Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 06:19
Behavioral task
behavioral1
Sample
JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe
-
Size
1.3MB
-
MD5
4c1c3ff3d9b065d0bd43ae34c4e00378
-
SHA1
2293feb138ad72454f6e5f61a33456273aca7f4b
-
SHA256
ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902
-
SHA512
5208f29d3c466d06907e3f6125f7b7534bfb06d0a17bf7ef43266e6dcd52c9588bb690906868181026bf3057164363fb087d530d5ecfbc9683828b39db3e7838
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3456 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3616 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3740 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3632 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3828 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3892 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3112 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4528 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4300 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4436 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 948 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4804 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1572 4304 schtasks.exe 89 -
resource yara_rule behavioral2/files/0x0007000000023c89-9.dat dcrat behavioral2/memory/4180-13-0x00000000004A0000-0x00000000005B0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4676 powershell.exe 3116 powershell.exe 4692 powershell.exe 4724 powershell.exe 3796 powershell.exe 736 powershell.exe 720 powershell.exe 2060 powershell.exe 3960 powershell.exe 2812 powershell.exe 440 powershell.exe 2968 powershell.exe 1060 powershell.exe 5116 powershell.exe 5080 powershell.exe 3384 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation TextInputHost.exe -
Executes dropped EXE 13 IoCs
pid Process 4180 DllCommonsvc.exe 4208 TextInputHost.exe 4392 TextInputHost.exe 4980 TextInputHost.exe 5080 TextInputHost.exe 916 TextInputHost.exe 4592 TextInputHost.exe 3008 TextInputHost.exe 4664 TextInputHost.exe 4436 TextInputHost.exe 1468 TextInputHost.exe 2312 TextInputHost.exe 2584 TextInputHost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 19 raw.githubusercontent.com 38 raw.githubusercontent.com 42 raw.githubusercontent.com 46 raw.githubusercontent.com 18 raw.githubusercontent.com 35 raw.githubusercontent.com 37 raw.githubusercontent.com 41 raw.githubusercontent.com 47 raw.githubusercontent.com 48 raw.githubusercontent.com 49 raw.githubusercontent.com 50 raw.githubusercontent.com 51 raw.githubusercontent.com -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\22eafd247d37c3 DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\9e8d7a4ca61bd9 DllCommonsvc.exe File created C:\Program Files (x86)\Google\Update\Install\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\Windows Media Player\TextInputHost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\Update\Install\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\9e8d7a4ca61bd9 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\9e8d7a4ca61bd9 DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe DllCommonsvc.exe File created C:\Program Files\Windows Multimedia Platform\56085415360792 DllCommonsvc.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\SearchApp.exe DllCommonsvc.exe File created C:\Program Files\Windows Media Player\22eafd247d37c3 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files\Windows Photo Viewer\it-IT\9e8d7a4ca61bd9 DllCommonsvc.exe File created C:\Program Files\Windows Multimedia Platform\wininit.exe DllCommonsvc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\LanguageOverlayCache\services.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings TextInputHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe 3828 schtasks.exe 3112 schtasks.exe 1916 schtasks.exe 1288 schtasks.exe 2208 schtasks.exe 2780 schtasks.exe 948 schtasks.exe 2012 schtasks.exe 3064 schtasks.exe 2536 schtasks.exe 3892 schtasks.exe 4912 schtasks.exe 4436 schtasks.exe 4568 schtasks.exe 2972 schtasks.exe 3740 schtasks.exe 3616 schtasks.exe 2080 schtasks.exe 640 schtasks.exe 4300 schtasks.exe 4728 schtasks.exe 4804 schtasks.exe 3252 schtasks.exe 3456 schtasks.exe 1676 schtasks.exe 1572 schtasks.exe 4424 schtasks.exe 4528 schtasks.exe 1540 schtasks.exe 2960 schtasks.exe 2904 schtasks.exe 952 schtasks.exe 1008 schtasks.exe 2608 schtasks.exe 2268 schtasks.exe 2364 schtasks.exe 1480 schtasks.exe 5032 schtasks.exe 3632 schtasks.exe 1248 schtasks.exe 2144 schtasks.exe 2660 schtasks.exe 1960 schtasks.exe 2368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 4180 DllCommonsvc.exe 720 powershell.exe 720 powershell.exe 720 powershell.exe 2812 powershell.exe 2812 powershell.exe 440 powershell.exe 440 powershell.exe 4692 powershell.exe 4692 powershell.exe 1060 powershell.exe 3116 powershell.exe 1060 powershell.exe 3116 powershell.exe 5116 powershell.exe 5116 powershell.exe 3384 powershell.exe 3384 powershell.exe 736 powershell.exe 736 powershell.exe 2968 powershell.exe 2968 powershell.exe 3960 powershell.exe 3960 powershell.exe 3796 powershell.exe 3796 powershell.exe 4676 powershell.exe 2060 powershell.exe 4676 powershell.exe 2060 powershell.exe 5080 powershell.exe 5080 powershell.exe 4692 powershell.exe 440 powershell.exe 4724 powershell.exe 4724 powershell.exe 3960 powershell.exe 4208 TextInputHost.exe 4208 TextInputHost.exe 3384 powershell.exe 2812 powershell.exe 736 powershell.exe 3116 powershell.exe 1060 powershell.exe 5116 powershell.exe 2968 powershell.exe 3796 powershell.exe 4676 powershell.exe 5080 powershell.exe 2060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 4180 DllCommonsvc.exe Token: SeDebugPrivilege 720 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 3384 powershell.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeDebugPrivilege 4692 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeDebugPrivilege 1060 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 736 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 3960 powershell.exe Token: SeDebugPrivilege 4676 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 5080 powershell.exe Token: SeDebugPrivilege 4208 TextInputHost.exe Token: SeDebugPrivilege 4724 powershell.exe Token: SeDebugPrivilege 4392 TextInputHost.exe Token: SeDebugPrivilege 4980 TextInputHost.exe Token: SeDebugPrivilege 5080 TextInputHost.exe Token: SeDebugPrivilege 916 TextInputHost.exe Token: SeDebugPrivilege 4592 TextInputHost.exe Token: SeDebugPrivilege 3008 TextInputHost.exe Token: SeDebugPrivilege 4664 TextInputHost.exe Token: SeDebugPrivilege 4436 TextInputHost.exe Token: SeDebugPrivilege 1468 TextInputHost.exe Token: SeDebugPrivilege 2312 TextInputHost.exe Token: SeDebugPrivilege 2584 TextInputHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2704 wrote to memory of 4012 2704 JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe 85 PID 2704 wrote to memory of 4012 2704 JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe 85 PID 2704 wrote to memory of 4012 2704 JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe 85 PID 4012 wrote to memory of 2436 4012 WScript.exe 86 PID 4012 wrote to memory of 2436 4012 WScript.exe 86 PID 4012 wrote to memory of 2436 4012 WScript.exe 86 PID 2436 wrote to memory of 4180 2436 cmd.exe 88 PID 2436 wrote to memory of 4180 2436 cmd.exe 88 PID 4180 wrote to memory of 4724 4180 DllCommonsvc.exe 138 PID 4180 wrote to memory of 4724 4180 DllCommonsvc.exe 138 PID 4180 wrote to memory of 720 4180 DllCommonsvc.exe 139 PID 4180 wrote to memory of 720 4180 DllCommonsvc.exe 139 PID 4180 wrote to memory of 3384 4180 DllCommonsvc.exe 140 PID 4180 wrote to memory of 3384 4180 DllCommonsvc.exe 140 PID 4180 wrote to memory of 4692 4180 DllCommonsvc.exe 141 PID 4180 wrote to memory of 4692 4180 DllCommonsvc.exe 141 PID 4180 wrote to memory of 2060 4180 DllCommonsvc.exe 142 PID 4180 wrote to memory of 2060 4180 DllCommonsvc.exe 142 PID 4180 wrote to memory of 1060 4180 DllCommonsvc.exe 143 PID 4180 wrote to memory of 1060 4180 DllCommonsvc.exe 143 PID 4180 wrote to memory of 3116 4180 DllCommonsvc.exe 144 PID 4180 wrote to memory of 3116 4180 DllCommonsvc.exe 144 PID 4180 wrote to memory of 2968 4180 DllCommonsvc.exe 146 PID 4180 wrote to memory of 2968 4180 DllCommonsvc.exe 146 PID 4180 wrote to memory of 440 4180 DllCommonsvc.exe 148 PID 4180 wrote to memory of 440 4180 DllCommonsvc.exe 148 PID 4180 wrote to memory of 5080 4180 DllCommonsvc.exe 149 PID 4180 wrote to memory of 5080 4180 DllCommonsvc.exe 149 PID 4180 wrote to memory of 2812 4180 DllCommonsvc.exe 150 PID 4180 wrote to memory of 2812 4180 DllCommonsvc.exe 150 PID 4180 wrote to memory of 5116 4180 DllCommonsvc.exe 151 PID 4180 wrote to memory of 5116 4180 DllCommonsvc.exe 151 PID 4180 wrote to memory of 736 4180 DllCommonsvc.exe 152 PID 4180 wrote to memory of 736 4180 DllCommonsvc.exe 152 PID 4180 wrote to memory of 3796 4180 DllCommonsvc.exe 153 PID 4180 wrote to memory of 3796 4180 DllCommonsvc.exe 153 PID 4180 wrote to memory of 4676 4180 DllCommonsvc.exe 154 PID 4180 wrote to memory of 4676 4180 DllCommonsvc.exe 154 PID 4180 wrote to memory of 3960 4180 DllCommonsvc.exe 155 PID 4180 wrote to memory of 3960 4180 DllCommonsvc.exe 155 PID 4180 wrote to memory of 4208 4180 DllCommonsvc.exe 169 PID 4180 wrote to memory of 4208 4180 DllCommonsvc.exe 169 PID 4208 wrote to memory of 1640 4208 TextInputHost.exe 181 PID 4208 wrote to memory of 1640 4208 TextInputHost.exe 181 PID 1640 wrote to memory of 3184 1640 cmd.exe 183 PID 1640 wrote to memory of 3184 1640 cmd.exe 183 PID 1640 wrote to memory of 4392 1640 cmd.exe 185 PID 1640 wrote to memory of 4392 1640 cmd.exe 185 PID 4392 wrote to memory of 4500 4392 TextInputHost.exe 190 PID 4392 wrote to memory of 4500 4392 TextInputHost.exe 190 PID 4500 wrote to memory of 4860 4500 cmd.exe 192 PID 4500 wrote to memory of 4860 4500 cmd.exe 192 PID 4500 wrote to memory of 4980 4500 cmd.exe 194 PID 4500 wrote to memory of 4980 4500 cmd.exe 194 PID 4980 wrote to memory of 2968 4980 TextInputHost.exe 196 PID 4980 wrote to memory of 2968 4980 TextInputHost.exe 196 PID 2968 wrote to memory of 4436 2968 cmd.exe 198 PID 2968 wrote to memory of 4436 2968 cmd.exe 198 PID 2968 wrote to memory of 5080 2968 cmd.exe 200 PID 2968 wrote to memory of 5080 2968 cmd.exe 200 PID 5080 wrote to memory of 2208 5080 TextInputHost.exe 202 PID 5080 wrote to memory of 2208 5080 TextInputHost.exe 202 PID 2208 wrote to memory of 2416 2208 cmd.exe 204 PID 2208 wrote to memory of 2416 2208 cmd.exe 204 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ddabab58595d93a3defd6d065ebe6e4dcf870d1d32dd0bb8ea11d30bb4bdd902.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\SppExtComObj.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Favorites\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Multimedia Platform\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\Install\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0SbqORFfit.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3184
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LIqDUaLb8G.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:4860
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X8VSEkwS9E.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:4436
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JFTIgCVObE.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2416
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2XkxZsmkwh.bat"14⤵PID:4348
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:3900
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4592 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OyPKZ08zKl.bat"16⤵PID:3036
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:3796
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ph6jqiBtuj.bat"18⤵PID:4460
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2536
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3jGxsc69Nm.bat"20⤵PID:3828
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2008
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kyAhxuXJBD.bat"22⤵PID:1788
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:3596
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rd8mWnFnEV.bat"24⤵PID:2256
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:1428
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YzNOjOTGFC.bat"26⤵PID:3332
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:2592
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\avPRQTW9Zy.bat"28⤵PID:2644
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:5108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\providercommon\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\providercommon\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\providercommon\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\providercommon\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Favorites\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Favorites\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Multimedia Platform\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Multimedia Platform\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Update\Install\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Install\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Update\Install\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\providercommon\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\providercommon\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\providercommon\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
250B
MD5c9b03e1dc710682c79abbd0200a3ef97
SHA120fb3286d1969f1f021d80816c217cb5f2193125
SHA2565133f25f86bc0083e9a9c7d850a387e06591138dcf3645adef4583399547d1a3
SHA5120d8538ae145fd173af44e399daf870ef2ecb9287061eb82c72173edc1596367967018d8b8c2a5d1c9d78fb7dbdf40fc2d9d2c24167d31ebf17f06e53464bf584
-
Filesize
250B
MD5e71f5a0c8ce2ee6ae4e45d372db8aac4
SHA1ca15a2f49409229124a2506396058f1639f3ac9c
SHA2561d1fadd689db274578903f82c86a25b23feb645a59694fbf8e47e7e8cb2223da
SHA512d5bbb547f70ab6c50400c2aed3662a623f13135af9de9c76ea2ce843af7f7c9183e5c0f985aabfb9e367a19e0642805a023955efc5a4662f1e0a4d94ea7035f4
-
Filesize
250B
MD50b9ce03599246ef96d3ec95089d978b8
SHA1bb36349d81f0c33f703c707af212cfc8d7c62f1f
SHA256bcfd6e313135e14eda110c26632625f1a96ffe4c8b470f3f85425acf4ceb9cba
SHA5122604ccf10ca2eda9f7cd3108165509066a2633aab21560e6b49a8dddec20be483701adf7d963e3676e21bbf6cc7ce1665b4b35b9ee37f936ff99ebb8b663c8bc
-
Filesize
250B
MD5d0c016f65b3e63748d692de026bf7108
SHA1e4f1a803b1da24045dbfee9bf7e76c594b92220a
SHA2564e1aa99c67ae79784c9c3f702ac57a9fa1a40c73c706bb4f002fe2149bc86f2a
SHA5123b1fbef121f19798725fa0aa3c55cc366d3aca92ee4108406297a15205f32ddf7d783cc5ada0f98dfd9f56ceee94bb2502c0fa41cdd0c08b288b3295f80f4367
-
Filesize
250B
MD582d538292853fa55ccd4fb2589958c70
SHA12ea1ee82ee8a9171ce287a4aa780839ca29c321d
SHA2560e21972c8a75006a6c2372cc971b0b80e9f49946373c37019a08311a5f98da39
SHA5128b25643e2bb5b17a3ced059e727ec41c9ccb7ab6606df04efcc5ff6538a91ac0c1110eb3f655c93a9fd73b4d0c423ef8c0213cf2ad616aef213fcc24d09d4545
-
Filesize
250B
MD511a6022f2d60add3f4cc022e180925bb
SHA13f5970162a003c3a7c351e19aa17465097a1edcc
SHA256d1cf288d31a0c2dd3fd5889e4722e594614bba2a9a68f033180e7fe6f9ea51ff
SHA5129809f93080f12066d1ef9833978a477d3f2ebb274ac059a7a6bdb62d90c9d5b83187e43ea5bc71895811a48dcf2239cbb541a373f4a754fcfb9b4e120d70a8d4
-
Filesize
250B
MD5629959cc23db64799032e29bbfd31a10
SHA157526882b1ebeb028fb4f814aaa2212cb8352e64
SHA256a932a97823d2ca3f2b2876a92a2e4072ba06f6e2d0e243f4ab6aeea84741a286
SHA512c37b882979ef8ba1f07ffe999eb77ba0f1b9114ac4e0752fb8ebcbb6ab82fcb73dbc830c0e279b29b10c6f3ae271a99bcc888ec5d5d5e6a881030098dc5a5f21
-
Filesize
250B
MD511c45f4ed1f257a3474561793b8c88e2
SHA1f42f6b0aeb620d642aeeb9e70fd4bc62770a64cb
SHA256f4bd96495b95f3378d85a9c106dce726d974cf7debc84a98c843f451e96015e1
SHA512d5abf5735f1afe2a203db098106f3514e734e9cd4bd2a8a563dd95ddd30408d0fecb200473b2c60e0a2230b37d9c7ec62b17ca0990e044ce4d267005a8aee0e9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
250B
MD59c32ca9ab74962a8399adcb920cc32f2
SHA1ad2787d7b229dc1d0391131eaaf7edbee52893d4
SHA256c9fa9c9776f47238f6546ab37fed55fe25abb070172f528e7e4677ef7251f388
SHA512a9865f25ff7038f2153944e1ac25356e8da6f74b36142de7387ea9a352baa1d7e95f2362fa57092a825bed5fb938c8699ea8e32897112ee7c7fdb72008bbaf71
-
Filesize
250B
MD5bd023018b57a725a6f3b419851cf0810
SHA115d58f2efeda6d617fb80b0eff6c680ad5af6729
SHA256ff8c39a48a1066ce558ac11651738769b30c2a48711ccc0453f8aab83febcee7
SHA51252181598a94119a639cc58e7847adb98e16cdf8083eea0bc0d684e96d9199d03b3639d0b0d98fcfab8023a5a6365b620e97f58bcf807e54ba245334f0e422b6f
-
Filesize
250B
MD50ac08171f0d2e5eb0b1b886e726a897e
SHA1160def475019787357da655636d91bb92eeca2b1
SHA256de0d41119cb01ee6b008318ab28edcfe1435b8a2a9458cb2d4453507ba4d571a
SHA512d81c0ae142b3445c0edf529ebfd348a294740047379a506fd8cbc283a7eda17d7b696922e3db792747be813be917848fd7f7c9215ef6a4acf96b3a89a6c0ac75
-
Filesize
250B
MD5def75a75f3766474e4b3afa9704f0853
SHA1599d0404e856ba791053c497cb5a52a2fa3e36ce
SHA256149dd71c3b43acdcb036a3025fce590af184c520528b8ab1bca3833709ad0c12
SHA5128ca1165283703f77721afd8d767d28af80b59a894f34be92736f5247be7f03cdebe40082927b4a8d8671e9615ee357556759ce9f8022d3ddb3aa8f3fa10392de
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478