Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 06:08
Behavioral task
behavioral1
Sample
JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe
-
Size
1.3MB
-
MD5
909e4d9c469f768c67cbd955bf3a9bbd
-
SHA1
751ce64503b9d2d345ab82d7e939602aeb833b5e
-
SHA256
149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5
-
SHA512
b1cca4617c564c5490a0e57b60b33f3e9e13070d242bb402ff24e31a2bffa9107e9f58826fb7ae4409af37044cfd508070e697c0293ac46c1f6bd17409ea3aaa
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4952 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3788 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3956 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4840 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3228 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 552 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4668 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4796 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3524 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3420 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5016 4012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3580 4012 schtasks.exe 91 -
resource yara_rule behavioral2/files/0x000a000000023b74-10.dat dcrat behavioral2/memory/3904-13-0x00000000006A0000-0x00000000007B0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1028 powershell.exe 1232 powershell.exe 4408 powershell.exe 532 powershell.exe 1104 powershell.exe 3336 powershell.exe 3548 powershell.exe 2912 powershell.exe 3632 powershell.exe 1496 powershell.exe 940 powershell.exe 2760 powershell.exe -
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation TextInputHost.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 15 IoCs
pid Process 3904 DllCommonsvc.exe 3232 TextInputHost.exe 1212 TextInputHost.exe 4852 TextInputHost.exe 3688 TextInputHost.exe 4296 TextInputHost.exe 2616 TextInputHost.exe 380 TextInputHost.exe 4980 TextInputHost.exe 1884 TextInputHost.exe 1840 TextInputHost.exe 2292 TextInputHost.exe 400 TextInputHost.exe 4724 TextInputHost.exe 5028 TextInputHost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 26 raw.githubusercontent.com 42 raw.githubusercontent.com 49 raw.githubusercontent.com 59 raw.githubusercontent.com 19 raw.githubusercontent.com 41 raw.githubusercontent.com 57 raw.githubusercontent.com 18 raw.githubusercontent.com 43 raw.githubusercontent.com 48 raw.githubusercontent.com 58 raw.githubusercontent.com 27 raw.githubusercontent.com 47 raw.githubusercontent.com 56 raw.githubusercontent.com 60 raw.githubusercontent.com -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\wininit.exe DllCommonsvc.exe File created C:\Program Files\Windows Photo Viewer\56085415360792 DllCommonsvc.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\taskhostw.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\ea9f0e6c9e2dcd DllCommonsvc.exe File created C:\Program Files\Google\explorer.exe DllCommonsvc.exe File created C:\Program Files\Google\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files (x86)\Google\Temp\WaaSMedicAgent.exe DllCommonsvc.exe File created C:\Program Files (x86)\Google\Temp\c82b8037eab33d DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SKB\LanguageModels\sppsvc.exe DllCommonsvc.exe File created C:\Windows\SKB\LanguageModels\0a1fd5f707cd16 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings TextInputHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3420 schtasks.exe 5016 schtasks.exe 2740 schtasks.exe 2884 schtasks.exe 4052 schtasks.exe 3216 schtasks.exe 4668 schtasks.exe 3464 schtasks.exe 4924 schtasks.exe 4484 schtasks.exe 4540 schtasks.exe 1324 schtasks.exe 4544 schtasks.exe 3580 schtasks.exe 3788 schtasks.exe 1884 schtasks.exe 2324 schtasks.exe 908 schtasks.exe 2104 schtasks.exe 4372 schtasks.exe 3524 schtasks.exe 5000 schtasks.exe 5024 schtasks.exe 3956 schtasks.exe 4840 schtasks.exe 3228 schtasks.exe 4332 schtasks.exe 552 schtasks.exe 4796 schtasks.exe 2628 schtasks.exe 4952 schtasks.exe 2280 schtasks.exe 2416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 3904 DllCommonsvc.exe 2760 powershell.exe 2760 powershell.exe 1232 powershell.exe 1232 powershell.exe 3336 powershell.exe 3336 powershell.exe 1496 powershell.exe 1496 powershell.exe 1028 powershell.exe 1028 powershell.exe 1104 powershell.exe 1104 powershell.exe 532 powershell.exe 532 powershell.exe 940 powershell.exe 940 powershell.exe 3632 powershell.exe 3632 powershell.exe 4408 powershell.exe 4408 powershell.exe 3548 powershell.exe 3548 powershell.exe 2912 powershell.exe 2912 powershell.exe 2760 powershell.exe 3548 powershell.exe 1232 powershell.exe 3232 TextInputHost.exe 3232 TextInputHost.exe 1104 powershell.exe 3336 powershell.exe 3632 powershell.exe 4408 powershell.exe 940 powershell.exe 1028 powershell.exe 1496 powershell.exe 532 powershell.exe 2912 powershell.exe 1212 TextInputHost.exe 4852 TextInputHost.exe 3688 TextInputHost.exe 4296 TextInputHost.exe 2616 TextInputHost.exe 380 TextInputHost.exe 4980 TextInputHost.exe 1884 TextInputHost.exe 1840 TextInputHost.exe 2292 TextInputHost.exe 400 TextInputHost.exe 4724 TextInputHost.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 3904 DllCommonsvc.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 1232 powershell.exe Token: SeDebugPrivilege 3336 powershell.exe Token: SeDebugPrivilege 4408 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 1028 powershell.exe Token: SeDebugPrivilege 1104 powershell.exe Token: SeDebugPrivilege 3548 powershell.exe Token: SeDebugPrivilege 532 powershell.exe Token: SeDebugPrivilege 940 powershell.exe Token: SeDebugPrivilege 3632 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 3232 TextInputHost.exe Token: SeDebugPrivilege 1212 TextInputHost.exe Token: SeDebugPrivilege 4852 TextInputHost.exe Token: SeDebugPrivilege 3688 TextInputHost.exe Token: SeDebugPrivilege 4296 TextInputHost.exe Token: SeDebugPrivilege 2616 TextInputHost.exe Token: SeDebugPrivilege 380 TextInputHost.exe Token: SeDebugPrivilege 4980 TextInputHost.exe Token: SeDebugPrivilege 1884 TextInputHost.exe Token: SeDebugPrivilege 1840 TextInputHost.exe Token: SeDebugPrivilege 2292 TextInputHost.exe Token: SeDebugPrivilege 400 TextInputHost.exe Token: SeDebugPrivilege 4724 TextInputHost.exe Token: SeDebugPrivilege 5028 TextInputHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1204 1472 JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe 83 PID 1472 wrote to memory of 1204 1472 JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe 83 PID 1472 wrote to memory of 1204 1472 JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe 83 PID 1204 wrote to memory of 2272 1204 WScript.exe 86 PID 1204 wrote to memory of 2272 1204 WScript.exe 86 PID 1204 wrote to memory of 2272 1204 WScript.exe 86 PID 2272 wrote to memory of 3904 2272 cmd.exe 88 PID 2272 wrote to memory of 3904 2272 cmd.exe 88 PID 3904 wrote to memory of 2912 3904 DllCommonsvc.exe 125 PID 3904 wrote to memory of 2912 3904 DllCommonsvc.exe 125 PID 3904 wrote to memory of 4408 3904 DllCommonsvc.exe 126 PID 3904 wrote to memory of 4408 3904 DllCommonsvc.exe 126 PID 3904 wrote to memory of 3632 3904 DllCommonsvc.exe 127 PID 3904 wrote to memory of 3632 3904 DllCommonsvc.exe 127 PID 3904 wrote to memory of 532 3904 DllCommonsvc.exe 128 PID 3904 wrote to memory of 532 3904 DllCommonsvc.exe 128 PID 3904 wrote to memory of 1496 3904 DllCommonsvc.exe 129 PID 3904 wrote to memory of 1496 3904 DllCommonsvc.exe 129 PID 3904 wrote to memory of 1104 3904 DllCommonsvc.exe 130 PID 3904 wrote to memory of 1104 3904 DllCommonsvc.exe 130 PID 3904 wrote to memory of 3336 3904 DllCommonsvc.exe 131 PID 3904 wrote to memory of 3336 3904 DllCommonsvc.exe 131 PID 3904 wrote to memory of 940 3904 DllCommonsvc.exe 132 PID 3904 wrote to memory of 940 3904 DllCommonsvc.exe 132 PID 3904 wrote to memory of 3548 3904 DllCommonsvc.exe 133 PID 3904 wrote to memory of 3548 3904 DllCommonsvc.exe 133 PID 3904 wrote to memory of 1028 3904 DllCommonsvc.exe 134 PID 3904 wrote to memory of 1028 3904 DllCommonsvc.exe 134 PID 3904 wrote to memory of 1232 3904 DllCommonsvc.exe 135 PID 3904 wrote to memory of 1232 3904 DllCommonsvc.exe 135 PID 3904 wrote to memory of 2760 3904 DllCommonsvc.exe 136 PID 3904 wrote to memory of 2760 3904 DllCommonsvc.exe 136 PID 3904 wrote to memory of 3232 3904 DllCommonsvc.exe 149 PID 3904 wrote to memory of 3232 3904 DllCommonsvc.exe 149 PID 3232 wrote to memory of 908 3232 TextInputHost.exe 151 PID 3232 wrote to memory of 908 3232 TextInputHost.exe 151 PID 908 wrote to memory of 4856 908 cmd.exe 153 PID 908 wrote to memory of 4856 908 cmd.exe 153 PID 908 wrote to memory of 1212 908 cmd.exe 159 PID 908 wrote to memory of 1212 908 cmd.exe 159 PID 1212 wrote to memory of 5000 1212 TextInputHost.exe 161 PID 1212 wrote to memory of 5000 1212 TextInputHost.exe 161 PID 5000 wrote to memory of 4420 5000 cmd.exe 163 PID 5000 wrote to memory of 4420 5000 cmd.exe 163 PID 5000 wrote to memory of 4852 5000 cmd.exe 165 PID 5000 wrote to memory of 4852 5000 cmd.exe 165 PID 4852 wrote to memory of 3672 4852 TextInputHost.exe 167 PID 4852 wrote to memory of 3672 4852 TextInputHost.exe 167 PID 3672 wrote to memory of 5020 3672 cmd.exe 169 PID 3672 wrote to memory of 5020 3672 cmd.exe 169 PID 3672 wrote to memory of 3688 3672 cmd.exe 171 PID 3672 wrote to memory of 3688 3672 cmd.exe 171 PID 3688 wrote to memory of 1592 3688 TextInputHost.exe 176 PID 3688 wrote to memory of 1592 3688 TextInputHost.exe 176 PID 1592 wrote to memory of 4308 1592 cmd.exe 178 PID 1592 wrote to memory of 4308 1592 cmd.exe 178 PID 1592 wrote to memory of 4296 1592 cmd.exe 180 PID 1592 wrote to memory of 4296 1592 cmd.exe 180 PID 4296 wrote to memory of 1164 4296 TextInputHost.exe 182 PID 4296 wrote to memory of 1164 4296 TextInputHost.exe 182 PID 1164 wrote to memory of 5112 1164 cmd.exe 184 PID 1164 wrote to memory of 5112 1164 cmd.exe 184 PID 1164 wrote to memory of 2616 1164 cmd.exe 186 PID 1164 wrote to memory of 2616 1164 cmd.exe 186 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_149fe8cb0905736943f27c64c3dbacfc42a84ceed4d78066566efb08c9e282e5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\SetupMetrics\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\unsecapp.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\NetHood\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Temp\WaaSMedicAgent.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SKB\LanguageModels\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZHEG9SYztW.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4856
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UPAAmIRCFx.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:4420
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7etkz3INVn.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:5020
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KVYyjDtEXm.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:4308
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Db6xYfwFNB.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:5112
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X5jGqiFaSS.bat"16⤵PID:1048
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:400
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vhtd8auDHa.bat"18⤵PID:3780
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:1104
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qzxbGmHcY3.bat"20⤵PID:1268
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:5028
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ESzt3JT3T8.bat"22⤵PID:2384
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:3972
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bDGJqXcsCJ.bat"24⤵PID:3556
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:2748
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9j3rBUpSkc.bat"26⤵PID:3904
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:1524
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Bf5uratM3O.bat"28⤵PID:4324
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:1324
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Bf5uratM3O.bat"30⤵PID:4796
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:4364
-
-
C:\Recovery\WindowsRE\TextInputHost.exe"C:\Recovery\WindowsRE\TextInputHost.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X5jGqiFaSS.bat"32⤵PID:3420
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:233⤵PID:4336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\providercommon\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\providercommon\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\providercommon\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Google\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Users\Default\NetHood\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Default\NetHood\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Users\Default\NetHood\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaaSMedicAgentW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\Temp\WaaSMedicAgent.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaaSMedicAgent" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\WaaSMedicAgent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WaaSMedicAgentW" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Temp\WaaSMedicAgent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Windows\SKB\LanguageModels\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Windows\SKB\LanguageModels\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Photo Viewer\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\providercommon\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
204B
MD594de5b111506b682d6797aa57f3d320b
SHA1890cd4e4714754dbed20d1f3e268951b85f6d4b7
SHA256026bc2144511bb2ef58ee8ddf20e2d679a976f5d7d604546a6731b8b4357d138
SHA512e8fe059fc5ef2772e87e967afe4b6eaef93800a598afc359d069f205e966bac853606f48fdaa63bfddc71e87c8c3b917162b0705b9621a103a6263500d761bde
-
Filesize
204B
MD55c935b7464e31d5a31f28cff30fae8c6
SHA153fce80a03a18ea0940f08e744dee2755306aed6
SHA25617c15c64afeec4eec4acbb4e7961a9189ab50c6583db3a69f32c22a1d7d34297
SHA512eaa30e9018d869a10f3656683bfa0a815d76404337113756692c1833e3d296af4354d2ed2d7d555d20ce1059a5e71fa3e199644c9b580a7125ce8b9ed5f23f1d
-
Filesize
204B
MD55f629e757bcde7079f55c1658e121939
SHA16779907303c9a17ee0c37bd8ed22080c2192a237
SHA25682e19cc365a3f244449c4b4a1e9027832e24ed9bcb62118adad822f591d7c235
SHA51241d08d44ff29466982eff6aaecf9ae03bc3e07b6c572f0eb41f8988142cbb8f0f54730d9aa1c2f0f634fc6c32d625bfcfda3f43801671da7b04c59d699e7e700
-
Filesize
204B
MD5018c034ea66af2e7ef943f2ab998b56c
SHA15213294a8cd02d2772dea2bdff41591892ff6d22
SHA25602d07347a67c33eb45011f417f418ab98e035c8dd0e4d47673aedba1ddae27ab
SHA5129868ffa2c3deb5e2e00029a5b1a4b93227595e52f43cad17ab99cedee87a27c63ed9972aa1263d12da3e8b1016b3a296f4617414a21c011c5e68668243d2821f
-
Filesize
204B
MD52970bb074df19fcdb586c640d452fa13
SHA16bd565f9a86d661f61defcf0d0d6fd55ecbb0157
SHA25655224da1c34338239a3e51e803b6edc60af552cfc4a46871bbdf60653010b71d
SHA5122b257a16677dd6f3494d79991724600f5d697081e5a25c7a0912a1d61468ea90f199bdab0d8f5822898222bf270d22568955a26229514dead800b7a21104aedb
-
Filesize
204B
MD53295c22698fab73d99af5f358a991926
SHA1ebe9471f4678efef144349ace34f0d26ec3d53b5
SHA256da307efd6b7ecb1317068837da3aef9a136233588b557fad1a444c04bfa475d3
SHA512595f750065e1e8445dcd75de0ed11a49e4a69b62dc1f5422de3ba9499d4231fb1cc6ebbcbed9356fab2868eea6f7d55a9e94744b0970ef9a27630e32f0a390b5
-
Filesize
204B
MD50de36f81b8bc351fe932697f433132a0
SHA1f2b51d84277972048e2f6abcbd64c72331ccda41
SHA2560da6a2a4a3d175da69649b65ff3c636a5aca841268c850988568019b27330cb3
SHA5121e7924f58fb158c7dee1018800dd62c107c429a6885b3926039e86ebd43fb805aeff43da5e403afb5d6ebfd498c005a86503985ba806e09a7dacc3880dbe9f3a
-
Filesize
204B
MD586d44ec918d725ef74309cd8efa5f589
SHA11146c02116ca63660855c5300f7f091448c9ec38
SHA256d3707bf2b2e2943fd0d35fa760fb8adc8837c42153789c1b1f8eb5cd8e9830d0
SHA51283177c67c98312f6045eee152806dfe62f31ca0ad6f15a2973b7b5e9495e7b0c5283332ac2e2cc78bc2f4778586e0ea4367bfdaceca92497a3e95d3597536fb4
-
Filesize
204B
MD51766efc03c6e75acb0e2aa12c3820677
SHA1eb0604538a51601b0af2ea005705dad73a36ce42
SHA2566dae0cb55c04f84458e7f6171dfefe439a3c36611c1e15f43b73609c6d504da2
SHA51282ac0b35dbb1d14308f5b17ce4501b842a72089e5d6b36970eb6132404c42ee345b57694108da960a15fbde085616ad5ba0f3a8442fb4fbec539f5a78ef4d113
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
204B
MD53278a2371a24c342d973c533ed404e81
SHA185bfb5e3df14ca4c251983d12e95509a2a3ba316
SHA25671deb31a89905dd8385cff089b37ac2ebf92afd5faa408ae307e51e736a2863a
SHA512582d5628d98a3175e14951b9a35ddb7c98fb4b7d166c2f1f3a71c3eb57a964046e1db276359a21741dade047b05743c1c88dc943785043811d23cf610044a041
-
Filesize
204B
MD55ecff123a6c88236dbc872f857de8fdd
SHA1c04bdcb45c98fb05a78092b15a1bef05f3490a7b
SHA256989d6f7a1071141eb38253486196720ab918e3a59af208008591c2e3649d7cd1
SHA512596cc865c49a294193618771fdf0de79912bcbc3ff86674d84c0603dae6735e3b1babe788108be489188bb3abe4c1d413adb9071b5671c6b400c745d6d009432
-
Filesize
204B
MD59ae4a622563bfde3654feddd086e2ae2
SHA1c7c3a8c8cabb1064a223c50ccc9f4d6e56f18939
SHA256a6d0b0fbf4d59225481f89374b52b9d0f0c24a155ddc4e02280ee33c1de8214d
SHA512f77d1315299b36127585ad271d4249d8dfc92908f84c70f65c8e72e15e8922b8b5c7681bb8e340abe09bbdb2d6d9c999ec241016145f8da75eb9c48a1730ec6d
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478