Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 02:23
Behavioral task
behavioral1
Sample
JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe
-
Size
1.3MB
-
MD5
a365a5d8e777f34e2ee6906f5517eb27
-
SHA1
0e07a3921813dc7ff17e65ca96520b9c53cb6e50
-
SHA256
ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f
-
SHA512
7e422964fa713ec47b3fbae34d5bde5dd007ba5b6681ab1911a91b622148dd7a406f9a7349719221144ee118269cfdb8b3c7dc44bf94a491d7ae3e5cb2d85130
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1308 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 608 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1764 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 848 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 272 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1772 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 784 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2576 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 2576 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000016c7c-11.dat dcrat behavioral1/memory/2808-13-0x0000000000D70000-0x0000000000E80000-memory.dmp dcrat behavioral1/memory/2732-84-0x00000000000F0000-0x0000000000200000-memory.dmp dcrat behavioral1/memory/2416-189-0x0000000000130000-0x0000000000240000-memory.dmp dcrat behavioral1/memory/1468-249-0x0000000000FB0000-0x00000000010C0000-memory.dmp dcrat behavioral1/memory/1568-368-0x0000000000FD0000-0x00000000010E0000-memory.dmp dcrat behavioral1/memory/1624-546-0x00000000010E0000-0x00000000011F0000-memory.dmp dcrat behavioral1/memory/3060-607-0x0000000000330000-0x0000000000440000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1616 powershell.exe 2480 powershell.exe 1988 powershell.exe 896 powershell.exe 1472 powershell.exe 2976 powershell.exe 1056 powershell.exe 3028 powershell.exe 1776 powershell.exe 1492 powershell.exe 908 powershell.exe 1704 powershell.exe 2256 powershell.exe 1572 powershell.exe 2180 powershell.exe 3000 powershell.exe -
Executes dropped EXE 10 IoCs
pid Process 2808 DllCommonsvc.exe 2732 WmiPrvSE.exe 2416 WmiPrvSE.exe 1468 WmiPrvSE.exe 1992 WmiPrvSE.exe 1568 WmiPrvSE.exe 1848 WmiPrvSE.exe 1244 WmiPrvSE.exe 1624 WmiPrvSE.exe 3060 WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 1172 cmd.exe 1172 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 9 raw.githubusercontent.com 13 raw.githubusercontent.com 20 raw.githubusercontent.com 24 raw.githubusercontent.com 27 raw.githubusercontent.com 31 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 16 raw.githubusercontent.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\fr-FR\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\fr-FR\explorer.exe DllCommonsvc.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\debug\WIA\wininit.exe DllCommonsvc.exe File created C:\Windows\debug\WIA\56085415360792 DllCommonsvc.exe File created C:\Windows\Registration\wininit.exe DllCommonsvc.exe File created C:\Windows\Registration\56085415360792 DllCommonsvc.exe File created C:\Windows\Prefetch\ReadyBoot\explorer.exe DllCommonsvc.exe File opened for modification C:\Windows\Prefetch\ReadyBoot\explorer.exe DllCommonsvc.exe File created C:\Windows\Prefetch\ReadyBoot\7a0fd90576e088 DllCommonsvc.exe File created C:\Windows\rescache\rc0005\taskhost.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1308 schtasks.exe 2428 schtasks.exe 2240 schtasks.exe 1772 schtasks.exe 3060 schtasks.exe 3064 schtasks.exe 2784 schtasks.exe 1068 schtasks.exe 1628 schtasks.exe 2064 schtasks.exe 1824 schtasks.exe 3012 schtasks.exe 1584 schtasks.exe 608 schtasks.exe 2488 schtasks.exe 1696 schtasks.exe 2328 schtasks.exe 1764 schtasks.exe 2316 schtasks.exe 1952 schtasks.exe 2800 schtasks.exe 2764 schtasks.exe 1788 schtasks.exe 2924 schtasks.exe 784 schtasks.exe 1012 schtasks.exe 2036 schtasks.exe 2156 schtasks.exe 3016 schtasks.exe 2068 schtasks.exe 392 schtasks.exe 3048 schtasks.exe 2236 schtasks.exe 848 schtasks.exe 2452 schtasks.exe 2040 schtasks.exe 2944 schtasks.exe 560 schtasks.exe 272 schtasks.exe 2008 schtasks.exe 572 schtasks.exe 3032 schtasks.exe 2984 schtasks.exe 1848 schtasks.exe 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2808 DllCommonsvc.exe 2808 DllCommonsvc.exe 2808 DllCommonsvc.exe 2808 DllCommonsvc.exe 2808 DllCommonsvc.exe 1776 powershell.exe 1492 powershell.exe 3000 powershell.exe 908 powershell.exe 1704 powershell.exe 1056 powershell.exe 1616 powershell.exe 2180 powershell.exe 1472 powershell.exe 896 powershell.exe 2480 powershell.exe 2256 powershell.exe 3028 powershell.exe 1988 powershell.exe 1572 powershell.exe 2732 WmiPrvSE.exe 2416 WmiPrvSE.exe 1468 WmiPrvSE.exe 1992 WmiPrvSE.exe 1568 WmiPrvSE.exe 1848 WmiPrvSE.exe 1244 WmiPrvSE.exe 1624 WmiPrvSE.exe 3060 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2808 DllCommonsvc.exe Token: SeDebugPrivilege 1776 powershell.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeDebugPrivilege 3000 powershell.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 1056 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 896 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe Token: SeDebugPrivilege 2732 WmiPrvSE.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 2416 WmiPrvSE.exe Token: SeDebugPrivilege 1468 WmiPrvSE.exe Token: SeDebugPrivilege 1992 WmiPrvSE.exe Token: SeDebugPrivilege 1568 WmiPrvSE.exe Token: SeDebugPrivilege 1848 WmiPrvSE.exe Token: SeDebugPrivilege 1244 WmiPrvSE.exe Token: SeDebugPrivilege 1624 WmiPrvSE.exe Token: SeDebugPrivilege 3060 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2844 1620 JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe 30 PID 1620 wrote to memory of 2844 1620 JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe 30 PID 1620 wrote to memory of 2844 1620 JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe 30 PID 1620 wrote to memory of 2844 1620 JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe 30 PID 2844 wrote to memory of 1172 2844 WScript.exe 31 PID 2844 wrote to memory of 1172 2844 WScript.exe 31 PID 2844 wrote to memory of 1172 2844 WScript.exe 31 PID 2844 wrote to memory of 1172 2844 WScript.exe 31 PID 1172 wrote to memory of 2808 1172 cmd.exe 33 PID 1172 wrote to memory of 2808 1172 cmd.exe 33 PID 1172 wrote to memory of 2808 1172 cmd.exe 33 PID 1172 wrote to memory of 2808 1172 cmd.exe 33 PID 2808 wrote to memory of 1472 2808 DllCommonsvc.exe 80 PID 2808 wrote to memory of 1472 2808 DllCommonsvc.exe 80 PID 2808 wrote to memory of 1472 2808 DllCommonsvc.exe 80 PID 2808 wrote to memory of 3028 2808 DllCommonsvc.exe 81 PID 2808 wrote to memory of 3028 2808 DllCommonsvc.exe 81 PID 2808 wrote to memory of 3028 2808 DllCommonsvc.exe 81 PID 2808 wrote to memory of 908 2808 DllCommonsvc.exe 82 PID 2808 wrote to memory of 908 2808 DllCommonsvc.exe 82 PID 2808 wrote to memory of 908 2808 DllCommonsvc.exe 82 PID 2808 wrote to memory of 1776 2808 DllCommonsvc.exe 83 PID 2808 wrote to memory of 1776 2808 DllCommonsvc.exe 83 PID 2808 wrote to memory of 1776 2808 DllCommonsvc.exe 83 PID 2808 wrote to memory of 896 2808 DllCommonsvc.exe 84 PID 2808 wrote to memory of 896 2808 DllCommonsvc.exe 84 PID 2808 wrote to memory of 896 2808 DllCommonsvc.exe 84 PID 2808 wrote to memory of 1492 2808 DllCommonsvc.exe 85 PID 2808 wrote to memory of 1492 2808 DllCommonsvc.exe 85 PID 2808 wrote to memory of 1492 2808 DllCommonsvc.exe 85 PID 2808 wrote to memory of 1988 2808 DllCommonsvc.exe 86 PID 2808 wrote to memory of 1988 2808 DllCommonsvc.exe 86 PID 2808 wrote to memory of 1988 2808 DllCommonsvc.exe 86 PID 2808 wrote to memory of 1056 2808 DllCommonsvc.exe 87 PID 2808 wrote to memory of 1056 2808 DllCommonsvc.exe 87 PID 2808 wrote to memory of 1056 2808 DllCommonsvc.exe 87 PID 2808 wrote to memory of 2480 2808 DllCommonsvc.exe 88 PID 2808 wrote to memory of 2480 2808 DllCommonsvc.exe 88 PID 2808 wrote to memory of 2480 2808 DllCommonsvc.exe 88 PID 2808 wrote to memory of 3000 2808 DllCommonsvc.exe 89 PID 2808 wrote to memory of 3000 2808 DllCommonsvc.exe 89 PID 2808 wrote to memory of 3000 2808 DllCommonsvc.exe 89 PID 2808 wrote to memory of 2180 2808 DllCommonsvc.exe 90 PID 2808 wrote to memory of 2180 2808 DllCommonsvc.exe 90 PID 2808 wrote to memory of 2180 2808 DllCommonsvc.exe 90 PID 2808 wrote to memory of 2976 2808 DllCommonsvc.exe 91 PID 2808 wrote to memory of 2976 2808 DllCommonsvc.exe 91 PID 2808 wrote to memory of 2976 2808 DllCommonsvc.exe 91 PID 2808 wrote to memory of 1572 2808 DllCommonsvc.exe 92 PID 2808 wrote to memory of 1572 2808 DllCommonsvc.exe 92 PID 2808 wrote to memory of 1572 2808 DllCommonsvc.exe 92 PID 2808 wrote to memory of 1616 2808 DllCommonsvc.exe 93 PID 2808 wrote to memory of 1616 2808 DllCommonsvc.exe 93 PID 2808 wrote to memory of 1616 2808 DllCommonsvc.exe 93 PID 2808 wrote to memory of 2256 2808 DllCommonsvc.exe 94 PID 2808 wrote to memory of 2256 2808 DllCommonsvc.exe 94 PID 2808 wrote to memory of 2256 2808 DllCommonsvc.exe 94 PID 2808 wrote to memory of 1704 2808 DllCommonsvc.exe 95 PID 2808 wrote to memory of 1704 2808 DllCommonsvc.exe 95 PID 2808 wrote to memory of 1704 2808 DllCommonsvc.exe 95 PID 2808 wrote to memory of 2732 2808 DllCommonsvc.exe 112 PID 2808 wrote to memory of 2732 2808 DllCommonsvc.exe 112 PID 2808 wrote to memory of 2732 2808 DllCommonsvc.exe 112 PID 2732 wrote to memory of 1700 2732 WmiPrvSE.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac1757dcc14ca4d367da62993bcdd0a0474ce8b1976d4e69ce3cc6b00233c08f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Prefetch\ReadyBoot\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\fr-FR\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Temp\Crashpad\attachments\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\debug\WIA\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:2976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Registration\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hYa1c8p3ob.bat"6⤵PID:1700
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:560
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kz4ReWEb5Y.bat"8⤵PID:2412
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2136
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lE88gYdR15.bat"10⤵PID:2892
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2932
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\U1yQEvZAPO.bat"12⤵PID:1496
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1688
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BDITavvsiM.bat"14⤵PID:2800
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2864
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iS8tBRk2Vg.bat"16⤵PID:2792
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:652
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8KwMxVG80h.bat"18⤵PID:2444
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:916
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x8TIUMdSeB.bat"20⤵PID:276
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:3032
-
-
C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Windows\Prefetch\ReadyBoot\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Prefetch\ReadyBoot\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Windows\Prefetch\ReadyBoot\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\fr-FR\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\providercommon\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Default User\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\providercommon\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\Temp\Crashpad\attachments\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\attachments\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\Temp\Crashpad\attachments\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\debug\WIA\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\debug\WIA\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\debug\WIA\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\providercommon\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\Registration\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Registration\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Windows\Registration\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\providercommon\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992f46b9bb05ae188f0ba30490cba0e1
SHA1f51a4aa2da3f34d6c696649e89d841e1c1f15db8
SHA2568b6691f7c7f8acc4526fa767d51dc8cc8299cb840d0379ba266204e254baed29
SHA512f0986592974804190b26c2a80b599a14a3edcf01fb06581493bf6588e20973db61ed769e20c77694abf3932b15fdd20d6944cbddb9ad0d74ab0a441ae8f54ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd4df49093f5bdc1a0620740f7976a31
SHA14c17636b9e53e963beab01975591e2d3233bbbf1
SHA256664bb9f250641e0de25dff516a2232eccbb74211d2839b2b173f30d72114109f
SHA512f0190ef16e939f0cc79357adb60b71ac860a0787bac418d7f1cd1aff747361c3ac4f4a1ded23e6f7a73d15c20008397e74d909222c38b5482ef5920c5824cb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52239e86fd195f8ac9bc99ab018e5db72
SHA1e3e0a77c3006c694e75ae261e2951834d9a0bc66
SHA25607265d1fea582acdd9f25c2ac17b94bef13fae1df078a09582cdac7313ab2ee1
SHA512e3e319c2d525be1eb4f3bae8fa053a40458f0350f7bc42c303c4a7cefb7e9fa30997f233f95c936b0a681841d431ed3484469d8b1d3df5fda2205ec1f6e389bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5ffec09e7beb62bd13925fa88fd475
SHA188fa5e59529d91ad2a098a1652b5cff5c7c65eca
SHA25638ea21f2284e279daee4c221062edb6072622392ffdd7ff08a63c4875aa76f3c
SHA5126f9033a97404a252a32086373c254a69bcabba58f55bae8e5dfbea7bb702d259ab9db84cb6b470649aa41307c56e32504d7416150d86a2402fc259314cf42049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1c47e9c01d16d75b184ac3a79bb9a9
SHA115adfa760de8a9988b03f4b67ec8fa8ed89441f1
SHA2563d53d625d824ef2b0b05ce0aa8d97db1d43b3f76994c8ceeae39b9c289491f82
SHA5120d207121478f3146db3a52817a99733f2e865fe3ae35f14192b7a7ef64f0422f95929f40910b5b4ce70c4b536160e9519a362b25040632c34e8dd2228a683c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1cca1c35deeccad7b5855f893a93ac
SHA1feb1be4f58b386c21232675e06042af64596590a
SHA25610f7b28cdec653d8bed31e29e541ced58b0036e927158f293b9881f6a972a750
SHA512c4ed01282c4e507fcdc114640772ce4c7f4f55f2c664e35d0d4f90576133859d3a96f0599929acc9b409c251ffa1620f626a769d5df8b53a6c884daebf5c8250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d831a6edce7633ae72dbb04e79d739d3
SHA1be6e96ccd3ce57ac0afa061a38ab92da7c0c0361
SHA25680317da390e7db4dd26a7112944b57ba2b6ce197646e82393306d612d6f258ff
SHA5122173e2bbeda0cfea89052c9d4b15dd232ccf9c3835395acb6a213912ddc10c0bbffbcc6aa537debf73c136b20b063fc95f53a85eecb1abcb31461d294cf50de9
-
Filesize
226B
MD5705b9bc645e2bb9a74720e8830b73b17
SHA1e76f36c672be351f87c8cf7ac14ec4db76db7715
SHA2561aa067a0ed82194253de1c0a0bcf556894791e5327ec158f794663cd244a419b
SHA512cd5b3556852f60e2b7b5618d4d1878dc94611672657984f2bdaccf7515845767866f5750750e7f0df2a2eb4a281c4b158f6a57caade0fb32fbceaffd25727e41
-
Filesize
226B
MD5dfd22b56e45b3e488b50f527b0044a9a
SHA18f2bbd942eac0f3dfeabfbae8faa7c9929d7d7aa
SHA25679bfb6b5b6dcc11c5ff3664be5e74b3ff767861b77044829e3f5e77f463d441c
SHA512d8b74e933f2b3a7eb60f79f71df3edab9df5dcd631e8a232a79eef4b3fd8e25b02266651195c3a59a49d85c80c98aa50cf636f6f84255dc232b73287d130d6c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
226B
MD5c99b5d939dfa0313566b6ce97e172876
SHA1d5732dc32312da993f2329b894c0ea0eef6d6b4e
SHA2564ba6360e8890ee5aa4f3bd2442adbbc4474a55cd063cd001274bbf1a854e059f
SHA51218de48848575b4c0dc173d4f70229bc8343e97ab6d7a82b62d1a2095434df20e19f792ebc8c9e0e8bf50d9020f5957657bcc0de90a4ef5ecdfcb9480eb0be7cc
-
Filesize
226B
MD54e8425add925a102becb46043288e74d
SHA127a6a007285ffd29faa6193ea2ccd6d6bff17ec7
SHA2568bdfe2e28cc74821b2f110f24d93e4c3f60c794cbbf38e192c8c05fc36ab7035
SHA5127773126f9cd3a60c9429a988bef0ec54158890c043ef8662d471ff6320336af486f8e3e306ba8a6a4a2fd4e71229bc8dae063f1a5844f3446e00f17cf6defde9
-
Filesize
226B
MD5e72ca8f9ad588cf2179deda114f6f13f
SHA1ff867bf091856f2442149643fc98c2e83bc4d6e0
SHA256dc3d31714ad220c2d7b0fe3562418ea3f34754a9de38c2dfab84a90a875754d1
SHA5123b68657fafeccf5618a47d69785d1d728abf70166635609508d5d173d50a358c527e74049b4b1fd3041a5ae0e21a41f80630e952a89a489178ad92e9cf275ee5
-
Filesize
226B
MD545685e9ad33f936c80d3317cc7958ac9
SHA121adda258c8283e84dfe0c77e077e7a5853c670d
SHA256ed08e27ebb2ffb1b0d544036c5ee491986ffc81f3a198fd691802d84beb69dc0
SHA512af7370f04acdaaf8216e66c34a30bd8e49ab27473d67528d4cbb938928b2cfa7903d82dd0fc49466741a0b107176860e466dbc9d65dfd180532c6c82399e16aa
-
Filesize
226B
MD5a65931fca2cb3cc993afe7a79a4a2333
SHA1d4d8902da953dd8dfa1bd3feb9a84d1a47bdf620
SHA2563fc67dbd375cd3e11210fc90e8cc5c8e313c4480214bf5f0bf759754b04c3845
SHA512036b540cfc0a526ad4e2ebc70a07dadf297c47b4c0c5fa876aa5fc1e89e3a48f78aa64df769ca4b0219ebf9af88bafd85b6932dc467588bfa7ad17c344b256cb
-
Filesize
226B
MD51346ee2e828543f1701b2347138f383d
SHA10f331f247801b8bb226b66a535947e961dcb509a
SHA256231cd998ff62570a07c4e776e022b77e743b15521ba290dd798a72f1b23715b2
SHA512dec83aaa3d2912de0a2d48b3079e5bf034084e955d3416992aa37861cdb746520979a98f9c7455c8e98442bb46a1351716386f625dbfcafb8d451bb8bb3337ef
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5be1d064dd59c7debd7bc71e1e3af9bd6
SHA1d7b63cdd3db8670a2c1b229295db6d7884816c1d
SHA2565bc4ef5c6720b97b9b3cf02a1f5fbcd8a7e6e56593e26ff464727871dddb1d93
SHA51287418425eac98789beb728c0c602ee8858bd7a3cd44ec442c6e4f592d6f62299ff0f0affc2d5bc07a4c6e6c8700d7ae963af990bca7267d25ce2a71fc7f09880
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394