Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 04:00
Behavioral task
behavioral1
Sample
JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe
-
Size
1.3MB
-
MD5
687eb706d94936434501a77475b7c8c8
-
SHA1
152e8f75188b8e5f84e07a5a9000c5f669915d28
-
SHA256
599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868
-
SHA512
3941cf01752f8ca3e192b1513100af44405cf8308b760532f1adbf55621e08d5764d58d969dc85e3b2391d56ee65941ae02ad28b8c9f72f009ed77b9b3b0bd08
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1384 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2876 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 2668 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 2668 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x000800000001706d-9.dat dcrat behavioral1/memory/3056-13-0x0000000000A90000-0x0000000000BA0000-memory.dmp dcrat behavioral1/memory/1520-150-0x0000000000E00000-0x0000000000F10000-memory.dmp dcrat behavioral1/memory/2032-210-0x00000000012C0000-0x00000000013D0000-memory.dmp dcrat behavioral1/memory/2808-270-0x0000000000280000-0x0000000000390000-memory.dmp dcrat behavioral1/memory/2416-330-0x0000000000B00000-0x0000000000C10000-memory.dmp dcrat behavioral1/memory/2600-391-0x0000000001300000-0x0000000001410000-memory.dmp dcrat behavioral1/memory/2316-630-0x0000000000080000-0x0000000000190000-memory.dmp dcrat behavioral1/memory/2656-690-0x0000000000C40000-0x0000000000D50000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2580 powershell.exe 2704 powershell.exe 2640 powershell.exe 2644 powershell.exe 2652 powershell.exe 2816 powershell.exe 2688 powershell.exe 1712 powershell.exe 2252 powershell.exe 2532 powershell.exe 2904 powershell.exe 1780 powershell.exe 3064 powershell.exe 2988 powershell.exe 2872 powershell.exe 2676 powershell.exe 2908 powershell.exe 3024 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 3056 DllCommonsvc.exe 1520 taskhost.exe 2032 taskhost.exe 2808 taskhost.exe 2416 taskhost.exe 2600 taskhost.exe 2576 taskhost.exe 1528 taskhost.exe 2176 taskhost.exe 2316 taskhost.exe 2656 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2852 cmd.exe 2852 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 33 raw.githubusercontent.com 36 raw.githubusercontent.com 12 raw.githubusercontent.com 19 raw.githubusercontent.com 29 raw.githubusercontent.com 16 raw.githubusercontent.com 23 raw.githubusercontent.com 26 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\it-IT\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Program Files\VideoLAN\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files (x86)\Google\CrashReports\5940a34987c991 DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\audiodg.exe DllCommonsvc.exe File created C:\Program Files\VideoLAN\csrss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\CrashReports\dllhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\DESIGNER\cc11b995f2a76d DllCommonsvc.exe File created C:\Program Files\Microsoft Office\OSPPSVC.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Defender\it-IT\System.exe DllCommonsvc.exe File created C:\Program Files\Common Files\System\fr-FR\taskhost.exe DllCommonsvc.exe File created C:\Program Files\Common Files\System\fr-FR\b75386f1303e64 DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\DESIGNER\winlogon.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\42af1c969fbb7b DllCommonsvc.exe File created C:\Program Files\Microsoft Office\1610b97d3ab4a7 DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\services.exe DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\c5b4cb5e9653cc DllCommonsvc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\BitLockerDiscoveryVolumeContents\smss.exe DllCommonsvc.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\smss.exe DllCommonsvc.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\69ddcba757bf72 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe 1284 schtasks.exe 2052 schtasks.exe 2508 schtasks.exe 1832 schtasks.exe 1660 schtasks.exe 2412 schtasks.exe 1328 schtasks.exe 1084 schtasks.exe 1088 schtasks.exe 1792 schtasks.exe 2964 schtasks.exe 2672 schtasks.exe 756 schtasks.exe 1932 schtasks.exe 2592 schtasks.exe 2876 schtasks.exe 2340 schtasks.exe 888 schtasks.exe 3020 schtasks.exe 1940 schtasks.exe 1532 schtasks.exe 1748 schtasks.exe 2304 schtasks.exe 1888 schtasks.exe 536 schtasks.exe 2220 schtasks.exe 2968 schtasks.exe 2648 schtasks.exe 2848 schtasks.exe 1672 schtasks.exe 1996 schtasks.exe 1384 schtasks.exe 2880 schtasks.exe 1980 schtasks.exe 1276 schtasks.exe 1644 schtasks.exe 2112 schtasks.exe 880 schtasks.exe 2776 schtasks.exe 1756 schtasks.exe 2748 schtasks.exe 2404 schtasks.exe 3004 schtasks.exe 2720 schtasks.exe 1916 schtasks.exe 1044 schtasks.exe 2824 schtasks.exe 2608 schtasks.exe 1908 schtasks.exe 2296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 3056 DllCommonsvc.exe 2872 powershell.exe 2644 powershell.exe 3064 powershell.exe 3024 powershell.exe 2908 powershell.exe 2904 powershell.exe 1712 powershell.exe 2532 powershell.exe 1780 powershell.exe 2676 powershell.exe 2580 powershell.exe 2988 powershell.exe 2640 powershell.exe 2252 powershell.exe 2816 powershell.exe 2688 powershell.exe 2652 powershell.exe 2704 powershell.exe 1520 taskhost.exe 2032 taskhost.exe 2808 taskhost.exe 2416 taskhost.exe 2600 taskhost.exe 2576 taskhost.exe 1528 taskhost.exe 2176 taskhost.exe 2316 taskhost.exe 2656 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 3056 DllCommonsvc.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 1520 taskhost.exe Token: SeDebugPrivilege 2032 taskhost.exe Token: SeDebugPrivilege 2808 taskhost.exe Token: SeDebugPrivilege 2416 taskhost.exe Token: SeDebugPrivilege 2600 taskhost.exe Token: SeDebugPrivilege 2576 taskhost.exe Token: SeDebugPrivilege 1528 taskhost.exe Token: SeDebugPrivilege 2176 taskhost.exe Token: SeDebugPrivilege 2316 taskhost.exe Token: SeDebugPrivilege 2656 taskhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3024 2948 JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe 31 PID 2948 wrote to memory of 3024 2948 JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe 31 PID 2948 wrote to memory of 3024 2948 JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe 31 PID 2948 wrote to memory of 3024 2948 JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe 31 PID 3024 wrote to memory of 2852 3024 WScript.exe 32 PID 3024 wrote to memory of 2852 3024 WScript.exe 32 PID 3024 wrote to memory of 2852 3024 WScript.exe 32 PID 3024 wrote to memory of 2852 3024 WScript.exe 32 PID 2852 wrote to memory of 3056 2852 cmd.exe 34 PID 2852 wrote to memory of 3056 2852 cmd.exe 34 PID 2852 wrote to memory of 3056 2852 cmd.exe 34 PID 2852 wrote to memory of 3056 2852 cmd.exe 34 PID 3056 wrote to memory of 3064 3056 DllCommonsvc.exe 87 PID 3056 wrote to memory of 3064 3056 DllCommonsvc.exe 87 PID 3056 wrote to memory of 3064 3056 DllCommonsvc.exe 87 PID 3056 wrote to memory of 1712 3056 DllCommonsvc.exe 88 PID 3056 wrote to memory of 1712 3056 DllCommonsvc.exe 88 PID 3056 wrote to memory of 1712 3056 DllCommonsvc.exe 88 PID 3056 wrote to memory of 1780 3056 DllCommonsvc.exe 90 PID 3056 wrote to memory of 1780 3056 DllCommonsvc.exe 90 PID 3056 wrote to memory of 1780 3056 DllCommonsvc.exe 90 PID 3056 wrote to memory of 3024 3056 DllCommonsvc.exe 91 PID 3056 wrote to memory of 3024 3056 DllCommonsvc.exe 91 PID 3056 wrote to memory of 3024 3056 DllCommonsvc.exe 91 PID 3056 wrote to memory of 2252 3056 DllCommonsvc.exe 92 PID 3056 wrote to memory of 2252 3056 DllCommonsvc.exe 92 PID 3056 wrote to memory of 2252 3056 DllCommonsvc.exe 92 PID 3056 wrote to memory of 2644 3056 DllCommonsvc.exe 93 PID 3056 wrote to memory of 2644 3056 DllCommonsvc.exe 93 PID 3056 wrote to memory of 2644 3056 DllCommonsvc.exe 93 PID 3056 wrote to memory of 2640 3056 DllCommonsvc.exe 94 PID 3056 wrote to memory of 2640 3056 DllCommonsvc.exe 94 PID 3056 wrote to memory of 2640 3056 DllCommonsvc.exe 94 PID 3056 wrote to memory of 2908 3056 DllCommonsvc.exe 95 PID 3056 wrote to memory of 2908 3056 DllCommonsvc.exe 95 PID 3056 wrote to memory of 2908 3056 DllCommonsvc.exe 95 PID 3056 wrote to memory of 2688 3056 DllCommonsvc.exe 96 PID 3056 wrote to memory of 2688 3056 DllCommonsvc.exe 96 PID 3056 wrote to memory of 2688 3056 DllCommonsvc.exe 96 PID 3056 wrote to memory of 2904 3056 DllCommonsvc.exe 97 PID 3056 wrote to memory of 2904 3056 DllCommonsvc.exe 97 PID 3056 wrote to memory of 2904 3056 DllCommonsvc.exe 97 PID 3056 wrote to memory of 2676 3056 DllCommonsvc.exe 98 PID 3056 wrote to memory of 2676 3056 DllCommonsvc.exe 98 PID 3056 wrote to memory of 2676 3056 DllCommonsvc.exe 98 PID 3056 wrote to memory of 2872 3056 DllCommonsvc.exe 99 PID 3056 wrote to memory of 2872 3056 DllCommonsvc.exe 99 PID 3056 wrote to memory of 2872 3056 DllCommonsvc.exe 99 PID 3056 wrote to memory of 2704 3056 DllCommonsvc.exe 100 PID 3056 wrote to memory of 2704 3056 DllCommonsvc.exe 100 PID 3056 wrote to memory of 2704 3056 DllCommonsvc.exe 100 PID 3056 wrote to memory of 2532 3056 DllCommonsvc.exe 102 PID 3056 wrote to memory of 2532 3056 DllCommonsvc.exe 102 PID 3056 wrote to memory of 2532 3056 DllCommonsvc.exe 102 PID 3056 wrote to memory of 2580 3056 DllCommonsvc.exe 103 PID 3056 wrote to memory of 2580 3056 DllCommonsvc.exe 103 PID 3056 wrote to memory of 2580 3056 DllCommonsvc.exe 103 PID 3056 wrote to memory of 2816 3056 DllCommonsvc.exe 105 PID 3056 wrote to memory of 2816 3056 DllCommonsvc.exe 105 PID 3056 wrote to memory of 2816 3056 DllCommonsvc.exe 105 PID 3056 wrote to memory of 2988 3056 DllCommonsvc.exe 106 PID 3056 wrote to memory of 2988 3056 DllCommonsvc.exe 106 PID 3056 wrote to memory of 2988 3056 DllCommonsvc.exe 106 PID 3056 wrote to memory of 2652 3056 DllCommonsvc.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_599f6a9ddc6269d0decf8308360f46cda7f0a8895a5c74307ec82cb4b31d7868.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\BitLockerDiscoveryVolumeContents\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Temp\Crashpad\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\it-IT\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\CrashReports\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\System\fr-FR\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\DESIGNER\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\es-ES\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2fkTSmrMVo.bat"5⤵PID:2844
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2416
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Wx0Tv0d3iA.bat"7⤵PID:1284
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2956
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VhvmsyECnd.bat"9⤵PID:2532
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2296
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ys2Wc5gw2w.bat"11⤵PID:2400
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:1936
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xEvQv3iUx6.bat"13⤵PID:2568
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:348
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zDWALPrpmL.bat"15⤵PID:2136
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:448
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\989MOUOnUX.bat"17⤵PID:2148
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2496
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5G5G1KH0qy.bat"19⤵PID:2168
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:536
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Y23Kn3rQqK.bat"21⤵PID:1472
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:1736
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9BpIS9nw5f.bat"23⤵PID:2872
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:1808
-
-
C:\Program Files\Common Files\System\fr-FR\taskhost.exe"C:\Program Files\Common Files\System\fr-FR\taskhost.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ffEuziAK6w.bat"25⤵PID:1908
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:3060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files\Reference Assemblies\Microsoft\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\providercommon\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\Temp\Crashpad\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Windows\Temp\Crashpad\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\providercommon\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\providercommon\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\providercommon\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\it-IT\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\VideoLAN\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\CrashReports\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\CrashReports\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\System\fr-FR\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\fr-FR\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\System\fr-FR\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\DESIGNER\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Internet Explorer\es-ES\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e587b2cdf621be587b35b92a425ec2
SHA1d1d8394645a38d62f3cbfed9106d5d351552ddfd
SHA25606f7ef3d9d43a24128045288208f16c4116492a8ae5f779b88c8a9986c8c7420
SHA512d15e512c0942e0da7ea69d09530de241afa1908ceeac0545bc127a892a9ace4642030abb1b6b26340b6b509bdf86a113baae026b3deca23e08c8f62df43f7e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82bd6fc71508906e7a17051620a551b
SHA1261507aeb798ff5a05b55f8f2d1820d0e3611b70
SHA256c47a8b5508a635c27ff56b3802a016daec0a5aad256fbe4c23db518635746f38
SHA5121d7086957e04c542c1f67e0f24eaf4878a9b9be4435a810e7d1088748e78bda1b067e5c4ae69c3f88619ac1ab3290f7b5b0ea5d05599048800d4563afd8b28a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af0d8c98bedb14881379befee5daa83
SHA1625360c6a2515566e4c268b22ecead9503105f65
SHA25604faece57067facf37a38bb171ef603afd9406ed51d0b63e51fdd0ce728fe6e9
SHA512a0342238b0848b8d8950b496970a1e1c01457edc698435500d62bf8e32956693bbd1b3c7b7add74894031a1413bfbab900d0094a9aae3f593ecce0bead6ed23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bc8490e5f6e2ec1575c2e6db8ccfb8
SHA1c9924f51eec20e5d2821f1c9d26306b5f7b192f9
SHA256f7e351454c58a1939024825d3ae95313afee48293459810739b660ae23ad4aae
SHA512ac3b2623183373cba8d0ae480ebef6f7c58f3b94bde530a198798fe8e561c4f5648c094a15eb8b685f06a98fc36165f4376de4f717ad5680c260a9b581e3a3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539227aeda1f39dad7943a6ecf5b74f3a
SHA1cbbb0d854a360e6512a52ad34efd45ed22ead0a2
SHA256bf56c6e8c9a62f421d980162c58755d022d9e70e7b46a6d7a9efa4c8d64ff3a5
SHA512d51e56edb95fa53990a0a6c1928880a413998e147129d2f72f9567792d9ba230b22414ba30f176eaccee91a1d0543d51fb38141a7b12c12390678ae295b7784c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53623cacbb3be093122606353db47830e
SHA1b13041131dee99e212c602d436721275372fbde5
SHA256a6aae3023ac4e2dc64691798bcaff10858636cbdfba357ec3bae94dbeb3ceceb
SHA5129c0996c19ad8c3ef864b7d1719aae34f5457f0ef8cc3a4db69dae3b26c8222c6a715ec6b8368750d03439eb9111a9cb9099f8681fbe33e32b227e29ee5c19364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c68a4f7f438db9ba30b7133312b7d7
SHA17bc4872f712c8f1763de17142755b21cee00173b
SHA256aa9ff94a8920aadf8835ec53f47aa2987f8c17889d1679d1f5249d894063345b
SHA512aa847bf4a825f9c64c048fbd26c0d6c65518bc390f5894e3144b8b874142e42c382e8282dc2ab966d63ed1c362e9ccbd55358c1075a2ee530440f9550105cd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547acedcd3fe8732a1b43626f9e3254ca
SHA116ded6d598cd66e63698d150f5f1b6625b56cb21
SHA256eae4f9a80cf577d3ebba3f5f4131d345aa56a28ed3719bd9cca004b25cdd46f0
SHA512f1ab86b2d7a27e95d9884a7266cef34b5e99a1f360ad78b991a6c76fdf45791dad6e1b4593c2603d4a1e15c2eb77867fdc18aef941d9a39dde8a2bc861619ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ff2026a7f5aa6ec1468d5440e8bef8
SHA118746d2249110d12183f63b0d7442aaecc1d6c19
SHA256fa89c0f944ee1d02ce3626b42eff82faa6d8536e444d777d90174b380a1f2440
SHA512828177f69c4baebcd90132d074159932154aa008fe7f22d2b4b477325bddec8f4b37562527e31755b8547a215b417367825d65fc63de369d75fd48c2c87c197e
-
Filesize
220B
MD5e768c551e959da082b3314151e52fc11
SHA1be86d3f087da20d9afae069e2a77ee529878972e
SHA25602798b9a017dde945535510e9cace11fcf756ae38d27d2bc5c2f76a5bf00eabd
SHA5126f4737dfd3b3f6e4247c3ce4fce0256671959b5d8024441d653dbded1609af77a0ed935e76c1dfacddd9615b4c1f22bc3f152b6fe44c7306fdae63a02df70302
-
Filesize
220B
MD51da8d75504abb9724081bfa0ed2e801e
SHA105ebbdb8f84043a7f05c37cd0d5e5583ab101932
SHA256f2443f6a7ba89de7794e721b6a52e94e4b519008ed2191178fc98e1cef4dd483
SHA5124d89775f5cd656d5e0dae9c1b308005172b08ff46f1542fe15ee65772f9c0a9a3c621c40838e50db9ee553936f9e45e76e5e6d92aaa160dde311a3763d0a4e75
-
Filesize
220B
MD5f112f85dbaecf85751e3feda74ed15ac
SHA18d762205d23e31113ac6be0d8a2e8cc8dba67831
SHA25677d0c96a718fe1eb60d1c2a61177a72652cfe368f8c473fd7ba090f15f23b3ac
SHA5123206e71139651315078fbaa4ef3f6d862b2d25c8e730ad8173c100641954d1878750a582a782976f76afaed413e84ec26bb84e1d97f225ad0acfd224d99b8d67
-
Filesize
220B
MD59c13839d1d5c2afea90323b6a21b9fdb
SHA148492c41ad86c73d7d9df6c073ffa5ee53dd4086
SHA25617aa5f88f28573db25615e75f18c6d90d0b95a161e6091fc9c0b8807784787a0
SHA51208c5b556a7e3a24438675fb7ceaccb18dcfd938965d9b9981c43ced00b332e703bb52f0d2c1b3bf5737c25cfc07b9b9bb0625a206d17a3bf0c382168741ae2b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
220B
MD55f50898e949e3b53d54cf125e3fd4ea1
SHA157edb0b8c29f8cfa20a0bdd270d7d753889d4edf
SHA256d3610ac1ff350a6b9b7036a941bc7c7da48b9c124d12d285cddb621554a01c57
SHA512a46e2726e24b85a896382ce498cd7921a024e1d18a4fcde705c51a01b236212b7d3e8b33c3841797bf93780394e7f3e74bd44cb79f09326aa5a51f336fa14ddc
-
Filesize
220B
MD5f867e43dd247a6c01368bfcf74ab82e4
SHA146a76b4593aff9599d84990ca34fe46bc4cfd9d5
SHA256a0eee3a924ccc87a002c862e8fc5620a1b3a0af843fd413aff616e3faf1b1436
SHA5125124f1d675ddaaeb97251c078e2d3c33bccc9d3b53d2eb3b01baea23a47dce21f68c9429fe3d264dcfc6ff5c0d1bfae400208db48b00c22ac808ca00c9a3cae8
-
Filesize
220B
MD50d0a56e2bef5f5663df7ffdcf72a0257
SHA160998245f0452a90d8221808df8667a05272cb78
SHA25607b2862015055d59b8fa1821ceb1cc3e073fbe94317c6479fd553a6d5c5c8252
SHA5128d301225e777ff891c6112b959bd974a3ac444f2a0706807dcc10598206a80dc1b7b23feb0b75cc5d95e944733ab13b9ee480cbb58e168122e2860a57b8b48e1
-
Filesize
220B
MD50451c3be4cf1543da7d5db9874b86ed6
SHA16328381c0075dadf6a03af43934bedfcc3d45f51
SHA2569e1a05eda99cd9390ed9fd9c744b06c3e4b01735070bc7de21506fb4c5f3810f
SHA512d27d69bc544cf72f1a848e5ea5498dfd88127d9e8ad6cae4ed75acfea74a8c13c5828a9a6f1ae8aec67ac7d504dfbf22cf54d5a281b21ec0b66b24cc44f6f1e5
-
Filesize
220B
MD529dffa624769eaceffb30adfd8391eb1
SHA1dad734c7aa6b67f9525eaa9907b10c23d7cecde0
SHA25624c489919cc0fb1eed6d1be6647abbe3d50ac0d948388b974d7cf2bdd9f9d6ed
SHA5120bcc978494cbf9abd80347e150ac0a71f3501d47dcc7f6b868e64b333479226d03e9b38d737257e6a81124eedd4d8604a3bdb635335dc6b00a7ceeb664243471
-
Filesize
220B
MD50181271c288204254d727c1ad4f88343
SHA1e016a26cda89cd069076c9ad0361e16178b261bc
SHA2565ffd1b50ff41c6ebef09ae3651f88aa64f12cc37ffaf49dbe36f18760af7fa27
SHA5123425ab957f790ad141d40e2d1b724d732e587571b84ad799c5d3fa27bfaeab78ca7ffad2cd7b0628db8d8be01f3b416ac87f33c5a9744499454a85a7b53c70f7
-
Filesize
220B
MD5c587e3cd88613e2f48e84a5e894689ed
SHA11be717b493a8da3d7e910d6f7c35925c9fff1b09
SHA25634911d66dec121191e3387ae1bd986574a88316cf45af937c298f8d6e543676b
SHA51251d13a24816fff66458b2bb5fc87c8f84322bd0587d5070a71344561dcb0b455252256fa025261c2063dd93d1be69b2a4f0485fb895737382c30ba6583d4b439
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e1d8103381589a11ce407d6d39d93b3a
SHA172433840c54413254087bb896ba04865fcf7481d
SHA2565efbeebd8c21fa845adc4d03d9663c0a2472f09a97f42def69210aa378d0bf29
SHA512d23d0da2df5b50457961d1ef2ead77f92865c91973d350282080a5b4e21ad4cc22216da686922655d4263711d58de0313f108bd86824d7643c3c5c0bc8faedbc
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394