Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 01:21
Behavioral task
behavioral1
Sample
JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe
-
Size
1.3MB
-
MD5
aebb62851fbec81392d2167ae7fcecaa
-
SHA1
40eafb3cc9f70f4f4acc2b7b0afcdac2c8d1bdcf
-
SHA256
69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375
-
SHA512
60d7cbda4dde07b006516c5506a26ee83cd326c1b1ccc7856faa6a074fc0f09c42557f7978f9e89b7bad814a14b486521273ffd1ab6448e2d6ebd6470ea5b595
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 484 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1156 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 336 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1296 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 696 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 896 3020 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 3020 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x000600000001946e-9.dat dcrat behavioral1/memory/2296-13-0x0000000000AE0000-0x0000000000BF0000-memory.dmp dcrat behavioral1/memory/2636-75-0x0000000000E00000-0x0000000000F10000-memory.dmp dcrat behavioral1/memory/2244-204-0x0000000001150000-0x0000000001260000-memory.dmp dcrat behavioral1/memory/1528-264-0x00000000012D0000-0x00000000013E0000-memory.dmp dcrat behavioral1/memory/2272-443-0x0000000000030000-0x0000000000140000-memory.dmp dcrat behavioral1/memory/760-503-0x0000000000360000-0x0000000000470000-memory.dmp dcrat behavioral1/memory/2248-563-0x00000000010D0000-0x00000000011E0000-memory.dmp dcrat behavioral1/memory/2736-624-0x0000000000270000-0x0000000000380000-memory.dmp dcrat behavioral1/memory/1980-684-0x0000000001100000-0x0000000001210000-memory.dmp dcrat behavioral1/memory/2992-744-0x0000000000280000-0x0000000000390000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2276 powershell.exe 3012 powershell.exe 1924 powershell.exe 2796 powershell.exe 2520 powershell.exe 3028 powershell.exe 2408 powershell.exe 2808 powershell.exe 2504 powershell.exe 1576 powershell.exe 2168 powershell.exe 2084 powershell.exe 1052 powershell.exe 2824 powershell.exe 2300 powershell.exe 3068 powershell.exe 1584 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2296 DllCommonsvc.exe 2636 sppsvc.exe 2244 sppsvc.exe 1528 sppsvc.exe 1680 sppsvc.exe 2292 sppsvc.exe 2272 sppsvc.exe 760 sppsvc.exe 2248 sppsvc.exe 2736 sppsvc.exe 1980 sppsvc.exe 2992 sppsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2180 cmd.exe 2180 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 35 raw.githubusercontent.com 9 raw.githubusercontent.com 22 raw.githubusercontent.com 29 raw.githubusercontent.com 16 raw.githubusercontent.com 19 raw.githubusercontent.com 25 raw.githubusercontent.com 32 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 13 raw.githubusercontent.com -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\42af1c969fbb7b DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\spoolsv.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\f3b6ecef712a24 DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\csrss.exe DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\cmd.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\audiodg.exe DllCommonsvc.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\Panther\setup.exe\OSPPSVC.exe DllCommonsvc.exe File opened for modification C:\Windows\Panther\setup.exe\OSPPSVC.exe DllCommonsvc.exe File created C:\Windows\Tasks\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\f3b6ecef712a24 DllCommonsvc.exe File created C:\Windows\Media\Landscape\69ddcba757bf72 DllCommonsvc.exe File created C:\Windows\Media\Cityscape\spoolsv.exe DllCommonsvc.exe File created C:\Windows\Panther\setup.exe\1610b97d3ab4a7 DllCommonsvc.exe File created C:\Windows\Tasks\System.exe DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\spoolsv.exe DllCommonsvc.exe File created C:\Windows\Media\Landscape\smss.exe DllCommonsvc.exe File created C:\Windows\Media\Cityscape\f3b6ecef712a24 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe 484 schtasks.exe 1256 schtasks.exe 1620 schtasks.exe 2588 schtasks.exe 696 schtasks.exe 1972 schtasks.exe 2688 schtasks.exe 2672 schtasks.exe 1812 schtasks.exe 1288 schtasks.exe 2148 schtasks.exe 2556 schtasks.exe 2784 schtasks.exe 1480 schtasks.exe 2016 schtasks.exe 2940 schtasks.exe 580 schtasks.exe 1296 schtasks.exe 1328 schtasks.exe 2292 schtasks.exe 1532 schtasks.exe 536 schtasks.exe 2120 schtasks.exe 976 schtasks.exe 336 schtasks.exe 1932 schtasks.exe 2644 schtasks.exe 2908 schtasks.exe 2328 schtasks.exe 556 schtasks.exe 1784 schtasks.exe 1156 schtasks.exe 2160 schtasks.exe 896 schtasks.exe 2748 schtasks.exe 2700 schtasks.exe 1628 schtasks.exe 2424 schtasks.exe 1920 schtasks.exe 2152 schtasks.exe 1780 schtasks.exe 932 schtasks.exe 2888 schtasks.exe 2344 schtasks.exe 2980 schtasks.exe 1740 schtasks.exe 3016 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 10 IoCs
pid Process 2244 sppsvc.exe 1528 sppsvc.exe 1680 sppsvc.exe 2292 sppsvc.exe 2272 sppsvc.exe 760 sppsvc.exe 2248 sppsvc.exe 2736 sppsvc.exe 1980 sppsvc.exe 2992 sppsvc.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2296 DllCommonsvc.exe 2296 DllCommonsvc.exe 2296 DllCommonsvc.exe 2296 DllCommonsvc.exe 2296 DllCommonsvc.exe 2296 DllCommonsvc.exe 2296 DllCommonsvc.exe 2300 powershell.exe 1584 powershell.exe 2520 powershell.exe 3068 powershell.exe 3012 powershell.exe 2808 powershell.exe 2084 powershell.exe 2276 powershell.exe 2504 powershell.exe 2168 powershell.exe 3028 powershell.exe 1052 powershell.exe 2824 powershell.exe 1924 powershell.exe 2408 powershell.exe 2796 powershell.exe 1576 powershell.exe 2636 sppsvc.exe 2244 sppsvc.exe 1528 sppsvc.exe 1680 sppsvc.exe 2292 sppsvc.exe 2272 sppsvc.exe 760 sppsvc.exe 2248 sppsvc.exe 2736 sppsvc.exe 1980 sppsvc.exe 2992 sppsvc.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2296 DllCommonsvc.exe Token: SeDebugPrivilege 2300 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeDebugPrivilege 3068 powershell.exe Token: SeDebugPrivilege 3012 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 2636 sppsvc.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 2796 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeDebugPrivilege 2244 sppsvc.exe Token: SeDebugPrivilege 1528 sppsvc.exe Token: SeDebugPrivilege 1680 sppsvc.exe Token: SeDebugPrivilege 2292 sppsvc.exe Token: SeDebugPrivilege 2272 sppsvc.exe Token: SeDebugPrivilege 760 sppsvc.exe Token: SeDebugPrivilege 2248 sppsvc.exe Token: SeDebugPrivilege 2736 sppsvc.exe Token: SeDebugPrivilege 1980 sppsvc.exe Token: SeDebugPrivilege 2992 sppsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2408 3012 JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe 30 PID 3012 wrote to memory of 2408 3012 JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe 30 PID 3012 wrote to memory of 2408 3012 JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe 30 PID 3012 wrote to memory of 2408 3012 JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe 30 PID 2408 wrote to memory of 2180 2408 WScript.exe 31 PID 2408 wrote to memory of 2180 2408 WScript.exe 31 PID 2408 wrote to memory of 2180 2408 WScript.exe 31 PID 2408 wrote to memory of 2180 2408 WScript.exe 31 PID 2180 wrote to memory of 2296 2180 cmd.exe 33 PID 2180 wrote to memory of 2296 2180 cmd.exe 33 PID 2180 wrote to memory of 2296 2180 cmd.exe 33 PID 2180 wrote to memory of 2296 2180 cmd.exe 33 PID 2296 wrote to memory of 2300 2296 DllCommonsvc.exe 83 PID 2296 wrote to memory of 2300 2296 DllCommonsvc.exe 83 PID 2296 wrote to memory of 2300 2296 DllCommonsvc.exe 83 PID 2296 wrote to memory of 3068 2296 DllCommonsvc.exe 84 PID 2296 wrote to memory of 3068 2296 DllCommonsvc.exe 84 PID 2296 wrote to memory of 3068 2296 DllCommonsvc.exe 84 PID 2296 wrote to memory of 1584 2296 DllCommonsvc.exe 86 PID 2296 wrote to memory of 1584 2296 DllCommonsvc.exe 86 PID 2296 wrote to memory of 1584 2296 DllCommonsvc.exe 86 PID 2296 wrote to memory of 1576 2296 DllCommonsvc.exe 87 PID 2296 wrote to memory of 1576 2296 DllCommonsvc.exe 87 PID 2296 wrote to memory of 1576 2296 DllCommonsvc.exe 87 PID 2296 wrote to memory of 2084 2296 DllCommonsvc.exe 89 PID 2296 wrote to memory of 2084 2296 DllCommonsvc.exe 89 PID 2296 wrote to memory of 2084 2296 DllCommonsvc.exe 89 PID 2296 wrote to memory of 2504 2296 DllCommonsvc.exe 91 PID 2296 wrote to memory of 2504 2296 DllCommonsvc.exe 91 PID 2296 wrote to memory of 2504 2296 DllCommonsvc.exe 91 PID 2296 wrote to memory of 2520 2296 DllCommonsvc.exe 92 PID 2296 wrote to memory of 2520 2296 DllCommonsvc.exe 92 PID 2296 wrote to memory of 2520 2296 DllCommonsvc.exe 92 PID 2296 wrote to memory of 1924 2296 DllCommonsvc.exe 93 PID 2296 wrote to memory of 1924 2296 DllCommonsvc.exe 93 PID 2296 wrote to memory of 1924 2296 DllCommonsvc.exe 93 PID 2296 wrote to memory of 3012 2296 DllCommonsvc.exe 94 PID 2296 wrote to memory of 3012 2296 DllCommonsvc.exe 94 PID 2296 wrote to memory of 3012 2296 DllCommonsvc.exe 94 PID 2296 wrote to memory of 3028 2296 DllCommonsvc.exe 95 PID 2296 wrote to memory of 3028 2296 DllCommonsvc.exe 95 PID 2296 wrote to memory of 3028 2296 DllCommonsvc.exe 95 PID 2296 wrote to memory of 2796 2296 DllCommonsvc.exe 98 PID 2296 wrote to memory of 2796 2296 DllCommonsvc.exe 98 PID 2296 wrote to memory of 2796 2296 DllCommonsvc.exe 98 PID 2296 wrote to memory of 2276 2296 DllCommonsvc.exe 99 PID 2296 wrote to memory of 2276 2296 DllCommonsvc.exe 99 PID 2296 wrote to memory of 2276 2296 DllCommonsvc.exe 99 PID 2296 wrote to memory of 2168 2296 DllCommonsvc.exe 100 PID 2296 wrote to memory of 2168 2296 DllCommonsvc.exe 100 PID 2296 wrote to memory of 2168 2296 DllCommonsvc.exe 100 PID 2296 wrote to memory of 2408 2296 DllCommonsvc.exe 101 PID 2296 wrote to memory of 2408 2296 DllCommonsvc.exe 101 PID 2296 wrote to memory of 2408 2296 DllCommonsvc.exe 101 PID 2296 wrote to memory of 2824 2296 DllCommonsvc.exe 102 PID 2296 wrote to memory of 2824 2296 DllCommonsvc.exe 102 PID 2296 wrote to memory of 2824 2296 DllCommonsvc.exe 102 PID 2296 wrote to memory of 2808 2296 DllCommonsvc.exe 103 PID 2296 wrote to memory of 2808 2296 DllCommonsvc.exe 103 PID 2296 wrote to memory of 2808 2296 DllCommonsvc.exe 103 PID 2296 wrote to memory of 1052 2296 DllCommonsvc.exe 104 PID 2296 wrote to memory of 1052 2296 DllCommonsvc.exe 104 PID 2296 wrote to memory of 1052 2296 DllCommonsvc.exe 104 PID 2296 wrote to memory of 2636 2296 DllCommonsvc.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69f3f1f5334614df94bd38a0fdafa1dcf50721b71e81c7e91e109ad2889aa375.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Panther\setup.exe\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Tasks\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Performance\WinSAT\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Media\Landscape\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Media\Cityscape\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Music\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VDNADHaqjn.bat"6⤵PID:1632
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:396
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uOEGMIRuqZ.bat"8⤵PID:2160
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1296
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nDq7RH5Uwz.bat"10⤵PID:2576
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2312
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\a1rZrAbBst.bat"12⤵PID:2248
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:836
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GsZYO5BIqk.bat"14⤵PID:1392
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2220
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LkcfmFI5TJ.bat"16⤵PID:3044
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:1780
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:760 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yvlYFj4oEg.bat"18⤵PID:2840
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2016
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fH1ASKIIFN.bat"20⤵PID:1340
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:1292
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TfYr4aOzGb.bat"22⤵PID:696
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2116
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aoAocY3YSO.bat"24⤵PID:2140
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:2952
-
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe"25⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Windows\Panther\setup.exe\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Panther\setup.exe\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Windows\Panther\setup.exe\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\Tasks\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Windows\Media\Landscape\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\Media\Landscape\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Windows\Media\Landscape\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Windows\Media\Cityscape\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Media\Cityscape\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Windows\Media\Cityscape\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Music\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Music\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Music\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac23eafb8b04dde75b85ca32ca84da95
SHA1f01246033627bffd28cdede0acb74dd105f4d82b
SHA256dc9b2e18045fefe04fc2cb21e5aa32dc108b2d5f19b2419db4e91c9e26c9cfd2
SHA512d9eab83bd6dba16c2602c7705ab6bee6f1df9131da3369cc7e500830afc6ccc0d95fe60962b1a237cbb8ded9b47af6ec8fe70ffcf5e48ee4bee5c9d30676e3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141cb07e149ee0a6ab503ce1d62f8dee
SHA197377cdaeff7fc1dac4fce49b9535ae36d36b8f1
SHA256726e39096e7231dc4984db05419282f5d241b9a3e102d99493c2bcfad977169c
SHA512369a80fbdcf35569b1c0c6ab9e4946533f2962fc88610ed21200811690db22bde099938b325c41d0ca55af39001df3ade731dc339fc34eb84b19c7cc78d52862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd0ef084ba392af657754bfdbb3f3f2
SHA1e219c33e05502d4de43ac9a114e9cb68a267af60
SHA256d6dbe05749724afc91c46df256e73defb532767260845822708b307722d6579f
SHA512625606bd412fd3465ec439c50b00e3e3b1fd9c08566e5f67e7a9b42028c84553277ba0d1d5d1bd7cd9c15be2de65d39a2c917ebc88563a2cae5ea2aebd774a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f03cd83833b7d860b3e37b4be83a673
SHA15005a553e9f7a2f26a44734f6f81c1c8b15071dc
SHA25691ffc7b405a9ae5b17dcf1b0858a1b7714f9c1b44b585d73325197be3a1e2f3e
SHA5128f830196b58f7c25df662468b3504d198c7f8b1560c4f5d885b525c3ec8152ac7aff29ad5d42aa8e60701e8e4c648f00906398d62939ed35b7872ef3ab5b7487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5b5c9eaf059b67dd75fdda42c89877
SHA18ed3b6a782ef68619c19eebd92eed10feb5e4b0c
SHA25651c50ae71a22215730cf39520870671657a9f6dfa101a2bacbeb6bb44e38d13a
SHA51210462f3651c0cf890d1beccabacd397f952de5e30591c1d344d00839ac361bec3cd874f9eb9ceb0fbf8bf27ad4b0a3a2460fe072166107de97e55ab7deb98498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759c52d9800323e96673ebd2ccbb58fc
SHA1b0ae462cdbb2f2b0419922b5c3af8baa1ae9f037
SHA256fb3fd6d6f5196e3c675fee1021402176176ea0ef98e424df05659b5e44e8fed5
SHA5128bb354117baaa439aa1d4bf8be62d8db32e30f4996d0a4029384f3c1ccdb5a67a037829cabe6549dfdc5280799b28445ea1a1dd1f5f08fd0ec9d8597cac9e2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56899bb3489c11d0dbfb2317ca475caac
SHA115de6a718028cf3623b28cc60e74f6aff72528f6
SHA25653c16770feefa12b3f0cea320006b2b6b619818a5387b8e727a8606a0ee84fc8
SHA512cf99d64ddb193feb4516de9062e5cacac99639540dd1d4a02fb33d07e7285fdbf6bc70001b67a9519ff4193add7693284cf40de0f1ec8f4f89e18daad9955869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f951b42114c45277391e10ad5aa59b9
SHA1cb2e812834eee9f88639ab3fe633f0da58ab6b42
SHA2567ac1dab83704822544422acdd363a686ca3e53c151e531d5a5bd74ae06ec1818
SHA512f679282b4d6a2e3fef8a9029d1fa62bdcc343e4561c5e9141167840015419e587377cdd4161452f7147176df0377509944db068681e6bcd63ccf2ba04314e9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574388d17afce59ca66730f07db9f82e3
SHA172e9c72b0653b38541cbf34ddedbf1491b8d9c11
SHA25688aa5e282e8f9e28680def5702848246b2fd60c8af6f3d0c2223b8243c82b43f
SHA512014e1298c613ffe022d4c59eeab625aa047eaaeba92c2649c7f5730b21546d34abe0ad63bf0169431728686528ebca3baa7c060a9902d3ed397ad1fc83fe6b0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
238B
MD5fcd1b0876a1b8a426b8db6321358e7f0
SHA1e6f8466784289b15b1bface42cd373e3b9564805
SHA256c9d158a07603c56fb02aaf881c12579a1066de34a4c36bd9bdb8702dbc94c5e8
SHA512056dbb392c4e922ded863748b979322844f8a6ae0236385b13b7406a24fcc514e22d0386d3d42397edf5c92a8682c33277a93197e7586dccb176e93554ce7d65
-
Filesize
238B
MD5a16c2c368fb135f9b61b740eda03504b
SHA12986cdb4e039020dfa78c75c2895e0527b8176db
SHA256c3b435c03cae27c4b2ebbff84a6a386c5a73c21fec4db413081efea3abd479d1
SHA512772c98833aeb61ba15a9e18092ea26f34736a0ca0fc1b7fd2242df54eff94f052df856bcd1c2c72cde0ef597bccbbfd260a9e5e1bedf8899b3ccd6b79337cb4d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
238B
MD5d4d761ffdc4cfcad86cc9bbfef5daee0
SHA1a6378d1b6ef03021aed1264bc447d2e21211cbfb
SHA2561577abff2c82eb7df9602c8743d6acffff35ba38fd83c560937f3258af10ecf2
SHA512b4ae5536e330b44b841a9b8bc01fc7ac1335ccd1ae5de3277ce2e3569c128380fc88594e0e3593ae224e9615632137c639784a22ca4cdf5b38e8ee53648c6cd5
-
Filesize
238B
MD5469186ee39cc969a190132828a29e6c0
SHA17653bfa0872ece299b8a9d7d87341c87535e1073
SHA2563746dfa86d808426fa949786a3601dd4eaa346df3b1b9aed00c2c74815b7c24a
SHA51240c3fb90d1a7a816f5629314473c52c558470d9d6326ce7578d68612d3494e9764f5a64dd669584c7833f56d5a86c201c743f5b06c78dbb2a89ef6f67a484383
-
Filesize
238B
MD5a789dac10e1fab2b7dde8bd1f935b3fe
SHA1c44d7e6f5cada0b4d88167fa42196cd697abfc47
SHA256d501c9b590fe87e3ab07a2f8fb490bb00b2df51df8d50e7371ce5de82c43938c
SHA512048ab7a258b4d5db1f21a4906fe2decd9993b08b361cc8cc4c8548ab14d4785169f27672679c39fdd2e1c1370d97a35343bac0557e3cc1ccae521c1d2303b8e0
-
Filesize
238B
MD509e1e7f734dd8b90df044f01cac491c7
SHA143a00f4ad6b3630a93ff2a21e999e25304aa1ca0
SHA256ef261d127639da17097b48a2d995814d68752125bbdefdfaabd6328b2cd62a5f
SHA5126bf31726c04a0261b40a544328b9b2758bc93a7c7583e5c620c9297131e99bbce374a1d3ddd29458f7023331a646b4df799bfd0c04e03727a2e775ae04d3a3a4
-
Filesize
238B
MD5a6473c0cc55807be558a2d35541fc67c
SHA1b1d70c87d8791e2f30bda9fd2de1f957a2b34f9f
SHA256db6026aebf3b621715cf1a9f383cd557e9bf62fb0a01b490e2e3b03c39c46ea9
SHA51218a0b4a674348e9f4baa90f136a30e4984111ffaf6292a3271c0e66ad2089cd3a7e6a7c7208a3151a0a2f049cb5fe4284bed9a3757fa929c5f8dacf57036d8d3
-
Filesize
238B
MD504e3d265d73775a62f2e0ce76eea4162
SHA1ba3081ae9e59d85a5ad5cf8c0bac495b92ee0ff6
SHA256a33e22e61c7ed7c95dfe2ab6095818aa46245ca55a80f202217e6ae521116bf3
SHA5128b6494928e3c87846e729e006a8f6eb6c703cfeaa707e4f5df0e7009fdf69a3d81be53a4681427f10ede92d8c8f924e94a488b361f55b96294a02b59da8096ec
-
Filesize
238B
MD5461a33ad3fa33257019af40dd6474a51
SHA1eee0e324a7371e0eed19968936456a36230ad31b
SHA2565566ea20a588ad260eda2e7ef4e05d3f166564f1de73806ce3704abbd4495745
SHA512882d6c895166f717fefb237e01db7fd4ac06d7df3929ba96a2d021467ab6374b800c5c0ac97d9e88860f0c8940c04a55aba628ad6a7ebdcf5f4de3c39c258804
-
Filesize
238B
MD56c42dd446f89456cb0d6708a11f3f13a
SHA186725b0a338a1d13235230a496f2336aa3f5ab8f
SHA256bab6c0089f381c046d7e0bfeaa3eb834ee76afb6462874fa476bfabe128c1bdb
SHA51235780eb804daddfdf39695c97784e9387b05443b9a0f124336c14c34fa165e424db40786c8cfe630ce78654621691500bf053a0a90b2e6cb58c2481a544988c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD534c4c62f3071fe1add8c9c9d54ecc013
SHA18be32dfcfc1b27bf6f3ac2522a2188c90466377e
SHA25637672ddfe20c86394dcba09e04d9965b9b66d02c7fc1fc51944dd557dfb9f08b
SHA512a765cbcc57bdc15f1ba7320d32cdb468d6bd6480174fe640b65d1dfff07239e42371e99286b620c6ba1ef60c475a7d628c8c154f826bd94cad96857975b88538
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394