Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 07:02
Behavioral task
behavioral1
Sample
JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe
-
Size
1.3MB
-
MD5
400d02fa9bae7f2b18a6b45070a0f686
-
SHA1
6d551ccc3f8ece5c99fc3fd7dccfb71f354bd6db
-
SHA256
2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7
-
SHA512
df1d84ef13ae7ad630679f93489a21a88500961b4cd3d0bbf4b7e991a0e1936a30e3b8cda9ef53ddef84df51ccd702a1567b7611198f4fd87061bc6275d9368a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1428 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 800 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1120 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 688 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2748 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2748 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0007000000019345-11.dat dcrat behavioral1/memory/2324-13-0x00000000000D0000-0x00000000001E0000-memory.dmp dcrat behavioral1/memory/1612-60-0x0000000001160000-0x0000000001270000-memory.dmp dcrat behavioral1/memory/2648-453-0x00000000002B0000-0x00000000003C0000-memory.dmp dcrat behavioral1/memory/1876-513-0x0000000000840000-0x0000000000950000-memory.dmp dcrat behavioral1/memory/2748-573-0x0000000000C00000-0x0000000000D10000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2012 powershell.exe 2780 powershell.exe 2852 powershell.exe 2652 powershell.exe 2660 powershell.exe 2848 powershell.exe 2616 powershell.exe 1684 powershell.exe 2756 powershell.exe 2268 powershell.exe 2840 powershell.exe 2688 powershell.exe 2176 powershell.exe 2168 powershell.exe 2724 powershell.exe 3020 powershell.exe 2720 powershell.exe 2700 powershell.exe 2664 powershell.exe -
Executes dropped EXE 10 IoCs
pid Process 2324 DllCommonsvc.exe 1612 Idle.exe 2168 Idle.exe 2936 Idle.exe 2180 Idle.exe 2964 Idle.exe 2648 Idle.exe 1876 Idle.exe 2748 Idle.exe 2352 Idle.exe -
Loads dropped DLL 2 IoCs
pid Process 2704 cmd.exe 2704 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 5 raw.githubusercontent.com 19 raw.githubusercontent.com 26 raw.githubusercontent.com 32 raw.githubusercontent.com 4 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 22 raw.githubusercontent.com 29 raw.githubusercontent.com 9 raw.githubusercontent.com -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Uninstall Information\24dbde2999530e DllCommonsvc.exe File created C:\Program Files\Windows Defender\en-US\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\cc11b995f2a76d DllCommonsvc.exe File created C:\Program Files\Microsoft Office\Office14\1033\sppsvc.exe DllCommonsvc.exe File created C:\Program Files (x86)\Uninstall Information\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files\Windows Defender\en-US\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\defaults\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Program Files (x86)\Windows NT\TableTextService\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files\Windows Media Player\ja-JP\audiodg.exe DllCommonsvc.exe File created C:\Program Files\Windows Media Player\ja-JP\42af1c969fbb7b DllCommonsvc.exe File created C:\Program Files (x86)\Uninstall Information\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\defaults\System.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows NT\TableTextService\Idle.exe DllCommonsvc.exe File created C:\Program Files\Uninstall Information\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe DllCommonsvc.exe File created C:\Program Files\Microsoft Office\Office14\1033\0a1fd5f707cd16 DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\en-US\dwm.exe DllCommonsvc.exe File created C:\Windows\en-US\6cb0b6c459d5d3 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe 1428 schtasks.exe 2448 schtasks.exe 688 schtasks.exe 800 schtasks.exe 2984 schtasks.exe 2796 schtasks.exe 1624 schtasks.exe 2152 schtasks.exe 1324 schtasks.exe 1916 schtasks.exe 844 schtasks.exe 1276 schtasks.exe 1620 schtasks.exe 1912 schtasks.exe 2336 schtasks.exe 1908 schtasks.exe 2992 schtasks.exe 2716 schtasks.exe 1868 schtasks.exe 2248 schtasks.exe 2968 schtasks.exe 2244 schtasks.exe 1536 schtasks.exe 320 schtasks.exe 1656 schtasks.exe 1088 schtasks.exe 2568 schtasks.exe 2360 schtasks.exe 1636 schtasks.exe 2812 schtasks.exe 3056 schtasks.exe 3052 schtasks.exe 2388 schtasks.exe 2592 schtasks.exe 908 schtasks.exe 2832 schtasks.exe 840 schtasks.exe 916 schtasks.exe 1976 schtasks.exe 2964 schtasks.exe 1120 schtasks.exe 2476 schtasks.exe 2736 schtasks.exe 2944 schtasks.exe 1548 schtasks.exe 1588 schtasks.exe 2532 schtasks.exe 2064 schtasks.exe 1900 schtasks.exe 3060 schtasks.exe 3032 schtasks.exe 1924 schtasks.exe 2312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2324 DllCommonsvc.exe 2720 powershell.exe 2012 powershell.exe 2176 powershell.exe 2700 powershell.exe 2168 powershell.exe 2724 powershell.exe 2780 powershell.exe 2848 powershell.exe 2660 powershell.exe 2268 powershell.exe 2840 powershell.exe 2664 powershell.exe 2616 powershell.exe 2756 powershell.exe 3020 powershell.exe 1684 powershell.exe 2852 powershell.exe 2652 powershell.exe 2688 powershell.exe 1612 Idle.exe 2168 Idle.exe 2936 Idle.exe 2180 Idle.exe 2964 Idle.exe 2648 Idle.exe 1876 Idle.exe 2748 Idle.exe 2352 Idle.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2324 DllCommonsvc.exe Token: SeDebugPrivilege 1612 Idle.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 1684 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2168 Idle.exe Token: SeDebugPrivilege 2936 Idle.exe Token: SeDebugPrivilege 2180 Idle.exe Token: SeDebugPrivilege 2964 Idle.exe Token: SeDebugPrivilege 2648 Idle.exe Token: SeDebugPrivilege 1876 Idle.exe Token: SeDebugPrivilege 2748 Idle.exe Token: SeDebugPrivilege 2352 Idle.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2168 2112 JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe 30 PID 2112 wrote to memory of 2168 2112 JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe 30 PID 2112 wrote to memory of 2168 2112 JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe 30 PID 2112 wrote to memory of 2168 2112 JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe 30 PID 2168 wrote to memory of 2704 2168 WScript.exe 31 PID 2168 wrote to memory of 2704 2168 WScript.exe 31 PID 2168 wrote to memory of 2704 2168 WScript.exe 31 PID 2168 wrote to memory of 2704 2168 WScript.exe 31 PID 2704 wrote to memory of 2324 2704 cmd.exe 33 PID 2704 wrote to memory of 2324 2704 cmd.exe 33 PID 2704 wrote to memory of 2324 2704 cmd.exe 33 PID 2704 wrote to memory of 2324 2704 cmd.exe 33 PID 2324 wrote to memory of 2012 2324 DllCommonsvc.exe 89 PID 2324 wrote to memory of 2012 2324 DllCommonsvc.exe 89 PID 2324 wrote to memory of 2012 2324 DllCommonsvc.exe 89 PID 2324 wrote to memory of 2176 2324 DllCommonsvc.exe 90 PID 2324 wrote to memory of 2176 2324 DllCommonsvc.exe 90 PID 2324 wrote to memory of 2176 2324 DllCommonsvc.exe 90 PID 2324 wrote to memory of 1684 2324 DllCommonsvc.exe 91 PID 2324 wrote to memory of 1684 2324 DllCommonsvc.exe 91 PID 2324 wrote to memory of 1684 2324 DllCommonsvc.exe 91 PID 2324 wrote to memory of 2168 2324 DllCommonsvc.exe 92 PID 2324 wrote to memory of 2168 2324 DllCommonsvc.exe 92 PID 2324 wrote to memory of 2168 2324 DllCommonsvc.exe 92 PID 2324 wrote to memory of 2724 2324 DllCommonsvc.exe 93 PID 2324 wrote to memory of 2724 2324 DllCommonsvc.exe 93 PID 2324 wrote to memory of 2724 2324 DllCommonsvc.exe 93 PID 2324 wrote to memory of 2756 2324 DllCommonsvc.exe 94 PID 2324 wrote to memory of 2756 2324 DllCommonsvc.exe 94 PID 2324 wrote to memory of 2756 2324 DllCommonsvc.exe 94 PID 2324 wrote to memory of 2852 2324 DllCommonsvc.exe 95 PID 2324 wrote to memory of 2852 2324 DllCommonsvc.exe 95 PID 2324 wrote to memory of 2852 2324 DllCommonsvc.exe 95 PID 2324 wrote to memory of 3020 2324 DllCommonsvc.exe 96 PID 2324 wrote to memory of 3020 2324 DllCommonsvc.exe 96 PID 2324 wrote to memory of 3020 2324 DllCommonsvc.exe 96 PID 2324 wrote to memory of 2720 2324 DllCommonsvc.exe 97 PID 2324 wrote to memory of 2720 2324 DllCommonsvc.exe 97 PID 2324 wrote to memory of 2720 2324 DllCommonsvc.exe 97 PID 2324 wrote to memory of 2848 2324 DllCommonsvc.exe 98 PID 2324 wrote to memory of 2848 2324 DllCommonsvc.exe 98 PID 2324 wrote to memory of 2848 2324 DllCommonsvc.exe 98 PID 2324 wrote to memory of 2840 2324 DllCommonsvc.exe 99 PID 2324 wrote to memory of 2840 2324 DllCommonsvc.exe 99 PID 2324 wrote to memory of 2840 2324 DllCommonsvc.exe 99 PID 2324 wrote to memory of 2700 2324 DllCommonsvc.exe 100 PID 2324 wrote to memory of 2700 2324 DllCommonsvc.exe 100 PID 2324 wrote to memory of 2700 2324 DllCommonsvc.exe 100 PID 2324 wrote to memory of 2652 2324 DllCommonsvc.exe 101 PID 2324 wrote to memory of 2652 2324 DllCommonsvc.exe 101 PID 2324 wrote to memory of 2652 2324 DllCommonsvc.exe 101 PID 2324 wrote to memory of 2780 2324 DllCommonsvc.exe 102 PID 2324 wrote to memory of 2780 2324 DllCommonsvc.exe 102 PID 2324 wrote to memory of 2780 2324 DllCommonsvc.exe 102 PID 2324 wrote to memory of 2660 2324 DllCommonsvc.exe 103 PID 2324 wrote to memory of 2660 2324 DllCommonsvc.exe 103 PID 2324 wrote to memory of 2660 2324 DllCommonsvc.exe 103 PID 2324 wrote to memory of 2616 2324 DllCommonsvc.exe 104 PID 2324 wrote to memory of 2616 2324 DllCommonsvc.exe 104 PID 2324 wrote to memory of 2616 2324 DllCommonsvc.exe 104 PID 2324 wrote to memory of 2688 2324 DllCommonsvc.exe 105 PID 2324 wrote to memory of 2688 2324 DllCommonsvc.exe 105 PID 2324 wrote to memory of 2688 2324 DllCommonsvc.exe 105 PID 2324 wrote to memory of 2268 2324 DllCommonsvc.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2bfe84167caac559ec8ca68faa141162b0f437a5c7a1f645e935a72b02c2f2e7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Favorites\Microsoft Websites\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Uninstall Information\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender\en-US\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\defaults\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Searches\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\TableTextService\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\en-US\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Music\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\ja-JP\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\Office14\1033\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UMOyPGkKXB.bat"6⤵PID:748
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2120
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zKs2Tjd9zb.bat"8⤵PID:2612
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1536
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4oJokgKWVw.bat"10⤵PID:1876
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2016
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8zQYTmmGlF.bat"12⤵PID:2520
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2240
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wpigNgqS7W.bat"14⤵PID:1120
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:900
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ssDSZpddA3.bat"16⤵PID:2028
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2764
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZHEG9SYztW.bat"18⤵PID:1852
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2108
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sodlpYYBfa.bat"20⤵PID:1708
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:1080
-
-
C:\providercommon\Idle.exe"C:\providercommon\Idle.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Favorites\Microsoft Websites\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\Microsoft Websites\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Favorites\Microsoft Websites\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Uninstall Information\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Uninstall Information\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\providercommon\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\en-US\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\en-US\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\defaults\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Mozilla Firefox\defaults\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 10 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Searches\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Admin\Searches\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Searches\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\providercommon\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Windows\en-US\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\en-US\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Windows\en-US\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Music\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\Music\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Music\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\ja-JP\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\ja-JP\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\ja-JP\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\Office14\1033\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\Office14\1033\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef5c2955cf10a13a8c2cb85e0b37edb
SHA1be321285d024c79e7b1e1b250e7fd00d16aba786
SHA256d5f781e9db81ba398112a2061d28b817c8564af6d7ca56862e4fd26c97122744
SHA512c6992e9c3420e6b96695fc67260fb2eed8669d9b5a9a892f5df4b1b64a1cfa91576a111770d7c7a3f1fd4ae9f445e041a61f35f1c12a4bf2cac2818833518a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558acd7e2fd2e6654f5784a58937a725
SHA192e2973646f4d77e1fe38e23298a72716d86156c
SHA256c329a7b05cbbf643273653d6cb2107d94559fe3f8d6c9bb44fb09d40e79430e6
SHA512903b832c7fe850f23d59327cba5b774867ee14cb768098a666439bc0023eb1ab3cfe34f7c6925c812d48661ed7bf436333ad7940ea16b6296afcfc585d26248c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f52a528894517eb00d34ec0eafcf26
SHA10b38651e0b01b7bd5c6f99b59c60b4e8449cb2a3
SHA256a8dea0efa267318ed73eacc9fca18f1ef1887e401cfd0914ff4bbffe882e1aad
SHA512f2c4acc9e1e15d7a7702958ef7cb6bc11e378d5fbff0b6abf46f1136c89b05aef72df76eb4b05f7e45f4b2e5d625eb53ed8466d96d3370b3eab06391371fa2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a8bea07c02ffee6f345b8e7558c176
SHA1b40b1aa79ef13560d8a8c93396d24b37dfbf3313
SHA25620dddc1baf5832ba3bb3f7b86d29d2f3ece8f8d67051d7b83e0b166fa152b195
SHA51278a7db6762cdf828981d6165d8dd2fcf2fb4a3ee6ae97335532df856b84cca93e5f54d5ae302d1f295d19db83fd9a0f6e56069c8e1b061ff2548264b7cb0b536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509caae30bbf0b437ef57be354a033924
SHA1b3715d23dbb2d55ac93e92d9eb08a1354159bd58
SHA256a10402cc9bd3292331a04cc4282974bc8f5771bf564ad8eac75afd48f5be8c46
SHA5121a582f8fc591ec58832d37b4169c4b63a426f8a7f1fce6018b87e690b747231007f243a3c86bdca30d6972f60a9852b7bcb01027ba102ad6958e83d8c803f250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287a32f8172199f3d0befe8b59d89ef1
SHA190ece80a5bf021a2cc4f0c8f6b59f8e9a088c747
SHA25659ae52d6416cd36ecc5c0ce54088976b9c641ccfe7c0258e49503a716324ca97
SHA512d6b3d045f9daa59ac4712322bfb7e9601cc743d3537828c88776466b9859e12014103866185c27d636f8a30d14e89dd64e36a2ba81003a8dbf58eda9cf5a63cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cf8ad748b0458c58626e8bf5be12ba
SHA1b5c3274d58673e46b0c7894905711c4d411c26eb
SHA25670622113390fd41a2521b11e6ddb90a18a10e36e1888249bd34dc13c606bc8dc
SHA512a54f270b5f9c9af9f64c2259ab5c746e0685889c75e29ace40e154e54c41e6a36aecf1f17d17b179b0c07a653db6b921cc99095d038cdb087df531963c9c4d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a48e047a99b676e825db88217f83b0
SHA19fe5b2fcdaa3820c2f49b42cff52c9d6250b1fe7
SHA25651cd577ad627622e21b6c767c61a2d848f2c7d7460780e24e054816be6921e54
SHA5128ac70bbe898fd740a1d0a3474dd91738b387c1f650a84aa2b226208bd9ad7a2c62a4937986a7f05d7b0db25b28b4e2f2d245c2f39a70c81e26fa5a23e448f76b
-
Filesize
191B
MD510c32fc6a52291a5f4fa9f8b68fec5d6
SHA1d2de854a82d5b4b86586890d209fc243a856d7cc
SHA2564705fe621742b2372933bf26f1d467388462c7385b69f0fb04e9ce847d40661f
SHA51272d654509f32b1d0666e99b3d93d7c18d5dd5b7fb1347cbb94c5904a613efc4d5518b4ace9d403fe4d222663b8820a3bae83a47caa4b43f144ec6bfe7eb6766a
-
Filesize
191B
MD57a5f983264b83a6b21c13c769391576f
SHA1eccba3ee206fc2126f06fa9acad18c10fe5d7802
SHA25606cff19fef1024da4e0eaa427081682a478582ff3e85917efddb31bd585e61ae
SHA51226cc4a80dec70f963eebcf5a3e965675639588f3a941be13235a913c9d061040160c0105457561d8d96a39a4d809b401ebf35d5a66e1b14ed1d9d7a2bf32cbbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
191B
MD52212a91d2c2aa68ce6105d5e293a0a0a
SHA1842fe7f1af2ca2ffa1203911586e438933665791
SHA256bc79acc7d77a1c626ddc896a69c3a2aebcd7e9a73bfcbbbf6643a9e01f7c145b
SHA5128aad974a3bc75a1322778b3b47d79b5dc63123ad9e690cfa0b8169c82f3828c5257d76ecb53025a42ae11275bed3bbc9e27a2a4278cada6c46d53a0b207b61b0
-
Filesize
191B
MD530b9813a353a633850a8e820d16b4198
SHA161761d5b82ccf9fd5a53c2596372804c38cba918
SHA256606876d5e74306c050d5e715547e08c2b59c5ab97666f056950ebcbb3ef05d6a
SHA5123f08b3c2764f01360bf688a9b50de0d7e7181c4677962ebc0422f4a54ff31e1986431c067edaaade70cfb504258b51d8836e4a8f920e5f6b2ba7f9eb9dd2d7b7
-
Filesize
191B
MD5a5ba7bde9c8a03fe5b0703f6cd6f7baa
SHA18c9e703ec6e987831eae5e30349d961abf04c350
SHA256b9325d404eca02d64a65cdd1a60fa3dfa092ef67f04fdb0cba3b57bd175705ca
SHA51223810943efe56bad63236198f1d8941b658c3a7f21f9fc7ab566335f0c6263e4a2bc0d386e23b03cd9b9e9ada315280ff9ce31f7abc92494709a07bcc178799b
-
Filesize
191B
MD5761fd5615db1d1563594a5591d1e3488
SHA13ab7234fe3f0ba53d029e67b6dea673e1926ca16
SHA25638304b9774c7f9916bf7aa5f5eda72819d28f0bc7011284a73e5cd690baf6a6a
SHA512127c4eae9a022048f38b1a5cb63151396aedc969302ededbb058a9de349b49d7aaf7c195ac7eb967a22f65840138c347c066f51c4b4f85d5c206ae15cc51542b
-
Filesize
191B
MD5f068a7c4d2837833cf581eb939a79897
SHA1281011a39d8434078e085fc0e69727ba11a9cfae
SHA2562ee16f089f8b711e819861cc2b20f6aae0f092bc8af0f1dfd41c1b88f5856fc4
SHA5128433d81a7580c61d599784b7df80c2b2a5de5ef7ec2fcc345845d37d834a5d8107a5654a45c44370344d13f185f27cdfca44d9c36c6501739db851c54245ffc4
-
Filesize
191B
MD549eb27d7d32f9dd3ea753e65632b2e76
SHA17bd622d8a106ffedded06fa924b9a9bd3b5a2106
SHA25668d4cd9e984f311e252093ef049326632a15bc2d352cd110b92408376953ca4b
SHA5127bef021a99c068ae02124aa8332b910c8a00e68e41ffcd9cff336f4236afa1b1e875789e1e4bde0d1f5a3d18ca5a82c9dc590fb68f33c6ec10a1095f0d4af69e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53f8627f09e879e47bc9220403a8b2927
SHA14f3ec0a236f393e7a00c90f1f993277ee445ac8c
SHA2569b87e7368e2833dd96d3cdbdfbd0256eccbae9dce3921a7dacc01d041d1eba8e
SHA5125d872f05f672f4b6796877f8191337638b7f7522ba16c36a5f44d97786ed8a2297c343179b561755a5c8042f8f59547d701475ac38248b53b0db66a6e1210c7f
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394