Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 05:19
Behavioral task
behavioral1
Sample
JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe
-
Size
1.3MB
-
MD5
9ebab62da0ffa3c78edad50206d5857b
-
SHA1
37bcb7feda93d000273e9f5d03f5e2df3e6e3806
-
SHA256
81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f
-
SHA512
776a11149fcfcdba2975a43c1f471a16cdea105543666ad30f97a22726b51577a7aec834d7527530fe4302ff8f8c622c35f461a289ebc2178e5064471d646cab
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2704 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 276 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 288 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 480 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1356 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 988 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1572 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 780 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 948 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 2292 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 2292 schtasks.exe 32 -
resource yara_rule behavioral1/files/0x0008000000015d87-9.dat dcrat behavioral1/memory/2388-13-0x0000000000EA0000-0x0000000000FB0000-memory.dmp dcrat behavioral1/memory/1800-60-0x0000000001070000-0x0000000001180000-memory.dmp dcrat behavioral1/memory/280-512-0x00000000012F0000-0x0000000001400000-memory.dmp dcrat behavioral1/memory/2436-691-0x0000000001390000-0x00000000014A0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2260 powershell.exe 2680 powershell.exe 2588 powershell.exe 3052 powershell.exe 2232 powershell.exe 1292 powershell.exe 1300 powershell.exe 2088 powershell.exe 2192 powershell.exe 2304 powershell.exe 2044 powershell.exe 2284 powershell.exe 2368 powershell.exe 2732 powershell.exe 2288 powershell.exe 2392 powershell.exe 2840 powershell.exe 2264 powershell.exe 1236 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2388 DllCommonsvc.exe 1800 taskhost.exe 2960 taskhost.exe 2996 taskhost.exe 2692 taskhost.exe 1420 taskhost.exe 2376 taskhost.exe 280 taskhost.exe 2692 taskhost.exe 1896 taskhost.exe 2436 taskhost.exe 1888 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 cmd.exe 1996 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 9 raw.githubusercontent.com 17 raw.githubusercontent.com 35 raw.githubusercontent.com 31 raw.githubusercontent.com 38 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 13 raw.githubusercontent.com 21 raw.githubusercontent.com 24 raw.githubusercontent.com 27 raw.githubusercontent.com 41 raw.githubusercontent.com -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\smss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\69ddcba757bf72 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\spoolsv.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\en-US\b75386f1303e64 DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\winlogon.exe DllCommonsvc.exe File created C:\Program Files\Microsoft Games\Minesweeper\ja-JP\smss.exe DllCommonsvc.exe File created C:\Program Files\Microsoft Games\Minesweeper\ja-JP\69ddcba757bf72 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\f3b6ecef712a24 DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\cc11b995f2a76d DllCommonsvc.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\security\templates\5940a34987c991 DllCommonsvc.exe File created C:\Windows\debug\WIA\56085415360792 DllCommonsvc.exe File created C:\Windows\Branding\Basebrd\ja-JP\taskhost.exe DllCommonsvc.exe File created C:\Windows\Branding\Basebrd\ja-JP\b75386f1303e64 DllCommonsvc.exe File created C:\Windows\debug\audiodg.exe DllCommonsvc.exe File created C:\Windows\Offline Web Pages\lsass.exe DllCommonsvc.exe File created C:\Windows\Offline Web Pages\6203df4a6bafc7 DllCommonsvc.exe File created C:\Windows\security\templates\dllhost.exe DllCommonsvc.exe File created C:\Windows\debug\42af1c969fbb7b DllCommonsvc.exe File created C:\Windows\Migration\WTR\sppsvc.exe DllCommonsvc.exe File created C:\Windows\Migration\WTR\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Windows\debug\WIA\wininit.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2336 schtasks.exe 276 schtasks.exe 2212 schtasks.exe 2316 schtasks.exe 1844 schtasks.exe 1492 schtasks.exe 2464 schtasks.exe 2348 schtasks.exe 2220 schtasks.exe 1452 schtasks.exe 288 schtasks.exe 972 schtasks.exe 2772 schtasks.exe 1532 schtasks.exe 1604 schtasks.exe 2452 schtasks.exe 2356 schtasks.exe 2752 schtasks.exe 2880 schtasks.exe 2944 schtasks.exe 2096 schtasks.exe 2612 schtasks.exe 2480 schtasks.exe 2816 schtasks.exe 988 schtasks.exe 1324 schtasks.exe 1564 schtasks.exe 3024 schtasks.exe 2412 schtasks.exe 2512 schtasks.exe 2140 schtasks.exe 1572 schtasks.exe 1480 schtasks.exe 2988 schtasks.exe 1904 schtasks.exe 480 schtasks.exe 2204 schtasks.exe 1668 schtasks.exe 3016 schtasks.exe 1356 schtasks.exe 948 schtasks.exe 2620 schtasks.exe 1596 schtasks.exe 2636 schtasks.exe 2780 schtasks.exe 2924 schtasks.exe 2572 schtasks.exe 2760 schtasks.exe 744 schtasks.exe 780 schtasks.exe 1504 schtasks.exe 2704 schtasks.exe 2520 schtasks.exe 1908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2388 DllCommonsvc.exe 2388 DllCommonsvc.exe 2388 DllCommonsvc.exe 2388 DllCommonsvc.exe 2388 DllCommonsvc.exe 2264 powershell.exe 2732 powershell.exe 2232 powershell.exe 2588 powershell.exe 2260 powershell.exe 1236 powershell.exe 2368 powershell.exe 2044 powershell.exe 2392 powershell.exe 2284 powershell.exe 2304 powershell.exe 1292 powershell.exe 2192 powershell.exe 2680 powershell.exe 2288 powershell.exe 1300 powershell.exe 2088 powershell.exe 2840 powershell.exe 3052 powershell.exe 1800 taskhost.exe 2960 taskhost.exe 2996 taskhost.exe 2692 taskhost.exe 1420 taskhost.exe 2376 taskhost.exe 280 taskhost.exe 2692 taskhost.exe 1896 taskhost.exe 2436 taskhost.exe 1888 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2388 DllCommonsvc.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeDebugPrivilege 1800 taskhost.exe Token: SeDebugPrivilege 2192 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 1300 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeDebugPrivilege 2960 taskhost.exe Token: SeDebugPrivilege 2996 taskhost.exe Token: SeDebugPrivilege 2692 taskhost.exe Token: SeDebugPrivilege 1420 taskhost.exe Token: SeDebugPrivilege 2376 taskhost.exe Token: SeDebugPrivilege 280 taskhost.exe Token: SeDebugPrivilege 2692 taskhost.exe Token: SeDebugPrivilege 1896 taskhost.exe Token: SeDebugPrivilege 2436 taskhost.exe Token: SeDebugPrivilege 1888 taskhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2840 2908 JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe 28 PID 2908 wrote to memory of 2840 2908 JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe 28 PID 2908 wrote to memory of 2840 2908 JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe 28 PID 2908 wrote to memory of 2840 2908 JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe 28 PID 2840 wrote to memory of 1996 2840 WScript.exe 29 PID 2840 wrote to memory of 1996 2840 WScript.exe 29 PID 2840 wrote to memory of 1996 2840 WScript.exe 29 PID 2840 wrote to memory of 1996 2840 WScript.exe 29 PID 1996 wrote to memory of 2388 1996 cmd.exe 31 PID 1996 wrote to memory of 2388 1996 cmd.exe 31 PID 1996 wrote to memory of 2388 1996 cmd.exe 31 PID 1996 wrote to memory of 2388 1996 cmd.exe 31 PID 2388 wrote to memory of 2260 2388 DllCommonsvc.exe 87 PID 2388 wrote to memory of 2260 2388 DllCommonsvc.exe 87 PID 2388 wrote to memory of 2260 2388 DllCommonsvc.exe 87 PID 2388 wrote to memory of 2304 2388 DllCommonsvc.exe 88 PID 2388 wrote to memory of 2304 2388 DllCommonsvc.exe 88 PID 2388 wrote to memory of 2304 2388 DllCommonsvc.exe 88 PID 2388 wrote to memory of 1300 2388 DllCommonsvc.exe 89 PID 2388 wrote to memory of 1300 2388 DllCommonsvc.exe 89 PID 2388 wrote to memory of 1300 2388 DllCommonsvc.exe 89 PID 2388 wrote to memory of 2264 2388 DllCommonsvc.exe 90 PID 2388 wrote to memory of 2264 2388 DllCommonsvc.exe 90 PID 2388 wrote to memory of 2264 2388 DllCommonsvc.exe 90 PID 2388 wrote to memory of 1236 2388 DllCommonsvc.exe 91 PID 2388 wrote to memory of 1236 2388 DllCommonsvc.exe 91 PID 2388 wrote to memory of 1236 2388 DllCommonsvc.exe 91 PID 2388 wrote to memory of 2088 2388 DllCommonsvc.exe 92 PID 2388 wrote to memory of 2088 2388 DllCommonsvc.exe 92 PID 2388 wrote to memory of 2088 2388 DllCommonsvc.exe 92 PID 2388 wrote to memory of 2284 2388 DllCommonsvc.exe 93 PID 2388 wrote to memory of 2284 2388 DllCommonsvc.exe 93 PID 2388 wrote to memory of 2284 2388 DllCommonsvc.exe 93 PID 2388 wrote to memory of 2840 2388 DllCommonsvc.exe 94 PID 2388 wrote to memory of 2840 2388 DllCommonsvc.exe 94 PID 2388 wrote to memory of 2840 2388 DllCommonsvc.exe 94 PID 2388 wrote to memory of 2368 2388 DllCommonsvc.exe 95 PID 2388 wrote to memory of 2368 2388 DllCommonsvc.exe 95 PID 2388 wrote to memory of 2368 2388 DllCommonsvc.exe 95 PID 2388 wrote to memory of 2392 2388 DllCommonsvc.exe 96 PID 2388 wrote to memory of 2392 2388 DllCommonsvc.exe 96 PID 2388 wrote to memory of 2392 2388 DllCommonsvc.exe 96 PID 2388 wrote to memory of 2192 2388 DllCommonsvc.exe 97 PID 2388 wrote to memory of 2192 2388 DllCommonsvc.exe 97 PID 2388 wrote to memory of 2192 2388 DllCommonsvc.exe 97 PID 2388 wrote to memory of 1292 2388 DllCommonsvc.exe 98 PID 2388 wrote to memory of 1292 2388 DllCommonsvc.exe 98 PID 2388 wrote to memory of 1292 2388 DllCommonsvc.exe 98 PID 2388 wrote to memory of 2044 2388 DllCommonsvc.exe 99 PID 2388 wrote to memory of 2044 2388 DllCommonsvc.exe 99 PID 2388 wrote to memory of 2044 2388 DllCommonsvc.exe 99 PID 2388 wrote to memory of 2288 2388 DllCommonsvc.exe 100 PID 2388 wrote to memory of 2288 2388 DllCommonsvc.exe 100 PID 2388 wrote to memory of 2288 2388 DllCommonsvc.exe 100 PID 2388 wrote to memory of 2232 2388 DllCommonsvc.exe 101 PID 2388 wrote to memory of 2232 2388 DllCommonsvc.exe 101 PID 2388 wrote to memory of 2232 2388 DllCommonsvc.exe 101 PID 2388 wrote to memory of 3052 2388 DllCommonsvc.exe 102 PID 2388 wrote to memory of 3052 2388 DllCommonsvc.exe 102 PID 2388 wrote to memory of 3052 2388 DllCommonsvc.exe 102 PID 2388 wrote to memory of 2588 2388 DllCommonsvc.exe 103 PID 2388 wrote to memory of 2588 2388 DllCommonsvc.exe 103 PID 2388 wrote to memory of 2588 2388 DllCommonsvc.exe 103 PID 2388 wrote to memory of 2680 2388 DllCommonsvc.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_81ce0f3242d67c25997775948328a047879d718ac8d9e83e55add559bd82ea2f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Migration\WTR\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Offline Web Pages\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\SetupMetrics\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\security\templates\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\debug\WIA\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Games\Minesweeper\ja-JP\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Favorites\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Start Menu\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Branding\Basebrd\ja-JP\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\debug\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X9PDuMdk3a.bat"6⤵PID:2368
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:288
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7FnFm4j3ls.bat"8⤵PID:2956
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2748
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qX4ufk0Q6M.bat"10⤵PID:2628
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2552
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lEFN0vw97k.bat"12⤵PID:1796
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:620
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\t6OOvELCCF.bat"14⤵PID:2968
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:1876
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I4yJNRBzAA.bat"16⤵PID:2340
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2348
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7lFc7N4hi3.bat"18⤵PID:1680
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:1304
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hc9iMPvVJ4.bat"20⤵PID:904
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:3024
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\L59TFxmxil.bat"22⤵PID:1548
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:1992
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\moqrXfpsIj.bat"24⤵PID:1236
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:1616
-
-
C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe"25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tpXWVAFTZv.bat"26⤵PID:2368
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:1748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Windows\Migration\WTR\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Windows\Migration\WTR\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Windows\Offline Web Pages\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\Offline Web Pages\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\security\templates\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\security\templates\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\security\templates\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Windows\debug\WIA\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\debug\WIA\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Windows\debug\WIA\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Games\Minesweeper\ja-JP\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\Minesweeper\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Games\Minesweeper\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Favorites\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Favorites\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Windows\Branding\Basebrd\ja-JP\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Branding\Basebrd\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Windows\Branding\Basebrd\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Windows\debug\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\debug\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\debug\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7985697a4cf13ea5bd83975fa50d98
SHA180c87ca44a9417f88e9dd0aadbde3b9768fc137b
SHA256a0de614e4640f636467e31850a4d1c9e71317ba8b6939294eb061a04fd3bbeef
SHA512f7ca2bdc7e62470522da21fc078bca6cf60f9e9e3be69892f50aa7bea72069e0a31ccafe9c00751b3317b480632507346e72d190430ed9fea9d275c1077390f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38de48a33be433ac45ab881e88b536e
SHA195740e4b1fb4ded651ab426dd796ad87e17bddcb
SHA25624dfad0773179eedbf7c1ac07e75c26cf2479fc8c5a950f496664d46e613f71e
SHA5127e49a7dc6c421ba0b6df2bcfa839bad2ca0b98ade26228e802dbe89bcf79362a7de9747f6bbfb763b5eeacca7d1e995dc8dc8dcb2660245ae77e3eed347b65f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315ac60dfac59864310a6465103ee077
SHA168db737ecd0dc2dcdc09602c000cce301a3f374b
SHA2564b0dd26df05702edf2c9695a5ccc1ca0d5c0cc2c7691a3130ccc170f278be873
SHA512eedb8244bf8b1d9620ecaacad0fcb4776e73ea2da28421f0e90ec126aa70f873ae2de49ba2afb79a2112d5533764ca857e0814c68a3c45870826cc7a2bf0a88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd87f17b16cdfed0e959a1893bdb8662
SHA12f440b4a34e55516dee1dfab3d8647f79a249b66
SHA256f66b9092b88a80fdf8b64778edba565064e67843bcd13ebbb3489ca0dd4c5586
SHA5127d5d2108fc2c989754b9f8c9d58ab78e24e3c4a70687b34121fbf2ab4a91dfce6128dbcbc9716fac5723a6d140fca9ba2d0abe375822636d6670b39a463eb6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d2029248b3e82eb278fab35277570a
SHA1bf3272d64525c28f8ba1f1e3bda5cca58da18f8e
SHA25655edef5f40f892f3e463751541f05e3a2f9850abdffda5bf963973724a316741
SHA512fabcaee5f5ad63756754b91c4512d5a3e53e8c1c07102014e58575d55d02f22f5d4e0b8a9de9edfb8d536ead0b2dee0cba6eedf8f0751d96e508298b332cf214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc9589c35456af0edbf2625227300f5
SHA1b8e2affd0f1dbc945321d4370f15d334e2512b00
SHA256575c4e41941a062d1f0a2e59616cfa13c8110ab57c42c9664f29705e536ddf5e
SHA5126e45cb0ba4c18e634d4a40452ee09d42d6a52682d18c7e25eea3d7965438c5d30ceb4457a0543f7f4bc6ed0a3e94fc560f08403c7c801a21aaffffde444150a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f5cc8034e04151054df660ce2e1a71
SHA17bd33a6454948b007376487688d2aa5ed57e05bf
SHA256b888d3c6ff3c6484773f74aa827d638569bbf95a8e841c85f30f02266137d910
SHA512174c3b04ef520e36294b9c21710d10304538d080343dd239ee6f46b394789d59ad295d3b156008dc229e6136de8e9a4342160c1ad64e439391af7485af93650f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def1d0acd304d3d850176a2424a0b59e
SHA1d215b686e478edfd34f8a79846f7f862a5ff448f
SHA2562c7bd247ca36584db3da282517158504ffd15153a86003fd0995dbdf4fba10c6
SHA51226a7b2f67efd9eeb096cbb5b179558fea190cd815128d1256103bd3d69681b46493604f3efae65a4054f0c8fd9a8bc7a8fcc9089f27ab083ed52695ad1ee0902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc80372960acba6e92918edc641f38e4
SHA1e1e3d29c2417ca365d9fb31051b259c606a4889d
SHA25664bca977048be31194ce1f5cccbeb21090966b0087b9d8a9d17ad1376d9887f2
SHA512dbe3fee46871de5ba7f8e4e9d8f7ba9697dc248370e76b852794c46335ed16790ffdbc407c16706cc89f345b6fc9229a216f01028e4d4bf0b5b3ae032bc3362f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506945e13216db5e337d67c13f99bbdc1
SHA19edd10fadf36f8636b3e107e99638edf0c085aec
SHA2566517de46151eff5fd21b078321d7d733efa75ca94638e35e28b96c73acee5716
SHA5125763361c0c910ad135e2cf9eaee1b5903d1d329f1b7dfa7b31229536b8e8dc41034009153cc4f5a33000bf4d3eb5e79b41de449cae0499a1a5f5cf67e19b0aa6
-
Filesize
224B
MD51d0d558bdc7706aef3307ea2e5bfbbbd
SHA15e58be652eec7175225db7a63b032db0a83409e6
SHA2561d9c5c59c65cb2e91ec0a5a270450ec72dcd9992233cc07d8e8ffc71551d5054
SHA512362f1bdd6201e1cec17104d87789dec1cc5fe73cd65eace72dbc387edee8b22d04041f1b73c9316a771810c3d60be84d7ea49946443b23c248298fec9b7f7282
-
Filesize
224B
MD52a33aa3352f3544269502d53b0b8ba47
SHA10d7ec8283523dad372b62cef7bc2c37fe7702220
SHA256cdd4e8702f4426443532a5e3d0238e33925ab4c00936b114621d9c0eb1e64665
SHA512f77ccb9a7f86673a966ce312247b86dc7d00cbf16348356c5fc8106cbd9eb7165451b75b15d48ef22bbf04c8d53d17e6c13f96e14ed8894b25c1d5dc07e59d5f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
224B
MD51791421443428adbd983eb0afa8eb962
SHA1355153186c987a4279e9d6632b3ded18c2f2001e
SHA25612e0fad73acfcf893fb48af41076fce171e9159b7c535d755cdb6bdac04855c2
SHA51243dc759c142561ad2da93557ba3eff09a29959ed3f54d39189552a20b7bdbccc875aa0d0e8f30a778bbc0e160156141ae77801ba22e3d32328356fa092bf2eb7
-
Filesize
224B
MD5f62b83bc780f2f199ab04426aa5bb01d
SHA112649cdb7e24e85f95150047cadd21e678ffa95f
SHA25626924859a1c3ca869393525a74f15d10d7aa0be19c17a629ce92f7e613071b8a
SHA512d08566832aeb72d944ca7644a187d36385d9d03f2c6d6123d370bf6e9f48228bc7d49a24fe0e1a856e67c30954f83a2c56dda1633bc2570714fa8dbf3f49dbd0
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
224B
MD5c2a13b95c50aefec0a89c9933a987a0f
SHA1bd6f69d61c9c57b5ff8304c24cacf648d3cb9e15
SHA25641d300b348aa3b97b5d72e7a8de6c3d184819f5dcf25c2ad9c359f9515a92e68
SHA51202bc7f1f3a3544a64b879ad120bc2e963feda6259ff0bdcdd9e04472a6245912094daf74c84f5a64cd2c8aea63b82ec7ef39e1f2764ece037671f8e6f08071c2
-
Filesize
224B
MD5be09e9460ed0d28e9ef0442a5bd0db95
SHA19778dbd55c781af92228df7fe1fde36a9304d089
SHA256a312223b3499d60b147b1e5ed603cd8ecc3899998a5c9d9a2660db4dfb8b0826
SHA512859838941e486b827024fced4f23d0dc011daae303b1a49778490b655d41833747a2d17d3d698fd1187c8ccb8869785295331c692c0861c1aba5260ba655928d
-
Filesize
224B
MD57b34f7231bceeb93ad3a8324d9306d06
SHA14aceb98905802adb9e8b276240d24f2c309cd331
SHA25687db96b830ef522313027d305852a021a6c5994171d5c6a7cf8170f6bf51dfda
SHA512b5d86e25943b45929bd69ae16870976fbeee5d4bcdb3b37afb81a7fab93b0c56d4522f11aa569568a900992e442f06837f8edfa0b1d88f9cbe3c3ae02f7eb031
-
Filesize
224B
MD5454da7a59e069dea5f9b187d7b213080
SHA1717204162a5bf736d1eda2b27909b69e18ce2a4d
SHA25691be367a437c400147835947fcd994d1f799264f41c7b68f868269ba9b5b30ec
SHA512c9292118cb3992cf5c54bc2e0d201bd3eba03446ba8ac390677d734776bf5347033656f6bdb549bd6e7445238685aca67ee55d11464a76639bfd1f72b1088708
-
Filesize
224B
MD5a1400c06c576746600f5b049903023e2
SHA1e7224e10db8334343659b34939d81be1db938fec
SHA256efecded11e044c35f460707e647d4ee4aaaa99af1c5ca735bc03692cb1fbe85b
SHA51277c244f54a0dda593ad5e14840dc25fd195e5cd7aafa5fa3ef97c71ac4e4936838b44efac3317b61f56ad5dc487b899b92fb95c948fa63f867a03c1e50ab8996
-
Filesize
224B
MD57c58aa44436977f5370a7158ddc08ed6
SHA1d2ea41e04e923568e960587c01b936a2e2c12db2
SHA2564473cf6414459783f854e11918c9269c825c34fd7765f6e2432518c858b0ce4a
SHA5129385607df25b95f5b31bbce52a4a81168a353c78729367d7966a56669729e9fef7a689887c26ea5a300defecdfc27f4bb43e431fae1d1090a8d3541c52199546
-
Filesize
224B
MD5b6532e416e50a9e0c03320ac1a79083d
SHA145ef8983e18374daf21c15bdd33da147061cab50
SHA256becf5fd7e1ff3acd0c275d7f95184ab031a492901d25a824fb007c45e5ffce87
SHA512bc05b386ad0c11859f94623ee5a92122d17480321bf5a81463d4454f1dd6782e043fdfead7b883d44320439fb8c01cb958358c38f6bd85b1b04395bea824a17a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD578401c2445134cae118737942217b6e7
SHA19ae5d88fc92d40c1c7286633c33e59f07c694dff
SHA2560deed219bc8cbc96b98e58497d146445ffb2e0ca1fba8a7c39c04c403cdc6a0a
SHA512677d72c36d6b7de409acf5a2020c727c0f20df5ea3f3f488f43b529461151d12916f3e03804186875a7b0796a1eee00c1f98cd765f4ed48388c8d0014d08bac1
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394