Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 02:14 UTC

General

  • Target

    JaffaCakes118_687296e53387ac2daa6e34eca6d12796e0486c0a19677a161cb5204756a796c0.exe

  • Size

    1.3MB

  • MD5

    bec1ba05ad51733bef0461c649d5593a

  • SHA1

    c7f8ab4a550f5e8f2366aa31a8a50f75559cf117

  • SHA256

    687296e53387ac2daa6e34eca6d12796e0486c0a19677a161cb5204756a796c0

  • SHA512

    ee0358f15714bee40bbcd5163578fab7cf6f565dfadaf44b1d52f0927af29b82ca8ef86f67fe90182708d76aa762907633f136ba4326a2530fb5fa36bee57584

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_687296e53387ac2daa6e34eca6d12796e0486c0a19677a161cb5204756a796c0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_687296e53387ac2daa6e34eca6d12796e0486c0a19677a161cb5204756a796c0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1692
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1668
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\it-IT\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:552
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\ja-JP\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2616
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\My Documents\conhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2068
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\ja-JP\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1712
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:988
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2208
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\images\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1032
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dwm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1676
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\Templates\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1872
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\assembly\conhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1864
          • C:\Users\Default\My Documents\conhost.exe
            "C:\Users\Default\My Documents\conhost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1400
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vFDRBKGR2C.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2132
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:1064
                • C:\Users\Default\My Documents\conhost.exe
                  "C:\Users\Default\My Documents\conhost.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:580
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tcplHXgq9Q.bat"
                    8⤵
                      PID:1628
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        9⤵
                          PID:2060
                        • C:\Users\Default\My Documents\conhost.exe
                          "C:\Users\Default\My Documents\conhost.exe"
                          9⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2352
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UJpHfzfs2i.bat"
                            10⤵
                              PID:2556
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                11⤵
                                  PID:1812
                                • C:\Users\Default\My Documents\conhost.exe
                                  "C:\Users\Default\My Documents\conhost.exe"
                                  11⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2396
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IMpAoVHioU.bat"
                                    12⤵
                                      PID:1956
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        13⤵
                                          PID:668
                                        • C:\Users\Default\My Documents\conhost.exe
                                          "C:\Users\Default\My Documents\conhost.exe"
                                          13⤵
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1080
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Zj0hR7WTEZ.bat"
                                            14⤵
                                              PID:2660
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                15⤵
                                                  PID:1996
                                                • C:\Users\Default\My Documents\conhost.exe
                                                  "C:\Users\Default\My Documents\conhost.exe"
                                                  15⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2540
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cnsnMHUbNI.bat"
                                                    16⤵
                                                      PID:1160
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        17⤵
                                                          PID:2300
                                                        • C:\Users\Default\My Documents\conhost.exe
                                                          "C:\Users\Default\My Documents\conhost.exe"
                                                          17⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1748
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nl4g9d70ax.bat"
                                                            18⤵
                                                              PID:1332
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                19⤵
                                                                  PID:2396
                                                                • C:\Users\Default\My Documents\conhost.exe
                                                                  "C:\Users\Default\My Documents\conhost.exe"
                                                                  19⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2228
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\grdey4A1QM.bat"
                                                                    20⤵
                                                                      PID:2596
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        21⤵
                                                                          PID:1472
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\providercommon\wininit.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2744
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2700
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2764
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Sidebar\it-IT\Idle.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2740
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\it-IT\Idle.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2332
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\it-IT\Idle.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1036
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\smss.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2192
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\smss.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:580
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\smss.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2060
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Users\Default\My Documents\conhost.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2340
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Default\My Documents\conhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:772
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Users\Default\My Documents\conhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2980
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\csrss.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1108
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\csrss.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1012
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\csrss.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2960
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\providercommon\dllhost.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2588
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2964
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1868
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2268
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1472
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1740
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\Idle.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:300
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\Idle.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1768
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\Idle.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1388
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\images\lsm.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2672
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\images\lsm.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2220
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\images\lsm.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2156
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\providercommon\dwm.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2028
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2408
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2132
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\PLA\Templates\dllhost.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1932
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\dllhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2076
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Windows\PLA\Templates\dllhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1684
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Windows\assembly\conhost.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2016
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\assembly\conhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:876
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Windows\assembly\conhost.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2172

                                Network

                                • flag-us
                                  DNS
                                  raw.githubusercontent.com
                                  conhost.exe
                                  Remote address:
                                  8.8.8.8:53
                                  Request
                                  raw.githubusercontent.com
                                  IN A
                                  Response
                                  raw.githubusercontent.com
                                  IN A
                                  185.199.108.133
                                  raw.githubusercontent.com
                                  IN A
                                  185.199.111.133
                                  raw.githubusercontent.com
                                  IN A
                                  185.199.110.133
                                  raw.githubusercontent.com
                                  IN A
                                  185.199.109.133
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  793 B
                                  4.2kB
                                  10
                                  11
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  994 B
                                  4.2kB
                                  11
                                  11
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  747 B
                                  4.2kB
                                  9
                                  11
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  793 B
                                  4.2kB
                                  10
                                  11
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  737 B
                                  4.1kB
                                  9
                                  10
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  741 B
                                  4.1kB
                                  9
                                  10
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  939 B
                                  4.3kB
                                  13
                                  12
                                • 185.199.108.133:443
                                  raw.githubusercontent.com
                                  tls
                                  conhost.exe
                                  1.8kB
                                  5.7kB
                                  14
                                  9
                                • 8.8.8.8:53
                                  raw.githubusercontent.com
                                  dns
                                  conhost.exe
                                  71 B
                                  135 B
                                  1
                                  1

                                  DNS Request

                                  raw.githubusercontent.com

                                  DNS Response

                                  185.199.108.133
                                  185.199.111.133
                                  185.199.110.133
                                  185.199.109.133

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  9496ca9ebcec08d381fd9caffff3de76

                                  SHA1

                                  b1dfce14432df9ff56af2db05515354b1e215267

                                  SHA256

                                  95592a55010b56993a2d422eaad989042b2c59521b182afbb695b3960df814f8

                                  SHA512

                                  90c137e64985727eee47a98f3cc11e75c9cbf7026dd37a509c801990eb2d1e78ea889f7a332be09ae2afece313b87017c6a9c515f006fab4acd3c0ab91503714

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  70d6e2c0f7d94eab72f794c05a63e401

                                  SHA1

                                  0747722de6fa88189d466b918e637cb2042e31e7

                                  SHA256

                                  e1ff863ece39435efec473457782c47652a6bb0d607b060b9f72b8c25b9068eb

                                  SHA512

                                  97f1c07af5cd1847386207635f685d5b4c425b049e2bdd8ef6302831f7caab40bb9dd644bf51d73962b49490ed7b3b8c803e91e7861e2ae631649de61cd14ed0

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  48ccf610c468964e5ffd2518bfd5b3c8

                                  SHA1

                                  e4d2c55a25f777be06e7c9bd414456ebaeab81cd

                                  SHA256

                                  0cc4c68123c5bd13ef0f7ae2f8c2ff2db087370a56ffef9204f53b7dd84bafd0

                                  SHA512

                                  bcf79d4246e7e3e2405b1789358dd297d8405643346a41a391900b31e2c818c42145574222ab5c72ad22e3b21c0b55f4f4e228b95c945b4fff2b109f34af528d

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  b5b42ff13a4ef9d1b2232307561095cd

                                  SHA1

                                  cc60da2598268a1ae7d83bec49452cd19452b42b

                                  SHA256

                                  25b1d203b3de55268953f3fce5225daecc44e5e110e92f8cf08f3cd655584b7b

                                  SHA512

                                  e9025ded8c2e7637c2287e5bb0dfcf003f067beea54ae83f88dbef723fd6899f9361ca24736f5fdc939aa978b3d92147b062f3f5a7095cb3abd2bfeee5b48600

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  5fa4419f2ec9c18be294bc3e2c95de41

                                  SHA1

                                  667a2746663bed5041ffd521e6f143c5c87485d4

                                  SHA256

                                  cf78ac948731bf552277a970844d3ab3f1d551f6100274d83d79c9461f66eef0

                                  SHA512

                                  a1e09712a078e4c631432881d81d2b4c564e0aec2116a19c8eaef84493fcba72aebe0a47acda62704b171b3fede435a6715f74a6a195345ef8fdfd1b5b59b541

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  98c0f123134ca7571f3116d76d8d661d

                                  SHA1

                                  d6912ef862629b3db7994240edc04cf605851764

                                  SHA256

                                  98257f2bdc19bb71addb99242293074d74ab69b7d5228c11cb05394b84f14b08

                                  SHA512

                                  48777ef379f7e6ce7fa6b28b085c45a61fb544be1e075a63c80ff714f712c4465ada060f0bdc6f9561f6313279b7dd46c7bfbaf8d4aa44f3ca001d6c24077afb

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  778abbb98deb6b698e516238f0f5ca22

                                  SHA1

                                  b727f177b640c1272dda99eee59c86f273ff2179

                                  SHA256

                                  712ec1365b4b1bac9eee2a8940d29b32d7f7ce4aada197d0d112cad39a3c3d7d

                                  SHA512

                                  94c40e4a7e52776ba24e06b0463fdc5fb24edb0db1f02de1bd1f4fa43be8c4688cc5404d50cc1e580857cc07bd6980cc205c309587dad036541af8fd2a73a68c

                                • C:\Users\Admin\AppData\Local\Temp\CabDD18.tmp

                                  Filesize

                                  70KB

                                  MD5

                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                  SHA1

                                  1723be06719828dda65ad804298d0431f6aff976

                                  SHA256

                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                  SHA512

                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                • C:\Users\Admin\AppData\Local\Temp\IMpAoVHioU.bat

                                  Filesize

                                  206B

                                  MD5

                                  7ebaddab7d44c2947b32b42368b3de6c

                                  SHA1

                                  ea7e9e0620b6941077345cd388efbbe9a57a14d2

                                  SHA256

                                  3639ae0a34036a4a637e80d6f6a5830fd6ea31c0a5cb24be0bf295f7fdef9433

                                  SHA512

                                  6759b34e732ceb45c0a3e0ee885ef917b046df679989e4e96c53e53a5fa7da53ba3a7b26e1305e9848684efb1b1597408196a0660aa171aff7d25a5ba1a46c1d

                                • C:\Users\Admin\AppData\Local\Temp\TarDD1B.tmp

                                  Filesize

                                  181KB

                                  MD5

                                  4ea6026cf93ec6338144661bf1202cd1

                                  SHA1

                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                  SHA256

                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                  SHA512

                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                • C:\Users\Admin\AppData\Local\Temp\UJpHfzfs2i.bat

                                  Filesize

                                  206B

                                  MD5

                                  78211fe62c66461767ab75e2ed5f81d8

                                  SHA1

                                  ae9a220ae5344e138ced25cc8fd6155cce2dff70

                                  SHA256

                                  1222edad6fedc10b3cc8e2cc73c50adeb46d0a13f9e3f5ea4a7d52d11a91837d

                                  SHA512

                                  c4ed265720cbb50e881caa0897c27d4e0916f62e5ef06261635ac90468beaec069657ee336385efea839397f39ab1edbd307c5ae0b7c95c5842cc5f9fe6e45d0

                                • C:\Users\Admin\AppData\Local\Temp\Zj0hR7WTEZ.bat

                                  Filesize

                                  206B

                                  MD5

                                  e95505b8297f74d20d4addb768afd75d

                                  SHA1

                                  f14eb199b51730eb8eae5549e2e896a668faedbd

                                  SHA256

                                  f443be2a971ac9b9161660cc1d7ef56c8f7cc9bedf200cc93364b559b5c3dc44

                                  SHA512

                                  717cad0a4ba91c9a558479a6de52f7cf9049b3358487c607bbbcde506ca99de94441e04f37671317298f8d54dcd390a51e2180683f120c904009d4916dd8bb4f

                                • C:\Users\Admin\AppData\Local\Temp\cnsnMHUbNI.bat

                                  Filesize

                                  206B

                                  MD5

                                  e421d29774c389f278f48f2c11269dc2

                                  SHA1

                                  a222dec5a541ba2457c5e3808165496a4f3b6cb1

                                  SHA256

                                  1510de7b88faf3eac0b942c82d18fd66b94bb49456ca14480cf3032a39283406

                                  SHA512

                                  62303b9d398a4b74149a190fa3060712181c2da6829040421fca304bc07cb4de3f58cfc40cac87115f03ef22fccd6edc031883bd55e827f277690d066aa55653

                                • C:\Users\Admin\AppData\Local\Temp\grdey4A1QM.bat

                                  Filesize

                                  206B

                                  MD5

                                  7365e11eef3a24e038c83f9f7b84ba1a

                                  SHA1

                                  2615a407189712c53a1910eb7641b54f00dc3fc6

                                  SHA256

                                  0170fd9792ee39bfaf4689a8a8cd70480f1c2c7e3a2bde30fa8d866ce5250504

                                  SHA512

                                  178055594434a287ad634799b032050588034d983d2ff3441e0e5f606b7aa23d6142030d0349ab39fda3588d2f0fa6c7911e76f28b829c9aa1893e84ed009948

                                • C:\Users\Admin\AppData\Local\Temp\nl4g9d70ax.bat

                                  Filesize

                                  206B

                                  MD5

                                  68b2b3ba24d76c1327e7745da936cabf

                                  SHA1

                                  cf2f93567b3df6f7a55ce982b74a276a81462587

                                  SHA256

                                  c1bb3ff60ba4604a9ce3e84b5be4549993e8177ae53941c264472e8e38a6afb1

                                  SHA512

                                  f76fffd519425b75c3844da1ae2ef35b572d6a7a88cac748c7e687d0cc615f17ad52e8b0317f23c307769d033821e5c405d3be4cedf342b0c5694f51ea22fe26

                                • C:\Users\Admin\AppData\Local\Temp\tcplHXgq9Q.bat

                                  Filesize

                                  206B

                                  MD5

                                  db1d48c49946d28b7afaf02ec7aab63a

                                  SHA1

                                  e2680361168a8f209208da6d9d41c3d178a640bc

                                  SHA256

                                  5e9e50c68b7bda8297c2730be7c2b2e4a2c7e5c74349df3495dc3f0c3efa406d

                                  SHA512

                                  6156d2ced773b94f100e50d5f90b0360a7308ddf3e6c103af571c648abe9df437dcf0dbd318f4aec56fa77fea191ef1693949cb56efb578ea582d6128d4866a4

                                • C:\Users\Admin\AppData\Local\Temp\vFDRBKGR2C.bat

                                  Filesize

                                  206B

                                  MD5

                                  714d778ab488b25d5a2de7fea36f5a54

                                  SHA1

                                  94e867f4ae8294a39aab7049efef98e3a11ea3af

                                  SHA256

                                  e01ffe8037597355634977f539a7b265b4124b1b4b04b5623bd74b6fd847f0e8

                                  SHA512

                                  bfcff50005e97b816b147ac5596d6d87d4cb1805ed399f8ac7a362c3088f2a8c33bd571837ff369241786741c842f2cc3bb8eff66c28c41818257f52e324b8d5

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                  Filesize

                                  7KB

                                  MD5

                                  6959a64154e03156fd17e5a0e3d42d86

                                  SHA1

                                  a3659c633ececc666508201b73ef0d6bb2071945

                                  SHA256

                                  c83da7b9ff5f79f16e57c8595cce11d9192518da15be8f68f6b778e7dbda85d7

                                  SHA512

                                  c227c877b2730573d298a511eaa212e66a07e9ef109df2761b00f6e58f58e92f8ff43a63404557c4f10c3ec11ed43f099485059b711c621f7caa0ca3e7a6c4c4

                                • C:\providercommon\1zu9dW.bat

                                  Filesize

                                  36B

                                  MD5

                                  6783c3ee07c7d151ceac57f1f9c8bed7

                                  SHA1

                                  17468f98f95bf504cc1f83c49e49a78526b3ea03

                                  SHA256

                                  8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                  SHA512

                                  c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                  Filesize

                                  197B

                                  MD5

                                  8088241160261560a02c84025d107592

                                  SHA1

                                  083121f7027557570994c9fc211df61730455bb5

                                  SHA256

                                  2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                  SHA512

                                  20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                • \providercommon\DllCommonsvc.exe

                                  Filesize

                                  1.0MB

                                  MD5

                                  bd31e94b4143c4ce49c17d3af46bcad0

                                  SHA1

                                  f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                  SHA256

                                  b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                  SHA512

                                  f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                • memory/580-174-0x0000000000140000-0x0000000000152000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/580-173-0x0000000001360000-0x0000000001470000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/1032-62-0x0000000001CE0000-0x0000000001CE8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1032-60-0x000000001B680000-0x000000001B962000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/1080-353-0x0000000000A30000-0x0000000000B40000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/1400-61-0x0000000000FE0000-0x00000000010F0000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/1748-473-0x0000000001380000-0x0000000001490000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/2228-533-0x0000000000350000-0x0000000000362000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2396-293-0x0000000000300000-0x0000000000410000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/2540-413-0x0000000000F30000-0x0000000001040000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/2880-16-0x0000000000160000-0x000000000016C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/2880-15-0x0000000000370000-0x000000000037C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/2880-14-0x0000000000150000-0x0000000000162000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2880-13-0x0000000000D00000-0x0000000000E10000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/2880-17-0x0000000000380000-0x000000000038C000-memory.dmp

                                  Filesize

                                  48KB

                                We care about your privacy.

                                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.