Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 07:50
Behavioral task
behavioral1
Sample
JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe
-
Size
1.3MB
-
MD5
50e8df05511bac051bdc1465a5b4def4
-
SHA1
769f9bdee259f9dab87a38e6b183cc1db8a6cc3d
-
SHA256
dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed
-
SHA512
e880152fcff870e9ade90820f7b6f9a126f24b73c031d56a6bf52d6ecb304e3bf6a0dac4fee1c60bb68578e3f06311b7a00e7033e85cb55b378d18f700b8c4ed
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4724 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5068 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3500 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4996 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3952 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3760 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 636 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 372 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3412 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4432 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3344 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3288 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5072 2564 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4840 2564 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000a000000023b9a-10.dat dcrat behavioral2/memory/4332-13-0x0000000000B30000-0x0000000000C40000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 924 powershell.exe 1824 powershell.exe 4696 powershell.exe 4588 powershell.exe 3708 powershell.exe 1772 powershell.exe 1072 powershell.exe 440 powershell.exe 456 powershell.exe 876 powershell.exe 1388 powershell.exe 892 powershell.exe 232 powershell.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation spoolsv.exe -
Executes dropped EXE 15 IoCs
pid Process 4332 DllCommonsvc.exe 5032 spoolsv.exe 3796 spoolsv.exe 1888 spoolsv.exe 4216 spoolsv.exe 1164 spoolsv.exe 1060 spoolsv.exe 1620 spoolsv.exe 1612 spoolsv.exe 2404 spoolsv.exe 2556 spoolsv.exe 1320 spoolsv.exe 4512 spoolsv.exe 1444 spoolsv.exe 456 spoolsv.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 43 raw.githubusercontent.com 45 raw.githubusercontent.com 56 raw.githubusercontent.com 38 raw.githubusercontent.com 46 raw.githubusercontent.com 54 raw.githubusercontent.com 55 raw.githubusercontent.com 39 raw.githubusercontent.com 20 raw.githubusercontent.com 53 raw.githubusercontent.com 14 raw.githubusercontent.com 25 raw.githubusercontent.com 44 raw.githubusercontent.com 15 raw.githubusercontent.com -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\WindowsPowerShell\Configuration\Registration\wininit.exe DllCommonsvc.exe File created C:\Program Files\WindowsPowerShell\Configuration\Registration\56085415360792 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\explorer.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath\OfficeClickToRun.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath\e6c9b481da804f DllCommonsvc.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\fontdrvhost.exe DllCommonsvc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\System\121e5b5079f7c0 DllCommonsvc.exe File created C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe DllCommonsvc.exe File created C:\Windows\SoftwareDistribution\DataStore\f3b6ecef712a24 DllCommonsvc.exe File created C:\Windows\System\sysmon.exe DllCommonsvc.exe File opened for modification C:\Windows\System\sysmon.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe 5072 schtasks.exe 4432 schtasks.exe 1932 schtasks.exe 2436 schtasks.exe 2692 schtasks.exe 3760 schtasks.exe 672 schtasks.exe 4880 schtasks.exe 3024 schtasks.exe 3152 schtasks.exe 1900 schtasks.exe 2164 schtasks.exe 1508 schtasks.exe 3288 schtasks.exe 4840 schtasks.exe 1364 schtasks.exe 3952 schtasks.exe 4984 schtasks.exe 3412 schtasks.exe 4692 schtasks.exe 4844 schtasks.exe 1812 schtasks.exe 2368 schtasks.exe 4996 schtasks.exe 968 schtasks.exe 1972 schtasks.exe 372 schtasks.exe 4724 schtasks.exe 2720 schtasks.exe 5068 schtasks.exe 636 schtasks.exe 3500 schtasks.exe 3344 schtasks.exe 2316 schtasks.exe 1476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 4332 DllCommonsvc.exe 440 powershell.exe 440 powershell.exe 1824 powershell.exe 1824 powershell.exe 3708 powershell.exe 3708 powershell.exe 1072 powershell.exe 1072 powershell.exe 1772 powershell.exe 1772 powershell.exe 1388 powershell.exe 1388 powershell.exe 232 powershell.exe 232 powershell.exe 456 powershell.exe 456 powershell.exe 4588 powershell.exe 4588 powershell.exe 892 powershell.exe 892 powershell.exe 924 powershell.exe 924 powershell.exe 4696 powershell.exe 4696 powershell.exe 876 powershell.exe 876 powershell.exe 4588 powershell.exe 5032 spoolsv.exe 5032 spoolsv.exe 1824 powershell.exe 440 powershell.exe 1772 powershell.exe 892 powershell.exe 3708 powershell.exe 232 powershell.exe 456 powershell.exe 1388 powershell.exe 1072 powershell.exe 924 powershell.exe 4696 powershell.exe 876 powershell.exe 3796 spoolsv.exe 1888 spoolsv.exe 4216 spoolsv.exe 1164 spoolsv.exe 1060 spoolsv.exe 1620 spoolsv.exe 1612 spoolsv.exe 2404 spoolsv.exe 2556 spoolsv.exe 1320 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 4332 DllCommonsvc.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeDebugPrivilege 1072 powershell.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 1772 powershell.exe Token: SeDebugPrivilege 1388 powershell.exe Token: SeDebugPrivilege 232 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 4588 powershell.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 5032 spoolsv.exe Token: SeDebugPrivilege 876 powershell.exe Token: SeDebugPrivilege 3796 spoolsv.exe Token: SeDebugPrivilege 1888 spoolsv.exe Token: SeDebugPrivilege 4216 spoolsv.exe Token: SeDebugPrivilege 1164 spoolsv.exe Token: SeDebugPrivilege 1060 spoolsv.exe Token: SeDebugPrivilege 1620 spoolsv.exe Token: SeDebugPrivilege 1612 spoolsv.exe Token: SeDebugPrivilege 2404 spoolsv.exe Token: SeDebugPrivilege 2556 spoolsv.exe Token: SeDebugPrivilege 1320 spoolsv.exe Token: SeDebugPrivilege 4512 spoolsv.exe Token: SeDebugPrivilege 1444 spoolsv.exe Token: SeDebugPrivilege 456 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3336 wrote to memory of 3328 3336 JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe 83 PID 3336 wrote to memory of 3328 3336 JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe 83 PID 3336 wrote to memory of 3328 3336 JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe 83 PID 3328 wrote to memory of 3580 3328 WScript.exe 85 PID 3328 wrote to memory of 3580 3328 WScript.exe 85 PID 3328 wrote to memory of 3580 3328 WScript.exe 85 PID 3580 wrote to memory of 4332 3580 cmd.exe 87 PID 3580 wrote to memory of 4332 3580 cmd.exe 87 PID 4332 wrote to memory of 876 4332 DllCommonsvc.exe 126 PID 4332 wrote to memory of 876 4332 DllCommonsvc.exe 126 PID 4332 wrote to memory of 456 4332 DllCommonsvc.exe 127 PID 4332 wrote to memory of 456 4332 DllCommonsvc.exe 127 PID 4332 wrote to memory of 4588 4332 DllCommonsvc.exe 128 PID 4332 wrote to memory of 4588 4332 DllCommonsvc.exe 128 PID 4332 wrote to memory of 4696 4332 DllCommonsvc.exe 129 PID 4332 wrote to memory of 4696 4332 DllCommonsvc.exe 129 PID 4332 wrote to memory of 440 4332 DllCommonsvc.exe 130 PID 4332 wrote to memory of 440 4332 DllCommonsvc.exe 130 PID 4332 wrote to memory of 1824 4332 DllCommonsvc.exe 131 PID 4332 wrote to memory of 1824 4332 DllCommonsvc.exe 131 PID 4332 wrote to memory of 924 4332 DllCommonsvc.exe 132 PID 4332 wrote to memory of 924 4332 DllCommonsvc.exe 132 PID 4332 wrote to memory of 1072 4332 DllCommonsvc.exe 133 PID 4332 wrote to memory of 1072 4332 DllCommonsvc.exe 133 PID 4332 wrote to memory of 232 4332 DllCommonsvc.exe 134 PID 4332 wrote to memory of 232 4332 DllCommonsvc.exe 134 PID 4332 wrote to memory of 1772 4332 DllCommonsvc.exe 135 PID 4332 wrote to memory of 1772 4332 DllCommonsvc.exe 135 PID 4332 wrote to memory of 892 4332 DllCommonsvc.exe 137 PID 4332 wrote to memory of 892 4332 DllCommonsvc.exe 137 PID 4332 wrote to memory of 1388 4332 DllCommonsvc.exe 138 PID 4332 wrote to memory of 1388 4332 DllCommonsvc.exe 138 PID 4332 wrote to memory of 3708 4332 DllCommonsvc.exe 139 PID 4332 wrote to memory of 3708 4332 DllCommonsvc.exe 139 PID 4332 wrote to memory of 5032 4332 DllCommonsvc.exe 152 PID 4332 wrote to memory of 5032 4332 DllCommonsvc.exe 152 PID 5032 wrote to memory of 4432 5032 spoolsv.exe 154 PID 5032 wrote to memory of 4432 5032 spoolsv.exe 154 PID 4432 wrote to memory of 4456 4432 cmd.exe 156 PID 4432 wrote to memory of 4456 4432 cmd.exe 156 PID 4432 wrote to memory of 3796 4432 cmd.exe 158 PID 4432 wrote to memory of 3796 4432 cmd.exe 158 PID 3796 wrote to memory of 4864 3796 spoolsv.exe 167 PID 3796 wrote to memory of 4864 3796 spoolsv.exe 167 PID 4864 wrote to memory of 3968 4864 cmd.exe 169 PID 4864 wrote to memory of 3968 4864 cmd.exe 169 PID 4864 wrote to memory of 1888 4864 cmd.exe 175 PID 4864 wrote to memory of 1888 4864 cmd.exe 175 PID 1888 wrote to memory of 4736 1888 spoolsv.exe 177 PID 1888 wrote to memory of 4736 1888 spoolsv.exe 177 PID 4736 wrote to memory of 3940 4736 cmd.exe 179 PID 4736 wrote to memory of 3940 4736 cmd.exe 179 PID 4736 wrote to memory of 4216 4736 cmd.exe 183 PID 4736 wrote to memory of 4216 4736 cmd.exe 183 PID 4216 wrote to memory of 3684 4216 spoolsv.exe 186 PID 4216 wrote to memory of 3684 4216 spoolsv.exe 186 PID 3684 wrote to memory of 4500 3684 cmd.exe 188 PID 3684 wrote to memory of 4500 3684 cmd.exe 188 PID 3684 wrote to memory of 1164 3684 cmd.exe 190 PID 3684 wrote to memory of 1164 3684 cmd.exe 190 PID 1164 wrote to memory of 4680 1164 spoolsv.exe 192 PID 1164 wrote to memory of 4680 1164 spoolsv.exe 192 PID 4680 wrote to memory of 5108 4680 cmd.exe 194 PID 4680 wrote to memory of 5108 4680 cmd.exe 194 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System\sysmon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\Configuration\Registration\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\Registry.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VeFqpJq3BV.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4456
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kQw8FYVnXF.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:3968
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZfR0hqQ1j6.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:3940
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3B2OAH3dio.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:4500
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZfR0hqQ1j6.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:5108
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LkcfmFI5TJ.bat"16⤵PID:3564
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:4524
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MpmmxgpAh8.bat"18⤵PID:2420
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2708
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SXiopUTlQe.bat"20⤵PID:3044
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:4736
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NfeiSKMyn5.bat"22⤵PID:4468
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:4400
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XaHtVPtwVH.bat"24⤵PID:4960
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:5088
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\18eSMsDQCm.bat"26⤵PID:4484
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:4340
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rE1HJofSUb.bat"28⤵PID:4740
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:1108
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LkcfmFI5TJ.bat"30⤵PID:2696
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:1944
-
-
C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Windows\System\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\System\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Windows\System\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Registration\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\Registration\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Registration\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Portable Devices\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\SoftwareDistribution\DataStore\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
218B
MD5b520df84d86c7f3c4c5f18a560876eb5
SHA1ced71c3a794680ddb05b95081c23ea7447a87bbd
SHA2565341dc62f54cfa96d043857617fc3a7fe5e7a4cd4f72a64d5d5eb973e1dc5a41
SHA512a1efe61ae7fbefae0388145cf91446ca44ecd2bcc1ed345ac80db1a2e4c945135b5ffbe22662a53660ba2644116a005f1b569f79722a1e42c7645418ce297fdc
-
Filesize
218B
MD502448e2ce2ba9a02e9049ed7b017db22
SHA19c78acaeec771a627d7b0ffc6e9f1930e74a9808
SHA2562956c7dfd81a5a0ddc608d63dca3eaadcd573c53ba17aed0dc270c658fd6e2a4
SHA512c01ef21a616417fec5fc3ba2adfc3c113cd4c8c7b67921b8a6d4066d38205c757b17574f6b592d59cf599e36107f123e075973631978f74fdf1e8ab5879fca4a
-
Filesize
218B
MD5566dc26f40bed6bd2dcf5094ce239632
SHA14f9679d7dcbcfe7b58409c59e992dd084992893b
SHA25667d5a2060be90042ad49dd4abcda57dc058d7704fc2293c08ff7aa4cb81224ae
SHA512bf4fe63571b208c041e5576bf0e8f6f546df0b94a7621eb0a77d9a34c6e02d8c0cb81a84b9ec89162e35e1077a4a2c1798c6167e761fa71a2e699edddaf74916
-
Filesize
218B
MD5448bdc536dad13a787c9b06c133739af
SHA1a004b9917732045a208798021d94e51a92abe3ee
SHA25620991601e74f754870dcbc69a8222819d80c489cd945f17452f98e68aadb3756
SHA5121b45dc48d3878aac577854983b22e0866e02fe62b2987c5a81c6d8f9fa094451c855c260e3cbfa8f0c98311263851ca493f75f923edb74e76380983b4d818099
-
Filesize
218B
MD587484747b8d0f5aabdfc9d2e3544fa5b
SHA1608b662efb5a6d7cff20cb0d95462a3cd2669fa7
SHA2567d5863ac1472583f2242843d31b13ff37247859d2be8334ae2d58d1472cd71af
SHA512916f2cf19e9c12058ff6e60b116811005b9a6f7d628b3ad5e5313db072ada8558bceb615c6d8c27ec6f464bb2f6b7c57233a6a95a91691ee58e83a2e2d771a49
-
Filesize
218B
MD5e663ce8a4b4ef1e0c212886195ab80ae
SHA104757f641a4ef1d1dffcd9f3b0cd076885034271
SHA2563cf31895d983d62efa16664b4b3a409ad6b9c388da7af740b922610c51456e4c
SHA512884a423790f3f7e242917a954d2db6a503b5155d09f4bb449c31849ccfbb526aa23e72eddb9969e880b56e3886200ad7e82732b935d26101935d4f7da800a317
-
Filesize
218B
MD5ddc88d27b7d4e90db3781a6f1db62264
SHA16fec0a4d2b6d9a2cd8bb2531d56ba2de3cda4f63
SHA2563e30914ad60fa423f92aa529822c21586dfb5794e6c6917711f2c2e97eb45a3a
SHA512eafb658e541c05b490f2d7076820dddf84d5e07a51245ca2e4bcf402d6c475398e5aae8ad8f25bd817c9cd16b5a8ea878c00b8932140b2acc177d6fd18ffe11b
-
Filesize
218B
MD5e6d7baad4176f503b271533f3426edd9
SHA10a8649bd4821c4a3ec9e471309896baa5377b820
SHA256bfe03a249485f9ea37929b86fc612cb2271d676604753ad79f2dc673767b9063
SHA512e0a43f0b2b6a3af2ae858135b4a3681abb4e9e31ff0cea3f4256ee4d04cecccbc07730b3d2919a863dc1c55a51efb8f1381903e028be94936bf421535de14f84
-
Filesize
218B
MD5daa5f0d783ba55f24c4149f5d3c4da0b
SHA1772fb16fa23301a2cdf5d10c288c2c8f5e7ab91e
SHA25640cd9dc8dcaa74df49691ec337792cb32daceeb1c205bb806f09ccf2ec049157
SHA512aac01cb537a83c7b4bf9d88aea7a5f76b3424e0a8bb99fc58f5127244e4429a97629538fc1d8ea190ad4b717a20f7bd088c3460c31500714ae04015c2f4a049e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
218B
MD52f5f0b2067ad01630c035020624eb7e4
SHA1197ffadbed2d3e85a7211f24b3f1bea2c954490a
SHA256c766888a2f5366c75fae5f6b5f99c6c599f8264607f1e8a1dcc8e4c090d46bfb
SHA5129ce239eb59382d2b9066071b7852ea8a23c674ea87da61ca146914cb8a46f1eb4cb0409a5aa570358d7037efafe37fda2281b439b5dd5503d5b043eca9c70a19
-
Filesize
218B
MD59ff327098937af0024a37dcf4c861617
SHA18e76a4f2b8cba2baf0d83b3a3abb40b59aad3574
SHA256f74b215f1631ec9f1ce5174420c3aca751ddf53cfa0e3292ba9e3e6746609a17
SHA5124caec0c7da0cf5e797b4ac173b17397153b76635c75f6aaaeaa80aa98451e2562e55e7ca513c0cba2ad9bce2ab807ea3f9a9d5d44db3e95e0b7ffcef11c35229
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478