Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:24
Behavioral task
behavioral1
Sample
JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe
-
Size
1.3MB
-
MD5
fa7e8db7f43edc331ab02d51323961e2
-
SHA1
3fa12cd3d335bbe52ec22dd4bf67c637b2a789f5
-
SHA256
1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c
-
SHA512
68631a3e0fa93c0fb49d02880c2d835c0b9cd696171931475e1de4e294e10ab0257d8a79d0c29acc20bc63ddbc7ce128250c37be9ce10c4507768df5251738c0
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1296 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 448 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1224 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1048 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 996 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2888 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2888 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x000700000001949d-12.dat dcrat behavioral1/memory/2788-13-0x00000000011A0000-0x00000000012B0000-memory.dmp dcrat behavioral1/memory/560-143-0x00000000003A0000-0x00000000004B0000-memory.dmp dcrat behavioral1/memory/1496-203-0x0000000001240000-0x0000000001350000-memory.dmp dcrat behavioral1/memory/2136-381-0x00000000003D0000-0x00000000004E0000-memory.dmp dcrat behavioral1/memory/1496-441-0x0000000000B50000-0x0000000000C60000-memory.dmp dcrat behavioral1/memory/2208-501-0x0000000000F90000-0x00000000010A0000-memory.dmp dcrat behavioral1/memory/2652-620-0x0000000000320000-0x0000000000430000-memory.dmp dcrat behavioral1/memory/2732-680-0x0000000000E90000-0x0000000000FA0000-memory.dmp dcrat behavioral1/memory/756-740-0x0000000001010000-0x0000000001120000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2704 powershell.exe 1688 powershell.exe 1380 powershell.exe 2496 powershell.exe 2316 powershell.exe 2388 powershell.exe 2832 powershell.exe 2516 powershell.exe 2544 powershell.exe 2208 powershell.exe 1796 powershell.exe 1584 powershell.exe 1724 powershell.exe 2088 powershell.exe 2300 powershell.exe 2780 powershell.exe 2696 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2788 DllCommonsvc.exe 560 smss.exe 1496 smss.exe 784 smss.exe 1368 smss.exe 2136 smss.exe 1496 smss.exe 2208 smss.exe 1196 smss.exe 2652 smss.exe 2732 smss.exe 756 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2160 cmd.exe 2160 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 12 raw.githubusercontent.com 19 raw.githubusercontent.com 23 raw.githubusercontent.com 26 raw.githubusercontent.com 30 raw.githubusercontent.com 33 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 36 raw.githubusercontent.com 40 raw.githubusercontent.com 4 raw.githubusercontent.com 16 raw.githubusercontent.com -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\RedistList\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\explorer.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Sync Framework\taskhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Sync Framework\b75386f1303e64 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\Idle.exe DllCommonsvc.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Tasks\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\dllhost.exe DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\5940a34987c991 DllCommonsvc.exe File created C:\Windows\Boot\EFI\es-ES\Idle.exe DllCommonsvc.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\spoolsv.exe DllCommonsvc.exe File created C:\Windows\Panther\setup.exe\cmd.exe DllCommonsvc.exe File created C:\Windows\Panther\setup.exe\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Windows\Tasks\System.exe DllCommonsvc.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\f3b6ecef712a24 DllCommonsvc.exe File created C:\Windows\Migration\WTR\lsass.exe DllCommonsvc.exe File created C:\Windows\Migration\WTR\6203df4a6bafc7 DllCommonsvc.exe File opened for modification C:\Windows\Panther\setup.exe\cmd.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2540 schtasks.exe 996 schtasks.exe 2396 schtasks.exe 2712 schtasks.exe 2500 schtasks.exe 1784 schtasks.exe 872 schtasks.exe 1788 schtasks.exe 2116 schtasks.exe 1808 schtasks.exe 1816 schtasks.exe 2652 schtasks.exe 1664 schtasks.exe 1928 schtasks.exe 1048 schtasks.exe 448 schtasks.exe 2312 schtasks.exe 2532 schtasks.exe 1296 schtasks.exe 2976 schtasks.exe 2624 schtasks.exe 1144 schtasks.exe 1044 schtasks.exe 1600 schtasks.exe 1744 schtasks.exe 2904 schtasks.exe 3016 schtasks.exe 2324 schtasks.exe 1100 schtasks.exe 2380 schtasks.exe 1988 schtasks.exe 2456 schtasks.exe 2288 schtasks.exe 2580 schtasks.exe 2236 schtasks.exe 2756 schtasks.exe 3068 schtasks.exe 2740 schtasks.exe 1224 schtasks.exe 2400 schtasks.exe 3024 schtasks.exe 1712 schtasks.exe 2536 schtasks.exe 2184 schtasks.exe 2820 schtasks.exe 1496 schtasks.exe 1732 schtasks.exe 1632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2788 DllCommonsvc.exe 1688 powershell.exe 1380 powershell.exe 2516 powershell.exe 2300 powershell.exe 2208 powershell.exe 1584 powershell.exe 2388 powershell.exe 2832 powershell.exe 2496 powershell.exe 1724 powershell.exe 2696 powershell.exe 2544 powershell.exe 2780 powershell.exe 2704 powershell.exe 1796 powershell.exe 2316 powershell.exe 2088 powershell.exe 560 smss.exe 1496 smss.exe 784 smss.exe 1368 smss.exe 2136 smss.exe 1496 smss.exe 2208 smss.exe 1196 smss.exe 2652 smss.exe 2732 smss.exe 756 smss.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2788 DllCommonsvc.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 2300 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 1724 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 560 smss.exe Token: SeDebugPrivilege 1496 smss.exe Token: SeDebugPrivilege 784 smss.exe Token: SeDebugPrivilege 1368 smss.exe Token: SeDebugPrivilege 2136 smss.exe Token: SeDebugPrivilege 1496 smss.exe Token: SeDebugPrivilege 2208 smss.exe Token: SeDebugPrivilege 1196 smss.exe Token: SeDebugPrivilege 2652 smss.exe Token: SeDebugPrivilege 2732 smss.exe Token: SeDebugPrivilege 756 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 1752 752 JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe 31 PID 752 wrote to memory of 1752 752 JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe 31 PID 752 wrote to memory of 1752 752 JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe 31 PID 752 wrote to memory of 1752 752 JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe 31 PID 1752 wrote to memory of 2160 1752 WScript.exe 32 PID 1752 wrote to memory of 2160 1752 WScript.exe 32 PID 1752 wrote to memory of 2160 1752 WScript.exe 32 PID 1752 wrote to memory of 2160 1752 WScript.exe 32 PID 2160 wrote to memory of 2788 2160 cmd.exe 34 PID 2160 wrote to memory of 2788 2160 cmd.exe 34 PID 2160 wrote to memory of 2788 2160 cmd.exe 34 PID 2160 wrote to memory of 2788 2160 cmd.exe 34 PID 2788 wrote to memory of 1584 2788 DllCommonsvc.exe 84 PID 2788 wrote to memory of 1584 2788 DllCommonsvc.exe 84 PID 2788 wrote to memory of 1584 2788 DllCommonsvc.exe 84 PID 2788 wrote to memory of 1688 2788 DllCommonsvc.exe 85 PID 2788 wrote to memory of 1688 2788 DllCommonsvc.exe 85 PID 2788 wrote to memory of 1688 2788 DllCommonsvc.exe 85 PID 2788 wrote to memory of 1724 2788 DllCommonsvc.exe 86 PID 2788 wrote to memory of 1724 2788 DllCommonsvc.exe 86 PID 2788 wrote to memory of 1724 2788 DllCommonsvc.exe 86 PID 2788 wrote to memory of 2544 2788 DllCommonsvc.exe 87 PID 2788 wrote to memory of 2544 2788 DllCommonsvc.exe 87 PID 2788 wrote to memory of 2544 2788 DllCommonsvc.exe 87 PID 2788 wrote to memory of 1380 2788 DllCommonsvc.exe 88 PID 2788 wrote to memory of 1380 2788 DllCommonsvc.exe 88 PID 2788 wrote to memory of 1380 2788 DllCommonsvc.exe 88 PID 2788 wrote to memory of 2516 2788 DllCommonsvc.exe 89 PID 2788 wrote to memory of 2516 2788 DllCommonsvc.exe 89 PID 2788 wrote to memory of 2516 2788 DllCommonsvc.exe 89 PID 2788 wrote to memory of 2300 2788 DllCommonsvc.exe 91 PID 2788 wrote to memory of 2300 2788 DllCommonsvc.exe 91 PID 2788 wrote to memory of 2300 2788 DllCommonsvc.exe 91 PID 2788 wrote to memory of 2496 2788 DllCommonsvc.exe 93 PID 2788 wrote to memory of 2496 2788 DllCommonsvc.exe 93 PID 2788 wrote to memory of 2496 2788 DllCommonsvc.exe 93 PID 2788 wrote to memory of 2208 2788 DllCommonsvc.exe 94 PID 2788 wrote to memory of 2208 2788 DllCommonsvc.exe 94 PID 2788 wrote to memory of 2208 2788 DllCommonsvc.exe 94 PID 2788 wrote to memory of 1796 2788 DllCommonsvc.exe 95 PID 2788 wrote to memory of 1796 2788 DllCommonsvc.exe 95 PID 2788 wrote to memory of 1796 2788 DllCommonsvc.exe 95 PID 2788 wrote to memory of 2388 2788 DllCommonsvc.exe 96 PID 2788 wrote to memory of 2388 2788 DllCommonsvc.exe 96 PID 2788 wrote to memory of 2388 2788 DllCommonsvc.exe 96 PID 2788 wrote to memory of 2316 2788 DllCommonsvc.exe 97 PID 2788 wrote to memory of 2316 2788 DllCommonsvc.exe 97 PID 2788 wrote to memory of 2316 2788 DllCommonsvc.exe 97 PID 2788 wrote to memory of 2832 2788 DllCommonsvc.exe 101 PID 2788 wrote to memory of 2832 2788 DllCommonsvc.exe 101 PID 2788 wrote to memory of 2832 2788 DllCommonsvc.exe 101 PID 2788 wrote to memory of 2780 2788 DllCommonsvc.exe 106 PID 2788 wrote to memory of 2780 2788 DllCommonsvc.exe 106 PID 2788 wrote to memory of 2780 2788 DllCommonsvc.exe 106 PID 2788 wrote to memory of 2696 2788 DllCommonsvc.exe 108 PID 2788 wrote to memory of 2696 2788 DllCommonsvc.exe 108 PID 2788 wrote to memory of 2696 2788 DllCommonsvc.exe 108 PID 2788 wrote to memory of 2704 2788 DllCommonsvc.exe 109 PID 2788 wrote to memory of 2704 2788 DllCommonsvc.exe 109 PID 2788 wrote to memory of 2704 2788 DllCommonsvc.exe 109 PID 2788 wrote to memory of 2088 2788 DllCommonsvc.exe 111 PID 2788 wrote to memory of 2088 2788 DllCommonsvc.exe 111 PID 2788 wrote to memory of 2088 2788 DllCommonsvc.exe 111 PID 2788 wrote to memory of 3032 2788 DllCommonsvc.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1383f92db2661ffb767e50c4ecbffab2f4a958a6651349018e7e73c0f2a73f3c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Panther\setup.exe\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Tasks\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Performance\WinSAT\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Sync Framework\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Migration\WTR\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\RedistList\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kWf52a8ucp.bat"5⤵PID:3032
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2468
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1JZ2DT5CuV.bat"7⤵PID:2156
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2116
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sWs9jrlB8v.bat"9⤵PID:1868
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2520
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ay5NT8uJA6.bat"11⤵PID:2016
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2328
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1hmmkqxEk5.bat"13⤵PID:2272
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2364
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ottjOj3FQt.bat"15⤵PID:2676
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2040
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aoAocY3YSO.bat"17⤵PID:1604
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:1772
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MpmmxgpAh8.bat"19⤵PID:1928
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:496
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CooinIVsng.bat"21⤵PID:1308
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:320
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ezHXLeVHih.bat"23⤵PID:3004
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:2548
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8qIUyQJ4qD.bat"25⤵PID:1016
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:2112
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PX74P8KQcP.bat"27⤵PID:3060
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:3048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Windows\Panther\setup.exe\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\Panther\setup.exe\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Windows\Panther\setup.exe\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\Tasks\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\providercommon\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Windows\Migration\WTR\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Windows\Migration\WTR\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\providercommon\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762497a57f9893b2ae114390be59d9f7
SHA11cfe3238ed9dd5a22c691d7eb9ed6a7a00fa65ef
SHA2564883185eb58fb3c8045fe37cf7f9b4b33b03331fa0bbcc8bfe79bd07d8bd1566
SHA5120968017d8a0dc8f3096702611954e01f0736c06d7fa5df01eca3246573806618d2f61577e245e24e2efecbe4fd4db203eedc5cdfbbe7d9d850e3541929f4dfaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50173982dd50a773192747730138f4cc9
SHA1dfbeb67035501f61c40ddc444f02abc00f5e37b7
SHA256cf96e30f3580a0d93a568ad3c381b34a253d9e7c6c3926d2a806a86ebde5dcfe
SHA51277ef742e2a0b41bf7bcd5543b5b26ef5456093b672d9eea6e261a66ba2bf77c999d8c1042f16aa2042169e26622c640249da68ffe8b51045a5c6070ffd895df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a9733e79bb00b1cbc9990ad12fb643
SHA18d106d0f48bbf9390365c4f6a86048abbbd82d93
SHA25605701e466b4f5f4e269ec8062e8a9af3261bc680140831c257d340c0314e11f1
SHA512bfd424f8b0748bcd82e25c89d00f5159677016de8d45e3751d44d3d60216b85ec57bc9622ff65e70a67efb95a42ff79a89247f7094ab0f5f2fac0f9d0dbb239f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49d6f592ad660573ad50ea353b52c19
SHA108c8f65c4d63c06c1af80b91f8e3ace9f0ee9c0f
SHA256039dadb1de504777bfcdbddef1a2f0b1cd771b710690791f9ef84012984406da
SHA5121ac7d128d40d10207a50c73597e4d7c1fb1b76cf5d88017830999d18610652aa3913b87d748e36365e0c378358af4600a670df02bad7b75b81052ef06bef3737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514028a1b033884cfde5835c7f81bf2d9
SHA1cbbffd581bfd2a5a1ce99ca178718861482b1ed7
SHA256dfd4b448c2e44368b56555d1abc64a83c9adc6c1396b9b89e7df132ef52d6298
SHA512fe2cf34a6a5ea4625fa2fa38b9b2afe5c4c901960877af2159ee4ab746c3242354e2b07b646aa7700c87d185b1a9e78bd755e29adfd8cad8e3b8b8468a625c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5a0a332cd00f3cfcff313756bacd5b
SHA113de96ab41155aa2973e0197087cc81bbec30f61
SHA2568fadb62ff9e4d8142eda93f9a69430b623de759cae13c2ede95528cc9f152b1b
SHA51227de76bb6b9a088f323e7bf0bde313157e0c8b6fd8591325cc75e89c0c86fe5214f97bcf0e7d559b3ff0f0bd96f8a7b95698f85452031413ae70c1bf76e2ef9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b77db67814aa32370c44d35c083c16
SHA1e078e990870065e8cbe88bcb6d4c77147c7949bf
SHA256814b32314d258c3177ba8fec33839494e36456809e291949cea07fb1c075b9a8
SHA5121b454752e2990dca835d573b4d0307770f52b7b855472e1fdae2470ac837ddab66c432808758a29103c09e0dbb749f9d9f942ab950847caf85136503ca8f29bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595127f49510bf84f00ca1c3d42e48a7f
SHA144e2ab26cde5da84b72a5b9231104e1a4629c17e
SHA256411528256923978a1b641306541a41af4243391503e85cb3311b60f578594dd2
SHA512e00983869406a69ac1d46e1c1e0f3955791861de065c32465bfbf9d8069df85b057f05fd81d3b4f8bc6a8b58b06537d96edb45cfae9d70e8d78bb6eb0994c5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d585959b43b30dcbc32dade9b215d37d
SHA10fdee51d87a3f942eea4bef7feca6e878289e511
SHA2566accc24e2de02c09f6e9f409fbf0fe8e9e836ac86537b758fe5b372af33311c7
SHA5127460123c923db8c3d4f79e7d5f5ac21754efdd28cb4833c35ccd8695eb7f062c214c6bf670e1316241c27d698abeab4baba9d9c590e4efae420948709143a527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58625b3af7c17e2cea759c2cb299726ae
SHA1e359171ee21fe6573925e4cf21c18079a71ff14d
SHA2564f3a221aebe1357647ab7270bf307521dba6d6410b54e0484e16a28a0e1dd282
SHA512d81125e4dc23cd75d98150f4ac6f908299115bc38f607d01b63b660f03dcf2dc64fa476ef9a81d0d72841a8447e1fa815ce42f2791e05cc14a65f235dfd6ce91
-
Filesize
249B
MD570b0f773d9ae1c49fdc72a1ce5fdbe78
SHA1c28416cf0a8cb7bfd00fc816608dc3a8f46b4f39
SHA2565ef73b96b98f91fdb270ef09deb6adc303e4557e5431d54681d349b4cb74b686
SHA512c1dff4eacc7f07b2f08dd0f933d1569638b7c32d5be39c27b88e51f7b87c7a993a8cfafa91f39aaea47ae9ddfdac77411ae473d7aafb9678e2e079eed72375d1
-
Filesize
249B
MD526f7f4180ac592a01b41fa9bf7cadeb7
SHA14de69e1511aa1488e7cd00551d19a2ebf19cced4
SHA256d720164a9c9e194e2b80342f862bdc3b1a1defe41729293d399e9593129951c1
SHA51223c5028f69621e021176d5eeaf842647e1225ce438f7d17ed45b8e95c1fe838f914bde7de4987949347b17ea27067c177c7a0ed0eb8c31a4f34829fbfa016217
-
Filesize
249B
MD53ab6918dcf660222eb5de9c35bab9ad3
SHA10018e78a146b596232de1483bedafc11aa6f4e76
SHA256aa6a312888de2e236afac88c00ff36c7127803640d7db2f92771b70b413664b1
SHA5120a2d63bbf6e541aaae7de77f8527be75a86c6900a9abe9131f81f7b96a7560c0cf885a69900df48100006e04c3262b1d20be052ae6cab2f7fc56e96f2db3c9d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
249B
MD54b031976dd6fa0a10b03b2885d0811a5
SHA13d93d5c4eb90b9a1c81dced975152039bfca4cd7
SHA2567b674163850746fd807428b20b8eabd07ca5c8875e59326c3fe10077a3a97939
SHA51223aa7110119aeb0bcc889601f066841c5f6064392dc4133fa96ee39520c0a00f24defad5c36fd4048213e7ff8b7c5df6bb23e965387bfcee6ffa3a7bf86f46c8
-
Filesize
249B
MD5d674f9a7af17f52620fe74dc42607a61
SHA10f51f220adc0ad81a6c5684a02ab3561c58ee554
SHA25624ccd3bd39f2c6ebbcec0ffa40906b08fe7d99a1ccf6f5f602027cf36b9ca375
SHA5128be5bfdd0b90c500040ccaa24a0252498e8a7a7d01a22dddebc6f1d74ebf84bf9af875cf3b2e25ee7fdcfe5bce6ef84ee015ee9e72d545d30421f8af137d69b9
-
Filesize
249B
MD59bab2aed126aa3cad9b46fc7f450392e
SHA18a13e4b3df25a66498d952b591f8ce6a9d6d6e8f
SHA2569b62566b93db630e307f983690d629693f21c4f24163a9cd1d44bed662f1eb7b
SHA5120b7c98093f32336ed6989cfdced7c202ef2cccbd881d3d25609fa3eb12088e9739aad4802c2f1ccd16e22cbc3b6b8834424a87643a32899d1c15e379f0cd8bc4
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
249B
MD575e2d47db727e4c346161f76c697162b
SHA114119fa165c22e8c069daf0300d36a236bcac687
SHA2566f289454878961e76b779df375d2d4670957bda22bf871ba3b5cce5d0127eecc
SHA512e5a94e0a6d0356426e3605a0a75f4547859c3f81a1c164057319a510e7c4008e3ea0a3e26398879d8ef74fc14283eb14fc19ab5bf91aa898e84263f347f51ed8
-
Filesize
249B
MD543a655333b82e3a3de261073bf4e1866
SHA1c1efa24728b00d072e781134ff83fa0bb962794c
SHA2562baa7178221fce336963d0eefad8c52d9afe9e5aae2f5a749c954f6cfd2655ca
SHA51220248b77ecb5b138a4ab0553b7db117df0496184b55a2bceb045e682b3a32bbdd10d2136f79aefe0d410684dfd2983fdbb37c3d1676dc7a6948c038e78cff718
-
Filesize
249B
MD53b53dad84a1e1499d95ff5863e44c8ef
SHA1c9e7810965c75d881232e12cd22efe57c3af0be6
SHA256bd78d33f2712426f5a0da4d7013c740cd9e5fc3a5a664a659edf0947c38efb84
SHA512fb24af5c7706ec3d980482a29d78d7dd41240db8f12608d268ad884367854494ed1ca97343a72ec204d637b95bded1e4ae92cc1a9298bbc2f02966f74eb4df9e
-
Filesize
249B
MD5a996d44e231d65b7ffb15b854c93dcd1
SHA1709c7586bf21778603fa15607c6381fda193515e
SHA256c74bd9e22af20d2d2c229d316f22afafdb530ded26a61cad7745c77d6873223d
SHA512cbe2eada9ae09039d08f646ddb961ae46e6c6207e0f2f7998da6709aacd28733c4d53e70b95a1730a9388f683cef09fa3c59bc96a17c44ee1d0b87effa38d395
-
Filesize
249B
MD5533d22b8bf2bb5a3e7cf131838299efd
SHA1522ad64cb73ae1a804f1ac29436855dbf457e8e2
SHA256c21b5764eac22070e57768c8b648a0495942ebbf795bb5af2c3fc501c64f5fe4
SHA512e3e456731d641d47fd5965bb86d6933bb46c2fa24d9f75352fcb1af2c40eefd2c276db300aaa9fd1b679dcb84cfc95552ea39dc6c9cdac6b59ae0984448c3191
-
Filesize
249B
MD55d6280768061632c12585318139fdf88
SHA15ab759cd0df260594baa82891f2613bfe4d8cb2b
SHA2568599414d6d244de1b52b051d84375b2b48ddc58d0314a52ec535f4cc3c364f7b
SHA512b2d2a79c93533a1ed9422e780c5debb331dec9e05f58a0415f93bc04071530fca6c3d2cfb4ff3c7612acc0b325dfcab067fd627826fbf57da3a1801f7e480931
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD585e0cdf8e36bf395121bcc94336ec7f7
SHA11bf040d0c9c4739d66207368895a95e3ecca3f98
SHA2561bf46b89e5a7f796f3f111dd711423f033aff1350037f7fc192e90757378a5dc
SHA5127ffd2dc9c10d1aa6257d9cd0c1862209a06accadeaa560c9c16b3a48c76408246b9aa69618d7feb940bf949b6ce430440179e6bf2ae079c8a514390d0410ce95
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478