Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:25
Behavioral task
behavioral1
Sample
JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe
-
Size
1.3MB
-
MD5
64fd17b27a6e236a27c2cc71d3a3139d
-
SHA1
7056a4ea481aebf8b7a306007dea1b3dcea131c9
-
SHA256
4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416
-
SHA512
8b0e988f1cb0176ed8b7c454fd3c2b523799d880b508380eb9b06b9829690f7630ce54138d22252f2bc27878d01e926e30e844eb0bc19429073e4726d747eed6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3244 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 416 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4100 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3632 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3736 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 468 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3248 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4760 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4576 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4724 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4992 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5004 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3528 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5072 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2876 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 1152 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3308 1152 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x0008000000023bfa-10.dat dcrat behavioral2/memory/4476-13-0x0000000000230000-0x0000000000340000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2336 powershell.exe 228 powershell.exe 4388 powershell.exe 4520 powershell.exe 2312 powershell.exe 3604 powershell.exe 1972 powershell.exe 4424 powershell.exe 1508 powershell.exe 3312 powershell.exe 2852 powershell.exe 3088 powershell.exe 1804 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 14 IoCs
pid Process 4476 DllCommonsvc.exe 2608 lsass.exe 2216 lsass.exe 1964 lsass.exe 4236 lsass.exe 2524 lsass.exe 116 lsass.exe 4724 lsass.exe 436 lsass.exe 3588 lsass.exe 3100 lsass.exe 1248 lsass.exe 4560 lsass.exe 4704 lsass.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 14 raw.githubusercontent.com 15 raw.githubusercontent.com 47 raw.githubusercontent.com 49 raw.githubusercontent.com 57 raw.githubusercontent.com 58 raw.githubusercontent.com 59 raw.githubusercontent.com 17 raw.githubusercontent.com 31 raw.githubusercontent.com 42 raw.githubusercontent.com 43 raw.githubusercontent.com 48 raw.githubusercontent.com 56 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\LogFiles\Windows Portable Devices\SppExtComObj.exe DllCommonsvc.exe File created C:\Windows\SysWOW64\LogFiles\Windows Portable Devices\e1ef82546f0b02 DllCommonsvc.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\cmd.exe DllCommonsvc.exe File created C:\Program Files\Windows Photo Viewer\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\55b276f4edf653 DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\6203df4a6bafc7 DllCommonsvc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\PrintDialog\pris\dwm.exe DllCommonsvc.exe File opened for modification C:\Windows\PrintDialog\pris\dwm.exe DllCommonsvc.exe File created C:\Windows\PrintDialog\pris\6cb0b6c459d5d3 DllCommonsvc.exe File created C:\Windows\Resources\Ease of Access Themes\taskhostw.exe DllCommonsvc.exe File created C:\Windows\Resources\Ease of Access Themes\ea9f0e6c9e2dcd DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings lsass.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2396 schtasks.exe 4100 schtasks.exe 5072 schtasks.exe 1548 schtasks.exe 2324 schtasks.exe 3244 schtasks.exe 5028 schtasks.exe 1476 schtasks.exe 3248 schtasks.exe 4760 schtasks.exe 4984 schtasks.exe 2812 schtasks.exe 1792 schtasks.exe 4724 schtasks.exe 2344 schtasks.exe 3308 schtasks.exe 2492 schtasks.exe 3528 schtasks.exe 4128 schtasks.exe 2876 schtasks.exe 4448 schtasks.exe 1920 schtasks.exe 416 schtasks.exe 4576 schtasks.exe 5004 schtasks.exe 2900 schtasks.exe 2444 schtasks.exe 3736 schtasks.exe 468 schtasks.exe 4992 schtasks.exe 1736 schtasks.exe 932 schtasks.exe 3632 schtasks.exe 776 schtasks.exe 3032 schtasks.exe 4444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 4476 DllCommonsvc.exe 3604 powershell.exe 3604 powershell.exe 4388 powershell.exe 4388 powershell.exe 2312 powershell.exe 2312 powershell.exe 1804 powershell.exe 1804 powershell.exe 1972 powershell.exe 1972 powershell.exe 1508 powershell.exe 1508 powershell.exe 3088 powershell.exe 3088 powershell.exe 2336 powershell.exe 2336 powershell.exe 228 powershell.exe 228 powershell.exe 4424 powershell.exe 4424 powershell.exe 2852 powershell.exe 2852 powershell.exe 3312 powershell.exe 3312 powershell.exe 4388 powershell.exe 4520 powershell.exe 4520 powershell.exe 3312 powershell.exe 2852 powershell.exe 1804 powershell.exe 3604 powershell.exe 4424 powershell.exe 3088 powershell.exe 2312 powershell.exe 1508 powershell.exe 1972 powershell.exe 2336 powershell.exe 228 powershell.exe 4520 powershell.exe 2608 lsass.exe 2216 lsass.exe 1964 lsass.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4476 DllCommonsvc.exe Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 4388 powershell.exe Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 3312 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 228 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 3088 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeDebugPrivilege 4520 powershell.exe Token: SeDebugPrivilege 2608 lsass.exe Token: SeDebugPrivilege 2216 lsass.exe Token: SeDebugPrivilege 1964 lsass.exe Token: SeDebugPrivilege 4236 lsass.exe Token: SeDebugPrivilege 2524 lsass.exe Token: SeDebugPrivilege 116 lsass.exe Token: SeDebugPrivilege 4724 lsass.exe Token: SeDebugPrivilege 436 lsass.exe Token: SeDebugPrivilege 3588 lsass.exe Token: SeDebugPrivilege 3100 lsass.exe Token: SeDebugPrivilege 1248 lsass.exe Token: SeDebugPrivilege 4560 lsass.exe Token: SeDebugPrivilege 4704 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 1156 4488 JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe 82 PID 4488 wrote to memory of 1156 4488 JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe 82 PID 4488 wrote to memory of 1156 4488 JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe 82 PID 1156 wrote to memory of 548 1156 WScript.exe 83 PID 1156 wrote to memory of 548 1156 WScript.exe 83 PID 1156 wrote to memory of 548 1156 WScript.exe 83 PID 548 wrote to memory of 4476 548 cmd.exe 85 PID 548 wrote to memory of 4476 548 cmd.exe 85 PID 4476 wrote to memory of 4520 4476 DllCommonsvc.exe 123 PID 4476 wrote to memory of 4520 4476 DllCommonsvc.exe 123 PID 4476 wrote to memory of 3088 4476 DllCommonsvc.exe 124 PID 4476 wrote to memory of 3088 4476 DllCommonsvc.exe 124 PID 4476 wrote to memory of 2336 4476 DllCommonsvc.exe 125 PID 4476 wrote to memory of 2336 4476 DllCommonsvc.exe 125 PID 4476 wrote to memory of 228 4476 DllCommonsvc.exe 126 PID 4476 wrote to memory of 228 4476 DllCommonsvc.exe 126 PID 4476 wrote to memory of 2312 4476 DllCommonsvc.exe 127 PID 4476 wrote to memory of 2312 4476 DllCommonsvc.exe 127 PID 4476 wrote to memory of 3604 4476 DllCommonsvc.exe 128 PID 4476 wrote to memory of 3604 4476 DllCommonsvc.exe 128 PID 4476 wrote to memory of 1804 4476 DllCommonsvc.exe 129 PID 4476 wrote to memory of 1804 4476 DllCommonsvc.exe 129 PID 4476 wrote to memory of 4388 4476 DllCommonsvc.exe 130 PID 4476 wrote to memory of 4388 4476 DllCommonsvc.exe 130 PID 4476 wrote to memory of 2852 4476 DllCommonsvc.exe 131 PID 4476 wrote to memory of 2852 4476 DllCommonsvc.exe 131 PID 4476 wrote to memory of 3312 4476 DllCommonsvc.exe 132 PID 4476 wrote to memory of 3312 4476 DllCommonsvc.exe 132 PID 4476 wrote to memory of 1508 4476 DllCommonsvc.exe 133 PID 4476 wrote to memory of 1508 4476 DllCommonsvc.exe 133 PID 4476 wrote to memory of 4424 4476 DllCommonsvc.exe 134 PID 4476 wrote to memory of 4424 4476 DllCommonsvc.exe 134 PID 4476 wrote to memory of 1972 4476 DllCommonsvc.exe 136 PID 4476 wrote to memory of 1972 4476 DllCommonsvc.exe 136 PID 4476 wrote to memory of 4884 4476 DllCommonsvc.exe 148 PID 4476 wrote to memory of 4884 4476 DllCommonsvc.exe 148 PID 4884 wrote to memory of 1548 4884 cmd.exe 151 PID 4884 wrote to memory of 1548 4884 cmd.exe 151 PID 4884 wrote to memory of 2608 4884 cmd.exe 152 PID 4884 wrote to memory of 2608 4884 cmd.exe 152 PID 2608 wrote to memory of 1084 2608 lsass.exe 153 PID 2608 wrote to memory of 1084 2608 lsass.exe 153 PID 1084 wrote to memory of 1388 1084 cmd.exe 155 PID 1084 wrote to memory of 1388 1084 cmd.exe 155 PID 1084 wrote to memory of 2216 1084 cmd.exe 156 PID 1084 wrote to memory of 2216 1084 cmd.exe 156 PID 2216 wrote to memory of 4392 2216 lsass.exe 157 PID 2216 wrote to memory of 4392 2216 lsass.exe 157 PID 4392 wrote to memory of 1008 4392 cmd.exe 159 PID 4392 wrote to memory of 1008 4392 cmd.exe 159 PID 4392 wrote to memory of 1964 4392 cmd.exe 164 PID 4392 wrote to memory of 1964 4392 cmd.exe 164 PID 1964 wrote to memory of 3332 1964 lsass.exe 165 PID 1964 wrote to memory of 3332 1964 lsass.exe 165 PID 3332 wrote to memory of 4408 3332 cmd.exe 167 PID 3332 wrote to memory of 4408 3332 cmd.exe 167 PID 3332 wrote to memory of 4236 3332 cmd.exe 171 PID 3332 wrote to memory of 4236 3332 cmd.exe 171 PID 4236 wrote to memory of 1748 4236 lsass.exe 172 PID 4236 wrote to memory of 1748 4236 lsass.exe 172 PID 1748 wrote to memory of 5092 1748 cmd.exe 174 PID 1748 wrote to memory of 5092 1748 cmd.exe 174 PID 1748 wrote to memory of 2524 1748 cmd.exe 175 PID 1748 wrote to memory of 2524 1748 cmd.exe 175 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b997ff638e5c1ec852c97ca0d8beabd5fc0ef34dd362bf8dce44e4c17bf6416.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PrintDialog\pris\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Recent\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Ease of Access Themes\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SysWOW64\LogFiles\Windows Portable Devices\SppExtComObj.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wQrMVdDOSb.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1548
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5pDZQI1oOH.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1388
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yvlYFj4oEg.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1008
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DegeIw2hse.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:4408
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\m47JVZSxDi.bat"13⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:5092
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\n7UEJyIAjk.bat"15⤵PID:3112
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:3832
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WRY5ahHPmz.bat"17⤵PID:1680
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2432
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hD3D8PLBZ9.bat"19⤵PID:2668
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:2648
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:436 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iOYCRAfa0D.bat"21⤵PID:1472
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:4668
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Jk1vLt9ke4.bat"23⤵PID:1164
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:4408
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iIDKKqsGny.bat"25⤵PID:3488
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:5068
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1248 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kKaF7FiTK0.bat"27⤵PID:4148
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:872
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FjqlTNZm6T.bat"29⤵PID:4812
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:230⤵PID:1252
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Windows\PrintDialog\pris\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\PrintDialog\pris\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Windows\PrintDialog\pris\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Recent\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Default\Recent\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Recent\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Windows\Resources\Ease of Access Themes\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Resources\Ease of Access Themes\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Windows\Resources\Ease of Access Themes\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Windows\SysWOW64\LogFiles\Windows Portable Devices\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\SysWOW64\LogFiles\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Windows\SysWOW64\LogFiles\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
230B
MD51ecf445af3a2997520475b354190b80c
SHA130bfa3c1d7d546413f49ad4471a9c756b2c78eaa
SHA256c4d0855350fcb0312e79d97732094a6f84a2d717572a52890798c565c8c01bca
SHA512a4384a84b69cb998372d13f0f71da6d508584b20855f4a7de59da028bbb10aabe48e91d608915537c3e7a6110847976dccb5ab00011d0d351b44bed1e4c103e7
-
Filesize
230B
MD53d71ccf5cdf68df6361d9c54a9b3ed17
SHA17bef7e04fd427e1f20de13c6e37b2d6b61fc878a
SHA2563e706a9300db1dcc6af8a43d4836d99d3a0fa37af9254cbb96c30bd9b0ddd73b
SHA512c193a4f87df9aded5340a0aa1e2ea5685bfeb17b45489c214b16cc1b7feb7169a796fd692faf59e0cd1616cafd2e27e6b55d7c1af099dc44973068de518a75eb
-
Filesize
230B
MD5059faadda2ac94b7d945d3bf503d5b4e
SHA1cd582905cbec649584a4ea5633c3b023ab3720a4
SHA25614e89820199da558a5996b358060b6c92abe6ee39004432aec25fd8303aa7760
SHA51246821dc56d5e20bb82d51086996e0a88b8791fe28e0df24a06aeaf5b78f0ae5770736e0e388071c896bfae67a9851f448dc7763d2b4f72c3f46462e3c82d76f1
-
Filesize
230B
MD57b244030ffbab244cb8f572c68857fd8
SHA1b495b7edc6d3ea476fbdafebe88904878b0256b0
SHA256b3d726d9651a940cbd6f2ebaf527dc42e7089e38b955a11fe5eccea6b1bd9d03
SHA512820ec31bfca9ffc4e833cd0ab1a812816d10176b2788f55dd3b04f271b35fb2c8559e7ee5a6b31efb07f8dc34210b94af4da84a03a38df55640227c696934601
-
Filesize
230B
MD582d1404d91a3203d894928d811b730e0
SHA1dee172d14f0883a592eaa26893ee3a56d9f95331
SHA256a5b201b6f791893940e3144ab01a255cf3234de5bebe6666959f9084b09a15f1
SHA51262a44d17139d5a57816dd45e0255b435f463c4128bdcd5cb1823d933f9427cb39a0a9d646b679edc26d0afc0f5d41f25d9fad1deedb88cda4486149a1fb070e7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
230B
MD541900b862afc553b8d7ec33446e814fe
SHA1949ceb58b044a0db8fed2b78d4734a8594f312c1
SHA2563c63c717733b9fe8280d95ecf01f56bf018ae69862677008e0c9d576911094e4
SHA51265fe276ba0fb86292a273001be59fc0a027c1b6eacc08c0b13b2d17065042e1707544288147cd4ee9b1115186ad08c1789ee34eb1d2dc5da8866d576bf2991ed
-
Filesize
230B
MD5e409a4ff82f371f89cefa15f2adb16a4
SHA171a3ccc113acfa309f51afa69b4218df58814abb
SHA256d0522f44b0b67bc1b3090d190a989a4308ab09708bb9a961a099338b19182462
SHA5129d0db9c737afb4180ae81e45114f18c13401b63f2c32ddf8976c925861231af7b6a47ece4ab4747517aecc4f47903940bbc2909de806ed4a778244e734e03812
-
Filesize
230B
MD578ea47d171d762d50e37f1100141198a
SHA1303cd7e885e650facfcc7d55ccd43a1ecabbadd5
SHA2569eb2d0bfea05fd83a85f960f45589f50cd92e5d242c467c4ae6fb87714889d97
SHA51252dfe474a073eddabfc0adf1034473f8a8a06aefe6bceb9e1db018d9e443759fa28a3ea63b4e262b44b18f584781996f998494743e082ee5bba15ec83ac76d5e
-
Filesize
230B
MD599a44c64247d9eb13ade0e1e14d3a804
SHA151b81be3c7c9985bd2c1a0e5011f8e85a82217b3
SHA25660c58f3c11777ffe5498895f2ce21ce9025dc287c411f2ea0581015339b6a55e
SHA5122a1e9b136e29f7404880454f1d26bf0c00c226ce74f4d8fd26077227a24820b5a2ef6ad5f77ed93a88c685c9d6311122f13bb1ad03348b10c5ac834d2065e79a
-
Filesize
230B
MD55d0176dc8b0d853bb29a65ea909bb28a
SHA15e7ff57421f94521ee4e18b8a252d08083dd8d58
SHA2560753fbeedc263ef0d3b52cb4aa17617ea70549817c1b171e6fd8621fe1dd87a0
SHA512ea4cc350dc684c1f24faa63fe03ac8a76c88f62f6f67cfc1fe8295ee04b30a627c21ffca85acf19640c859d908fde12ff731657a05c610ef4ed47b71d92b670f
-
Filesize
230B
MD5538d1ac554f707f85b96a9c8ce7605c0
SHA1e95f5744ddd247325ddb7e5a0016c4e6ec56a471
SHA25641e9a4d2618c1b7cd4f5adda12bd9a3055fea356b0c3e5ac059411cf14b87602
SHA512f6729a61d6a808b512da7bb2728106b8cd46415f01c1b6e22b318311552d1568c61de0686d219ddd0012ab17cea85609e87aeb85e1e6621abd344707163b090b
-
Filesize
230B
MD5a9aedb96ec8ea6caa7c6e71eba15bbe0
SHA1fa7ff88b39718173a83230608fd1170ecd0e2fae
SHA256f8240105618990f2ab1c57008aad1cf7f7967bc89834c7d02f179762ee3278fb
SHA51279fae1a1f06809e0cab53a4601be11f8c06b4997045f6cfe549fbdef6cedacfa005f3ef012f22b697bbbf6bb498b98c1d43171efd1706123a214f0505116f047
-
Filesize
230B
MD53827fb6e4d3529b779b9d3dc21d0e26e
SHA12025a2533522715ec5abad4e7426d90249b4e74e
SHA2567d2a25fa46a108298918730280d99e55f58aa60bc5b7d10eb91f5b47f04f95c6
SHA5126d1e44da16aa3a3dfd8084f911d9e0e79663acc950f5b20803b150a8d1e485812025a1c41333d983533a3d0fcda403d39a3cd1582155eaba18d43249f3a8ff39
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478