Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 00:00
Behavioral task
behavioral1
Sample
JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe
-
Size
1.3MB
-
MD5
cdf155e2dcac11dd627002842913867f
-
SHA1
e2cfdce8c2e7d4a62ac4ca45c62d5974fa73d6c8
-
SHA256
55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605
-
SHA512
1f854be652245458ce62044081b709f54c9648879feeb4222e2d0779bdc42119c8091223d388f587c475132dd2bb32ebbad5e4604ff09a4534860eb90dad29bc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 816 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 236 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 604 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1372 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1036 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1224 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 272 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2612 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2612 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000017079-9.dat dcrat behavioral1/memory/2712-13-0x0000000000CF0000-0x0000000000E00000-memory.dmp dcrat behavioral1/memory/280-161-0x0000000001310000-0x0000000001420000-memory.dmp dcrat behavioral1/memory/848-279-0x0000000000110000-0x0000000000220000-memory.dmp dcrat behavioral1/memory/2192-339-0x0000000000190000-0x00000000002A0000-memory.dmp dcrat behavioral1/memory/2116-399-0x00000000010A0000-0x00000000011B0000-memory.dmp dcrat behavioral1/memory/1156-637-0x00000000000A0000-0x00000000001B0000-memory.dmp dcrat behavioral1/memory/324-697-0x00000000013D0000-0x00000000014E0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2308 powershell.exe 2832 powershell.exe 2544 powershell.exe 2564 powershell.exe 2720 powershell.exe 1152 powershell.exe 2584 powershell.exe 2576 powershell.exe 1312 powershell.exe 2812 powershell.exe 2872 powershell.exe 2548 powershell.exe 2648 powershell.exe 2088 powershell.exe 1204 powershell.exe 276 powershell.exe 2900 powershell.exe 2976 powershell.exe 2876 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2712 DllCommonsvc.exe 280 csrss.exe 1720 csrss.exe 848 csrss.exe 2192 csrss.exe 2116 csrss.exe 1760 csrss.exe 1500 csrss.exe 2336 csrss.exe 1156 csrss.exe 324 csrss.exe 892 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2556 cmd.exe 2556 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 20 raw.githubusercontent.com 29 raw.githubusercontent.com 33 raw.githubusercontent.com 36 raw.githubusercontent.com 5 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 23 raw.githubusercontent.com 26 raw.githubusercontent.com 4 raw.githubusercontent.com 9 raw.githubusercontent.com -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\24dbde2999530e DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\winlogon.exe DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Idle.exe DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\dllhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\wininit.exe DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\088424020bedd6 DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\Idle.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\56085415360792 DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\5940a34987c991 DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\conhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\CrashReports\winlogon.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\CrashReports\cc11b995f2a76d DllCommonsvc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\en-US\42af1c969fbb7b DllCommonsvc.exe File created C:\Windows\ehome\en-US\lsm.exe DllCommonsvc.exe File created C:\Windows\ehome\en-US\101b941d020240 DllCommonsvc.exe File created C:\Windows\en-US\audiodg.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1660 schtasks.exe 332 schtasks.exe 1588 schtasks.exe 272 schtasks.exe 892 schtasks.exe 2184 schtasks.exe 1372 schtasks.exe 1824 schtasks.exe 2020 schtasks.exe 1304 schtasks.exe 3052 schtasks.exe 1084 schtasks.exe 2388 schtasks.exe 2708 schtasks.exe 1036 schtasks.exe 2264 schtasks.exe 3004 schtasks.exe 2768 schtasks.exe 1800 schtasks.exe 1776 schtasks.exe 408 schtasks.exe 2040 schtasks.exe 2328 schtasks.exe 236 schtasks.exe 1724 schtasks.exe 1924 schtasks.exe 1580 schtasks.exe 860 schtasks.exe 2056 schtasks.exe 2608 schtasks.exe 1200 schtasks.exe 568 schtasks.exe 2824 schtasks.exe 2144 schtasks.exe 2216 schtasks.exe 2924 schtasks.exe 2348 schtasks.exe 2236 schtasks.exe 1704 schtasks.exe 1680 schtasks.exe 1868 schtasks.exe 1656 schtasks.exe 2700 schtasks.exe 2644 schtasks.exe 2108 schtasks.exe 2064 schtasks.exe 1224 schtasks.exe 2148 schtasks.exe 2116 schtasks.exe 2432 schtasks.exe 816 schtasks.exe 2640 schtasks.exe 2280 schtasks.exe 604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2712 DllCommonsvc.exe 2712 DllCommonsvc.exe 2712 DllCommonsvc.exe 2576 powershell.exe 2584 powershell.exe 276 powershell.exe 2544 powershell.exe 2308 powershell.exe 2088 powershell.exe 2872 powershell.exe 2648 powershell.exe 2876 powershell.exe 2720 powershell.exe 2548 powershell.exe 2812 powershell.exe 1312 powershell.exe 2976 powershell.exe 1152 powershell.exe 2832 powershell.exe 1204 powershell.exe 2564 powershell.exe 2900 powershell.exe 280 csrss.exe 1720 csrss.exe 848 csrss.exe 2192 csrss.exe 2116 csrss.exe 1760 csrss.exe 1500 csrss.exe 2336 csrss.exe 1156 csrss.exe 324 csrss.exe 892 csrss.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2712 DllCommonsvc.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 276 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 1312 powershell.exe Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 1152 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 280 csrss.exe Token: SeDebugPrivilege 1720 csrss.exe Token: SeDebugPrivilege 848 csrss.exe Token: SeDebugPrivilege 2192 csrss.exe Token: SeDebugPrivilege 2116 csrss.exe Token: SeDebugPrivilege 1760 csrss.exe Token: SeDebugPrivilege 1500 csrss.exe Token: SeDebugPrivilege 2336 csrss.exe Token: SeDebugPrivilege 1156 csrss.exe Token: SeDebugPrivilege 324 csrss.exe Token: SeDebugPrivilege 892 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2812 2644 JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe 30 PID 2644 wrote to memory of 2812 2644 JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe 30 PID 2644 wrote to memory of 2812 2644 JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe 30 PID 2644 wrote to memory of 2812 2644 JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe 30 PID 2812 wrote to memory of 2556 2812 WScript.exe 31 PID 2812 wrote to memory of 2556 2812 WScript.exe 31 PID 2812 wrote to memory of 2556 2812 WScript.exe 31 PID 2812 wrote to memory of 2556 2812 WScript.exe 31 PID 2556 wrote to memory of 2712 2556 cmd.exe 33 PID 2556 wrote to memory of 2712 2556 cmd.exe 33 PID 2556 wrote to memory of 2712 2556 cmd.exe 33 PID 2556 wrote to memory of 2712 2556 cmd.exe 33 PID 2712 wrote to memory of 2832 2712 DllCommonsvc.exe 89 PID 2712 wrote to memory of 2832 2712 DllCommonsvc.exe 89 PID 2712 wrote to memory of 2832 2712 DllCommonsvc.exe 89 PID 2712 wrote to memory of 2812 2712 DllCommonsvc.exe 90 PID 2712 wrote to memory of 2812 2712 DllCommonsvc.exe 90 PID 2712 wrote to memory of 2812 2712 DllCommonsvc.exe 90 PID 2712 wrote to memory of 2584 2712 DllCommonsvc.exe 91 PID 2712 wrote to memory of 2584 2712 DllCommonsvc.exe 91 PID 2712 wrote to memory of 2584 2712 DllCommonsvc.exe 91 PID 2712 wrote to memory of 2576 2712 DllCommonsvc.exe 92 PID 2712 wrote to memory of 2576 2712 DllCommonsvc.exe 92 PID 2712 wrote to memory of 2576 2712 DllCommonsvc.exe 92 PID 2712 wrote to memory of 2872 2712 DllCommonsvc.exe 93 PID 2712 wrote to memory of 2872 2712 DllCommonsvc.exe 93 PID 2712 wrote to memory of 2872 2712 DllCommonsvc.exe 93 PID 2712 wrote to memory of 2548 2712 DllCommonsvc.exe 94 PID 2712 wrote to memory of 2548 2712 DllCommonsvc.exe 94 PID 2712 wrote to memory of 2548 2712 DllCommonsvc.exe 94 PID 2712 wrote to memory of 2544 2712 DllCommonsvc.exe 95 PID 2712 wrote to memory of 2544 2712 DllCommonsvc.exe 95 PID 2712 wrote to memory of 2544 2712 DllCommonsvc.exe 95 PID 2712 wrote to memory of 2564 2712 DllCommonsvc.exe 96 PID 2712 wrote to memory of 2564 2712 DllCommonsvc.exe 96 PID 2712 wrote to memory of 2564 2712 DllCommonsvc.exe 96 PID 2712 wrote to memory of 1204 2712 DllCommonsvc.exe 97 PID 2712 wrote to memory of 1204 2712 DllCommonsvc.exe 97 PID 2712 wrote to memory of 1204 2712 DllCommonsvc.exe 97 PID 2712 wrote to memory of 2720 2712 DllCommonsvc.exe 98 PID 2712 wrote to memory of 2720 2712 DllCommonsvc.exe 98 PID 2712 wrote to memory of 2720 2712 DllCommonsvc.exe 98 PID 2712 wrote to memory of 276 2712 DllCommonsvc.exe 99 PID 2712 wrote to memory of 276 2712 DllCommonsvc.exe 99 PID 2712 wrote to memory of 276 2712 DllCommonsvc.exe 99 PID 2712 wrote to memory of 2900 2712 DllCommonsvc.exe 100 PID 2712 wrote to memory of 2900 2712 DllCommonsvc.exe 100 PID 2712 wrote to memory of 2900 2712 DllCommonsvc.exe 100 PID 2712 wrote to memory of 2976 2712 DllCommonsvc.exe 101 PID 2712 wrote to memory of 2976 2712 DllCommonsvc.exe 101 PID 2712 wrote to memory of 2976 2712 DllCommonsvc.exe 101 PID 2712 wrote to memory of 2648 2712 DllCommonsvc.exe 102 PID 2712 wrote to memory of 2648 2712 DllCommonsvc.exe 102 PID 2712 wrote to memory of 2648 2712 DllCommonsvc.exe 102 PID 2712 wrote to memory of 2088 2712 DllCommonsvc.exe 103 PID 2712 wrote to memory of 2088 2712 DllCommonsvc.exe 103 PID 2712 wrote to memory of 2088 2712 DllCommonsvc.exe 103 PID 2712 wrote to memory of 1152 2712 DllCommonsvc.exe 104 PID 2712 wrote to memory of 1152 2712 DllCommonsvc.exe 104 PID 2712 wrote to memory of 1152 2712 DllCommonsvc.exe 104 PID 2712 wrote to memory of 1312 2712 DllCommonsvc.exe 105 PID 2712 wrote to memory of 1312 2712 DllCommonsvc.exe 105 PID 2712 wrote to memory of 1312 2712 DllCommonsvc.exe 105 PID 2712 wrote to memory of 2876 2712 DllCommonsvc.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_55fce07b7d5723e640d094e270160d5ed291651b78722be7d6f661edd4566605.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\CrashReports\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Favorites\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Shared Gadgets\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\en-US\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ehome\en-US\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Shared Gadgets\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RDh5GxtFEL.bat"5⤵PID:1788
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:624
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uxMZkGAiOs.bat"7⤵PID:1156
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1868
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jddtUB3Qwl.bat"9⤵PID:888
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1760
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mv5UKbIUPK.bat"11⤵PID:2892
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2100
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\34gW2xHJWZ.bat"13⤵PID:1752
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2660
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hD3D8PLBZ9.bat"15⤵PID:2696
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2764
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xghrCifyI9.bat"17⤵PID:2848
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:540
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wRWwqJyPGw.bat"19⤵PID:2280
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:1512
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1CE969IshF.bat"21⤵PID:1000
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:1664
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AWL6wsGpK7.bat"23⤵PID:2960
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:2916
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZcfpJnj91J.bat"25⤵PID:2676
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:2756
-
-
C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\CrashReports\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\CrashReports\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Favorites\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Favorites\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Windows\en-US\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Windows\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Users\Public\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Public\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Users\Public\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Windows\ehome\en-US\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\ehome\en-US\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Windows\ehome\en-US\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\providercommon\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6dab6b9dbab90718ec26cf96893e63c
SHA1f26beea1430b9d01e726aaf5e5d906f33c73352e
SHA2563211e7c6190a130112487f6e8bb91820ca671fc697be8a7bc50964a298300db3
SHA51246caa4e2412374e3e77db0dced042d4421aba847ddc4319425fadcf47bcdff9ab1f21fc871902c369f82488186e4f8b4ca31945c37247e4b1250802be741d7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10e674b56c26f727425fa1ecc65d0fa
SHA13797add6ae4f32183ccf07e37687f36d165f3e28
SHA25655e0a70284cce9b1e8fd25db518b325d749b401977c2d64526afc5070aaadc16
SHA5121cff2b647ec01850f8d0178514305625a61b873a908c7ab5fee9f3f3691c3098e8620181abade9decd31b6975383647b5f1c095a6625f9256cbd704d2d5ecde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52876081a04b2eb0965d1aa17e90d5d0b
SHA11da4f511dc5ed0db039c251f4836ba5b56490da4
SHA2568802d452116e11ec1dfc902f05ddb0a75f991bcf9e39947c5e0814a07ebd7526
SHA512874075b0cae6ac99b96995fd8e2cabe6f634be6747c85d80040bf103c95461e9f7d0ef83c4d58c5f5f6c71ea51cf3f74614d87bee41e5886ca822091d4aeef29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a70efffef3cc2d5eb0fd750d4f4cf23
SHA168bb7558219c9e7b11096f9937da2adfd598f0d0
SHA2563a3dd7f8115620971fa0b10a7d5de8c5817423af88e8f2773fadcca44b9119e1
SHA51238df42913988058a352ff484851a8ccab7de2233b4b63cc525bbc9a4405bf581fb7398774647ccc3493ae6272c8155d30e589fdbefc1b6e6d5f02d78f2b642d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e0e029d328a2d4e0d39dd1832d717a
SHA13b0abecdc31f0d3eaff0d98acc9ecb6232b8bb47
SHA256a31e724a0a207434d17942271db4f1c64ee1f91fcc31e85a8044c4b67dcfc904
SHA51211af28b988ff8636f94cb9f9a78996a4773f78ec0e59449e5ffbf33f10e243f5df9d8dbae2fa9d2a7996f1fa7b561b7b7e383e9c4799680ecf20226b4109fb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6a268341740665f4d645028048ee03
SHA10c5452e195790dd60bc5ad5691cc302641da78ff
SHA256b985eb131f4b4e7da993fa42614ebcce6cf849d267e2c822c067ecda2b42c0e5
SHA512f55231cf0717b116d44a42ea175838ceb8ca2f2368579ea93315e1e875ff2de0df0cdbfd0f8d9cc9555fe5f2abf6530acccaa3ee1e912f49574baee15be78d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51840c0c20128a110c0a4eb1e9c8524d9
SHA12b2f679179fc860039d331e4d16484c5e3de4f87
SHA2564c49b35f6181ba3f15ee458982365a597af84dd3a14395f5ec469598c253b34e
SHA512509942355e2de881c6fe733e4b21e65e81370c3b28bf0f7b967cc78cd99e310ec5e0aa6d3d7263c0b8c7f0070c59cabc1dff1d03d9b99bf762a944100460d42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b81adb116866f3285becd66fdb2577df
SHA1e6319eedb43337eeed999542684bd77d1be765e7
SHA2562b12a0ccbabd33f5fda59792508b6b6813a3ca8125e6fa9e214f30f3202b745a
SHA512b241dab2d5bd42bbb5e689b0be45beab70c9d051fb6d6ec7ab1480c566847ef6a499140611eff42e122419c8b33a884ad515c064ef3684ac24bab143924788a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf640303e5013a440aac2c100586e1df
SHA13e9804f6457f545ed75faa06f4cfc69d04b62daf
SHA256da8b1ce61950299e4d19c55d39542253b8c02134b53876c471bcefd2a91228ee
SHA512d97ce4fcdc23e7d38625417a22e13ee459c5560c3ae518b3a6366fd2b5ff20dd46add05a24dd9249a28d89ce907b82b30dc997019e2bcd5e668f04eb199f2ba5
-
Filesize
221B
MD51c3c67ff666e559427bbfea17703d9f7
SHA14b44ef3e0e92f030a8610d22561e3132ce1f09ef
SHA25620386515a74f3906414ab22b167c33540d53f558f225f89a9dd63d4faa8d6311
SHA51267731843312d703afec418fb832b1f83c8c4439c9eef164aca6b699be9c1b59bc99b5e6c1ed0b146417f8fc0716b71ac78aad72a45cd06149703ca73808955ae
-
Filesize
221B
MD5aaa78b2ceea8bc382948b46067608a57
SHA1d8dad210a22393a9eed37dda607477e6f2145601
SHA256c5132bf27d81fd5c274e236baebcebeb301d8fff011243e983929fafaab33497
SHA512a194dde9e5737e7c4f70c85bb07b5be3edd005cb20cd51e3a04f17e256dee22763bec4b2911fab39caba639ddca2a3166a5c0682191a7f9c17a34878b8f090bc
-
Filesize
221B
MD50212ec15ab18356e3175c78a3ce6112a
SHA1ce96979f51c0418afbdf606c0b05455b9b32ad06
SHA25634798bdb9f1cac206571473c9f18f374ba7fd3cf497a96904b764da2b9b20f51
SHA512caf30a0ea9dd092429a23cd2b536d3f1470ef267996a2c2348f80a68121bd094aef01997008c49eef31a3dd2379c27137b491c6af8493a261877116a99a3cfc9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
221B
MD541e517be9cad03740de105acaaa0ea4e
SHA15937ed93608427a25681ec74a5048e5610c89928
SHA256162bcaa8de6bd2dbfaff2ad9c33598d907a73eb3369d65c14a85431d0bcde6a7
SHA512e1dae2f009b53d03300a237c32510e04b96dd88db3930ada410a177d7dbcc8183a744a154f7ec571f9fe601466c4bad60fe9f8fdb3ca53e39588517aa93c84ec
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
221B
MD554afccce52d2b6d2bb68751efbdaffcf
SHA183988e377f9206c960d0000b84ddce45616d0b40
SHA256ca2d6e82af3758e5e4b99becc6af5b18ef2444b94353db96bb0a51bc45f58d28
SHA512be4775248b3e3af9e818d9b369a915bb9268773080ccd7768dc993b6fd3e3a412401fcdad0dbb0273edae5dc94d55e65eb82d63968c1d38933e92c097f9d14fe
-
Filesize
221B
MD573180e549ef95b71954b07c9c1496dd4
SHA1d1c84e0b258fb2b4028c9c6036a47c24bb7b40a2
SHA256a379cd0e1421f9d00ffcdf03032c23d6841a4bef5ec741d9f51bf9a812a721a5
SHA5126bbe7af00c28a6a2e155a67bf4a5e1a578eec5a03f5632e8d4446ee37590a5a66a16e5b99c73173d8c2c1d1990f31a1d99c2aef279ab7be781baa838a08f8fec
-
Filesize
221B
MD5d70eb7c30a193a28924188a21dadf251
SHA13ade052035adb4f93436e5d1b363b5b037716d4a
SHA256fb3626f21ae0e3ed07c89676aa7cec64d0914e4365c8e95acb80d031052d21f5
SHA5127693541f2a41882cdd71fb980c8a61f31a743bd07427cca0d24dd164053745b42e99866aa86987847cde205cc8687a2439fa5883c452e5ca53b738de0b33e94f
-
Filesize
221B
MD5ab5069cd1f94b34fc478afb55a60e1ad
SHA14ebaa25ab1d1f6d220c3da0ee87ccdb001482261
SHA2569fef09b150df328fb80ac3a2db13552b94673df24355c2ce8441476a1fab9eb2
SHA512d8459000ee1808cf034d0374f3cdd533f7c728292a33298628944afb0e36b6d031ed5bb953e8496585f2d0b28840eca366f864baa67693f1b795618aea46e41e
-
Filesize
221B
MD5cf8cc52e53f27e798a7bfbb1fbfb5b51
SHA17504936125241cd133ac84d242325eaa07c94bc2
SHA2561871d9c0c7385b4c7533ca85fb8b85318977ca79d36ce30c1cc2e75d20455e96
SHA512a75d85a5718e5f3cb0a053576dcda20309397099f5a78a80b8f21d74d8c5c7ffc27e375e4da96b13b7b84a36ed395ce2a6081e1fc44e3f56b4313cf97e7643b0
-
Filesize
221B
MD522d66967e859be87a8eafb9afe95d5e0
SHA105792903a038c551cfaa50ea075b468a1ef2c2f8
SHA25666c9556ce0a4a2b9c5d7297f65c45faab0884169bb5f3dbdb8f88fa38c05ff4c
SHA5124db7d97cad0ba9bb0dbc42a1725c4206019efa94706db6fd6c48d9e9408e0ee7f8fd530a9b737a0a3dd7aafbb827e740876af0171f87b2a4c5d08cd2364ff404
-
Filesize
221B
MD59ddd1a292b2a2065fe299d8f697d0048
SHA1c7b61f34d0506a8b11bb79d73be43ca36c12879c
SHA2563b1155037446ab2e756c0795a78c7a3a7bf329a49ced555c9fc56a0abdc56fa7
SHA5128a307c131fcf93400100e0e3c05ddf2104ed6872741425191d88c47ad02ae1f0a7bc41623d2f0239cd847e0db8c0b717dd6af7a106571d3860e5b4f63782a170
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58552f040d54b5b4e51ee8abc647b5b12
SHA17ce56fc0c29dd4d4517490b304b9e3a9f192fa02
SHA25659113e72cbe3a1ed9a930eeecb52a935d44da0f5a77a001e90e1b3a775e38d78
SHA51290ed6cbe06969c8918a97e714ba2f59772b1cab74fb0c8c1ed35db385c32c09a00f3493056bf5aeaa7214f00da429e42d3cbae4769e8117e0a2fbaefdf2abd24
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394