Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 03:20
Behavioral task
behavioral1
Sample
JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe
-
Size
1.3MB
-
MD5
646a404dc3a4660c161918c699d85995
-
SHA1
fd88b22a64dfed30b6a340fd29b4f8c1d645def4
-
SHA256
ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151
-
SHA512
6e891d4b26581510e861ccb4d53be8d5b5da69da6b5e48bbc101850f6e3c7c6841e955064f4066f747b6975972a61b10d50f6a0830fde6c68307fbdc584afd79
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 5092 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3184 5092 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 5092 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 5092 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 5092 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 5092 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x000a000000023b8a-9.dat dcrat behavioral2/memory/2772-13-0x0000000000650000-0x0000000000760000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 840 powershell.exe 2544 powershell.exe 4884 powershell.exe -
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation csrss.exe -
Executes dropped EXE 15 IoCs
pid Process 2772 DllCommonsvc.exe 4232 csrss.exe 3392 csrss.exe 5028 csrss.exe 3032 csrss.exe 4704 csrss.exe 444 csrss.exe 3524 csrss.exe 2344 csrss.exe 2252 csrss.exe 2824 csrss.exe 2908 csrss.exe 1900 csrss.exe 2236 csrss.exe 2312 csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 20 raw.githubusercontent.com 23 raw.githubusercontent.com 53 raw.githubusercontent.com 54 raw.githubusercontent.com 37 raw.githubusercontent.com 39 raw.githubusercontent.com 45 raw.githubusercontent.com 51 raw.githubusercontent.com 52 raw.githubusercontent.com 55 raw.githubusercontent.com 21 raw.githubusercontent.com 38 raw.githubusercontent.com 42 raw.githubusercontent.com 43 raw.githubusercontent.com 44 raw.githubusercontent.com -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\wininit.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\wininit.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\56085415360792 DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\886983d96e3d3e DllCommonsvc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\diagnostics\index\StartMenuExperienceHost.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings csrss.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe 3184 schtasks.exe 3032 schtasks.exe 2268 schtasks.exe 2800 schtasks.exe 1984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2772 DllCommonsvc.exe 2544 powershell.exe 840 powershell.exe 4884 powershell.exe 2544 powershell.exe 840 powershell.exe 4232 csrss.exe 4884 powershell.exe 3392 csrss.exe 5028 csrss.exe 3032 csrss.exe 4704 csrss.exe 444 csrss.exe 3524 csrss.exe 2344 csrss.exe 2252 csrss.exe 2824 csrss.exe 2908 csrss.exe 1900 csrss.exe 2236 csrss.exe 2312 csrss.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2772 DllCommonsvc.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 840 powershell.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 4232 csrss.exe Token: SeDebugPrivilege 3392 csrss.exe Token: SeDebugPrivilege 5028 csrss.exe Token: SeDebugPrivilege 3032 csrss.exe Token: SeDebugPrivilege 4704 csrss.exe Token: SeDebugPrivilege 444 csrss.exe Token: SeDebugPrivilege 3524 csrss.exe Token: SeDebugPrivilege 2344 csrss.exe Token: SeDebugPrivilege 2252 csrss.exe Token: SeDebugPrivilege 2824 csrss.exe Token: SeDebugPrivilege 2908 csrss.exe Token: SeDebugPrivilege 1900 csrss.exe Token: SeDebugPrivilege 2236 csrss.exe Token: SeDebugPrivilege 2312 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 4024 2256 JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe 82 PID 2256 wrote to memory of 4024 2256 JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe 82 PID 2256 wrote to memory of 4024 2256 JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe 82 PID 4024 wrote to memory of 1996 4024 WScript.exe 87 PID 4024 wrote to memory of 1996 4024 WScript.exe 87 PID 4024 wrote to memory of 1996 4024 WScript.exe 87 PID 1996 wrote to memory of 2772 1996 cmd.exe 89 PID 1996 wrote to memory of 2772 1996 cmd.exe 89 PID 2772 wrote to memory of 4884 2772 DllCommonsvc.exe 96 PID 2772 wrote to memory of 4884 2772 DllCommonsvc.exe 96 PID 2772 wrote to memory of 840 2772 DllCommonsvc.exe 97 PID 2772 wrote to memory of 840 2772 DllCommonsvc.exe 97 PID 2772 wrote to memory of 2544 2772 DllCommonsvc.exe 98 PID 2772 wrote to memory of 2544 2772 DllCommonsvc.exe 98 PID 2772 wrote to memory of 4232 2772 DllCommonsvc.exe 102 PID 2772 wrote to memory of 4232 2772 DllCommonsvc.exe 102 PID 4232 wrote to memory of 4292 4232 csrss.exe 106 PID 4232 wrote to memory of 4292 4232 csrss.exe 106 PID 4292 wrote to memory of 2432 4292 cmd.exe 108 PID 4292 wrote to memory of 2432 4292 cmd.exe 108 PID 4292 wrote to memory of 3392 4292 cmd.exe 109 PID 4292 wrote to memory of 3392 4292 cmd.exe 109 PID 3392 wrote to memory of 2852 3392 csrss.exe 110 PID 3392 wrote to memory of 2852 3392 csrss.exe 110 PID 2852 wrote to memory of 4040 2852 cmd.exe 112 PID 2852 wrote to memory of 4040 2852 cmd.exe 112 PID 2852 wrote to memory of 5028 2852 cmd.exe 115 PID 2852 wrote to memory of 5028 2852 cmd.exe 115 PID 5028 wrote to memory of 3800 5028 csrss.exe 116 PID 5028 wrote to memory of 3800 5028 csrss.exe 116 PID 3800 wrote to memory of 5036 3800 cmd.exe 118 PID 3800 wrote to memory of 5036 3800 cmd.exe 118 PID 3800 wrote to memory of 3032 3800 cmd.exe 119 PID 3800 wrote to memory of 3032 3800 cmd.exe 119 PID 3032 wrote to memory of 1744 3032 csrss.exe 120 PID 3032 wrote to memory of 1744 3032 csrss.exe 120 PID 1744 wrote to memory of 2212 1744 cmd.exe 122 PID 1744 wrote to memory of 2212 1744 cmd.exe 122 PID 1744 wrote to memory of 4704 1744 cmd.exe 123 PID 1744 wrote to memory of 4704 1744 cmd.exe 123 PID 4704 wrote to memory of 4140 4704 csrss.exe 124 PID 4704 wrote to memory of 4140 4704 csrss.exe 124 PID 4140 wrote to memory of 1132 4140 cmd.exe 126 PID 4140 wrote to memory of 1132 4140 cmd.exe 126 PID 4140 wrote to memory of 444 4140 cmd.exe 127 PID 4140 wrote to memory of 444 4140 cmd.exe 127 PID 444 wrote to memory of 1640 444 csrss.exe 128 PID 444 wrote to memory of 1640 444 csrss.exe 128 PID 1640 wrote to memory of 2528 1640 cmd.exe 130 PID 1640 wrote to memory of 2528 1640 cmd.exe 130 PID 1640 wrote to memory of 3524 1640 cmd.exe 131 PID 1640 wrote to memory of 3524 1640 cmd.exe 131 PID 3524 wrote to memory of 4740 3524 csrss.exe 132 PID 3524 wrote to memory of 4740 3524 csrss.exe 132 PID 4740 wrote to memory of 4972 4740 cmd.exe 134 PID 4740 wrote to memory of 4972 4740 cmd.exe 134 PID 4740 wrote to memory of 2344 4740 cmd.exe 135 PID 4740 wrote to memory of 2344 4740 cmd.exe 135 PID 2344 wrote to memory of 948 2344 csrss.exe 136 PID 2344 wrote to memory of 948 2344 csrss.exe 136 PID 948 wrote to memory of 2956 948 cmd.exe 138 PID 948 wrote to memory of 2956 948 cmd.exe 138 PID 948 wrote to memory of 2252 948 cmd.exe 139 PID 948 wrote to memory of 2252 948 cmd.exe 139 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\A1nTHBcTHH.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2432
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lE88gYdR15.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:4040
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6uGRILFBWR.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:5036
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uItNEyebdJ.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2212
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Kq4mDwN7mD.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:1132
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zGIMjSYhT8.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2528
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aTd08pZfDw.bat"18⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:4972
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\38MS6cfT7h.bat"20⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2956
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cOf3pucYXi.bat"22⤵PID:3060
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:4528
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\daA37ewxym.bat"24⤵PID:3512
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:2220
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D2zd9hDRps.bat"26⤵PID:2800
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:860
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WSSqGJyhfL.bat"28⤵PID:1456
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:1268
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2wrSnsL5gc.bat"30⤵PID:4420
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:2508
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TfYr4aOzGb.bat"32⤵PID:1760
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:233⤵PID:3340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
221B
MD594745a69432429b9ffb3d4d710343a8c
SHA1a3dcc7e70e061b1cffe501f6200baa44eb412b0f
SHA256f12809ffb667d9a029ebd71d722cac016be8e5154d2e58609aef535bab1b688e
SHA5122f1f816f63e48e85c5165a421164bbd046f493a496e0ee7eb871a2286742bc7e98e92e8d3706dfca0461ea51b07fc64078749e44a2c0c23b1dd15be9d9e5dd05
-
Filesize
221B
MD5be87200e255045f80232ee9370fac3a1
SHA135d1c856dc9aa21a765e839b87d521282b8c1ddc
SHA256950f3d339398b39eeede3eed65171d5f3991f7e7818fb685ab0f932744633ec5
SHA5122eeea237025e8a18682a5ea35784da474e17c92c3713b34d5a87c7e00c464580b8686a360f6d96db56c998f72f63db3b6296ff0687cf7e87c35ccef1b993e30c
-
Filesize
221B
MD55f5dcf0000a8cd993aa0bb46a2cc1f59
SHA1b4593020e9a2ed4605d8eb498cc3142f151dbdfb
SHA25633e62928b22b008c1294f5aa1338c95c4267757eedc2ad7680d3d854e66df927
SHA5127acc35d00975d3f534b4f5bb7a147a79c9aaf5ece0557c39fdf62cda94b107f9394137f4766c8c17e4be78697c229c13499c0418061ff1576f08f875e8fbe898
-
Filesize
221B
MD57baf554a1913c159c58096d25d39cd4e
SHA1bcb2d34fef1cf1eca77d3f80456e8f6aac32fb94
SHA2567092ab1b919cd5c012832163448d28a92562ebc8f661f4d5f5ac8de65c38a763
SHA5129a88d8c19a296c5b6e8d97132dcf968940f6f927e97bd8dd4b25f89c550a1cfd70cf6fede9a3492cbbec44c807c7d78ce50d3cd968914dcaeb3fdd2c859d744d
-
Filesize
221B
MD5e06d11dc39143d4c931cc5d32d693e0a
SHA1c29be3bb690ddbabe57afbac565f5c46d0ed7a54
SHA2561b92be7ad0ea4f2171139b106f545f007c99fb39b9359496c62425a79b5241ab
SHA512f62739dcada418d4ba6098ff7981199d2927b8b9c2f506140c45efda25da04a804b87581814cdbc5a2eec34fd31cc2b9cb01102af9d3a5f15a4a5ace2acc90c0
-
Filesize
221B
MD57ea7642e2b53a2c4edb3233f0f9c4d83
SHA1f422aceceb0d8af3f63e6679ea0a92c0682df62b
SHA2566b9822c0f1c5176f1a5cbf3f50ffa908bffaebad20b8eb2ef5822377e1254e80
SHA512f1882a9a524938174e37ef9eb48f2d198e19ff523496afc05fd4a16fda908f016b181e55e34b3f03dbb79f6a73d105c63f59176ea6ea185c31c34a29bfc0b7d5
-
Filesize
221B
MD5c385d7144a374ccef32ae8f618580988
SHA12f6c99f9e316527d40865cda4d1d57fc3e0d770e
SHA25611ea40b7e2285e5b42c0fdb47988b5895f23563cf3dce690bd37a4308a7b52f2
SHA5125b6c3a4c976ee6391b631a6d2b66d293deb129bf9db77d59ef999856433913479306161068ee75641723f734293ccd9452a93e8ff7e1a0ef14c86225ca49dd4b
-
Filesize
221B
MD5bdec0b3a7491e5b796f14f018dcedbb5
SHA166da89d5bba637425beb605d544ecf91c7153bef
SHA256585b1eb0fcd8601e4feb2f844c5e3b33b737d6f81a1c927705700a72fea5aa53
SHA51230e1e2e9ccb7efcf1a722effc053f909bceab74949722697f24bf1962071008f187db57a65b750e9777c6a6933c1dff1495d7bf650ef7bcf6cc0d520a560a47a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
221B
MD5b73d53b5ef6b114a8582492fa9dbfb08
SHA108e64ab9e4f6b80c278a89823dca38a3243116d0
SHA2564bb4eb2d7968987b0fca5bf598a59070d411052634c3cbfe87f7eef383c0b5c2
SHA51283183a06dbd4cd1e97891f5b072c8e2909cc96d57bfcc7faef36f67cbefe9825ac1f20cf81bde66dcbab307a66455c310024c79d40975c50f787202c1567737a
-
Filesize
221B
MD59b1e364c57d85ab70613a84861405162
SHA1183d528f53ca8fefeb93e808c5efacfd7971ef1a
SHA256433631914565aea66648ef99b1367b949531e61b63cd81a9a11e7cce1c5634e1
SHA512c520113648a22374c5aa0034984a57709c21acf893005b300a33bfb06049b4b45c26b3554be3ff189851569213a5a26963b340cbcf0f77e4760c8859ce35edb5
-
Filesize
221B
MD5968ebc73d0da2dbb4e36de749e777553
SHA1a6bf3d01be9bbbf2e030925238f6fad2ca28d14b
SHA256558a49ca02d53fb457f9180edc4ecd14d55910408864549765f8b4ef1fe12d56
SHA5121a518dcf8bcaa12bea959c4ced62cba57b04a35a0ed3dc983d12f2496b8aa061f269343892d9ca54efbde91ea2b4a9c54a31a9759f646d03061bf321ba56bb2e
-
Filesize
221B
MD5705214b0a87e4d15428aade631da741c
SHA138bc0086a19efa9bc0e84b01bf2df30c527cda28
SHA2563514aaa1e55404e069ad75b4f4b7a9798349ddc4c3317a6d9d0f30097eb553eb
SHA5124073aaea28d93455085a2b269e02b183c9f87c66b1bf073782742074c9d3477a4e02c6cbe6ee0558279ad32ffd62eb12bc912fd8c46447d9645c8aca3e40ac39
-
Filesize
221B
MD51f41059f0daec06e442187c80e9f7425
SHA141b1ec4db6f9c64c2564808c69a17f9f59355fe0
SHA25641a32f9ce5f88f5d517e254aeff0838971c8b26b7328627151caf87482749596
SHA5128a16b0c9f03e810f1cfcf6705fe201a7954099ab94663f34839c92c3c5c7b9ba46eb31c3904d6a8c90c00dea3b33a7427f8e1b60a5014b525a54d1858b0bb450
-
Filesize
221B
MD5324e0413f7ccb2f929245c5b62cd5d10
SHA18d559aba8f28f07d4e0bb77292d79ebb59be1fdc
SHA2568cecf4c2d2779bcdb83e10c368d6c1770b5de8b270769a1c0693be92f151d0f3
SHA5121ae0dd9cab4266ff0063b0fbbaab8dd048daec7606df891e2a1f83916a3dde7c68db4ff1c0199d2a402f44f4d0b224053116017101a82b1c2cc3f267cdfcc134
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478