0000000000250000-0x0000000000262000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2944-62-0x0000000002070000-0x0000000002078000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2944-61-0x000000001B670000-0x000000001B952000-memory.dmp

                                          Filesize

                                          2.9MB