Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 09:05
Behavioral task
behavioral1
Sample
JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe
-
Size
1.3MB
-
MD5
7028baf729e4925316b6752f65e1e7be
-
SHA1
4964bd9556adf306d679d9b446cc0997afc940df
-
SHA256
ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7
-
SHA512
462f7b0c3ce50d0808c094d3dd599cc06c76f557192d1b9f8a39f8cd4865454b8f87f33f8696551f17fc713189607603a6e2850a6293cfff26766e29ccdf84b3
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1472 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 264 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 884 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 768 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1240 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1228 2780 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2780 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000019394-9.dat dcrat behavioral1/memory/2136-13-0x0000000000E60000-0x0000000000F70000-memory.dmp dcrat behavioral1/memory/1564-108-0x00000000013E0000-0x00000000014F0000-memory.dmp dcrat behavioral1/memory/1596-134-0x0000000000030000-0x0000000000140000-memory.dmp dcrat behavioral1/memory/2936-243-0x0000000000250000-0x0000000000360000-memory.dmp dcrat behavioral1/memory/2880-304-0x0000000001040000-0x0000000001150000-memory.dmp dcrat behavioral1/memory/2616-365-0x0000000000080000-0x0000000000190000-memory.dmp dcrat behavioral1/memory/2888-425-0x0000000000240000-0x0000000000350000-memory.dmp dcrat behavioral1/memory/2216-485-0x00000000012D0000-0x00000000013E0000-memory.dmp dcrat behavioral1/memory/2884-545-0x00000000002C0000-0x00000000003D0000-memory.dmp dcrat behavioral1/memory/1316-605-0x0000000000DE0000-0x0000000000EF0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 22 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2556 powershell.exe 3056 powershell.exe 2260 powershell.exe 628 powershell.exe 580 powershell.exe 836 powershell.exe 1740 powershell.exe 2812 powershell.exe 3044 powershell.exe 3020 powershell.exe 2208 powershell.exe 2352 powershell.exe 952 powershell.exe 1688 powershell.exe 2912 powershell.exe 2928 powershell.exe 2368 powershell.exe 2172 powershell.exe 1168 powershell.exe 2876 powershell.exe 3016 powershell.exe 1628 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2136 DllCommonsvc.exe 2028 DllCommonsvc.exe 1564 DllCommonsvc.exe 1596 lsm.exe 2936 lsm.exe 2880 lsm.exe 2616 lsm.exe 2888 lsm.exe 2216 lsm.exe 2884 lsm.exe 1316 lsm.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 cmd.exe 3068 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 19 raw.githubusercontent.com 23 raw.githubusercontent.com 27 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\Visualizations\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\24dbde2999530e DllCommonsvc.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\dllhost.exe DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\5940a34987c991 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Office\Idle.exe DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\dllhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Office\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\csrss.exe DllCommonsvc.exe File created C:\Program Files\Google\Chrome\Application\24dbde2999530e DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\csrss.exe DllCommonsvc.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\L2Schemas\conhost.exe DllCommonsvc.exe File created C:\Windows\ServiceProfiles\NetworkService\spoolsv.exe DllCommonsvc.exe File created C:\Windows\AppPatch\6203df4a6bafc7 DllCommonsvc.exe File created C:\Windows\PLA\Reports\fr-FR\lsm.exe DllCommonsvc.exe File created C:\Windows\PLA\Reports\fr-FR\101b941d020240 DllCommonsvc.exe File created C:\Windows\L2Schemas\088424020bedd6 DllCommonsvc.exe File created C:\Windows\ServiceProfiles\NetworkService\f3b6ecef712a24 DllCommonsvc.exe File created C:\Windows\AppPatch\lsass.exe DllCommonsvc.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\schtasks.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1628 schtasks.exe 2176 schtasks.exe 1932 schtasks.exe 1776 schtasks.exe 2240 schtasks.exe 2904 schtasks.exe 1080 schtasks.exe 2576 schtasks.exe 2632 schtasks.exe 1736 schtasks.exe 1820 schtasks.exe 1804 schtasks.exe 1124 schtasks.exe 1080 schtasks.exe 2892 schtasks.exe 1732 schtasks.exe 1476 schtasks.exe 2080 schtasks.exe 2748 schtasks.exe 1944 schtasks.exe 1836 schtasks.exe 2872 schtasks.exe 2624 schtasks.exe 2512 schtasks.exe 2348 schtasks.exe 768 schtasks.exe 1724 schtasks.exe 2852 schtasks.exe 2140 schtasks.exe 1892 schtasks.exe 2356 schtasks.exe 1472 schtasks.exe 2884 schtasks.exe 2524 schtasks.exe 2104 schtasks.exe 2148 schtasks.exe 2868 schtasks.exe 1660 schtasks.exe 264 schtasks.exe 1020 schtasks.exe 580 schtasks.exe 2720 schtasks.exe 2604 schtasks.exe 884 schtasks.exe 1228 schtasks.exe 1740 schtasks.exe 1684 schtasks.exe 2060 schtasks.exe 1304 schtasks.exe 1124 schtasks.exe 2864 schtasks.exe 2188 schtasks.exe 2472 schtasks.exe 1240 schtasks.exe 672 schtasks.exe 2628 schtasks.exe 2552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2136 DllCommonsvc.exe 1740 powershell.exe 952 powershell.exe 1688 powershell.exe 836 powershell.exe 2028 DllCommonsvc.exe 580 powershell.exe 1168 powershell.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2028 DllCommonsvc.exe 2912 powershell.exe 2876 powershell.exe 3016 powershell.exe 2812 powershell.exe 2928 powershell.exe 3044 powershell.exe 1564 DllCommonsvc.exe 2208 powershell.exe 1628 powershell.exe 628 powershell.exe 2368 powershell.exe 2172 powershell.exe 2556 powershell.exe 2352 powershell.exe 3056 powershell.exe 3020 powershell.exe 2260 powershell.exe 1596 lsm.exe 2936 lsm.exe 2880 lsm.exe 2616 lsm.exe 2888 lsm.exe 2216 lsm.exe 2884 lsm.exe 1316 lsm.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2136 DllCommonsvc.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 952 powershell.exe Token: SeDebugPrivilege 2028 DllCommonsvc.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 580 powershell.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 3016 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 1564 DllCommonsvc.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 1596 lsm.exe Token: SeDebugPrivilege 1628 powershell.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 2936 lsm.exe Token: SeDebugPrivilege 2880 lsm.exe Token: SeDebugPrivilege 2616 lsm.exe Token: SeDebugPrivilege 2888 lsm.exe Token: SeDebugPrivilege 2216 lsm.exe Token: SeDebugPrivilege 2884 lsm.exe Token: SeDebugPrivilege 1316 lsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2912 2152 JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe 30 PID 2152 wrote to memory of 2912 2152 JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe 30 PID 2152 wrote to memory of 2912 2152 JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe 30 PID 2152 wrote to memory of 2912 2152 JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe 30 PID 2912 wrote to memory of 3068 2912 WScript.exe 31 PID 2912 wrote to memory of 3068 2912 WScript.exe 31 PID 2912 wrote to memory of 3068 2912 WScript.exe 31 PID 2912 wrote to memory of 3068 2912 WScript.exe 31 PID 3068 wrote to memory of 2136 3068 cmd.exe 33 PID 3068 wrote to memory of 2136 3068 cmd.exe 33 PID 3068 wrote to memory of 2136 3068 cmd.exe 33 PID 3068 wrote to memory of 2136 3068 cmd.exe 33 PID 2136 wrote to memory of 1168 2136 DllCommonsvc.exe 50 PID 2136 wrote to memory of 1168 2136 DllCommonsvc.exe 50 PID 2136 wrote to memory of 1168 2136 DllCommonsvc.exe 50 PID 2136 wrote to memory of 1740 2136 DllCommonsvc.exe 51 PID 2136 wrote to memory of 1740 2136 DllCommonsvc.exe 51 PID 2136 wrote to memory of 1740 2136 DllCommonsvc.exe 51 PID 2136 wrote to memory of 1688 2136 DllCommonsvc.exe 52 PID 2136 wrote to memory of 1688 2136 DllCommonsvc.exe 52 PID 2136 wrote to memory of 1688 2136 DllCommonsvc.exe 52 PID 2136 wrote to memory of 580 2136 DllCommonsvc.exe 53 PID 2136 wrote to memory of 580 2136 DllCommonsvc.exe 53 PID 2136 wrote to memory of 580 2136 DllCommonsvc.exe 53 PID 2136 wrote to memory of 952 2136 DllCommonsvc.exe 54 PID 2136 wrote to memory of 952 2136 DllCommonsvc.exe 54 PID 2136 wrote to memory of 952 2136 DllCommonsvc.exe 54 PID 2136 wrote to memory of 836 2136 DllCommonsvc.exe 55 PID 2136 wrote to memory of 836 2136 DllCommonsvc.exe 55 PID 2136 wrote to memory of 836 2136 DllCommonsvc.exe 55 PID 2136 wrote to memory of 2028 2136 DllCommonsvc.exe 62 PID 2136 wrote to memory of 2028 2136 DllCommonsvc.exe 62 PID 2136 wrote to memory of 2028 2136 DllCommonsvc.exe 62 PID 2028 wrote to memory of 2912 2028 DllCommonsvc.exe 78 PID 2028 wrote to memory of 2912 2028 DllCommonsvc.exe 78 PID 2028 wrote to memory of 2912 2028 DllCommonsvc.exe 78 PID 2028 wrote to memory of 3016 2028 DllCommonsvc.exe 79 PID 2028 wrote to memory of 3016 2028 DllCommonsvc.exe 79 PID 2028 wrote to memory of 3016 2028 DllCommonsvc.exe 79 PID 2028 wrote to memory of 3044 2028 DllCommonsvc.exe 80 PID 2028 wrote to memory of 3044 2028 DllCommonsvc.exe 80 PID 2028 wrote to memory of 3044 2028 DllCommonsvc.exe 80 PID 2028 wrote to memory of 2928 2028 DllCommonsvc.exe 82 PID 2028 wrote to memory of 2928 2028 DllCommonsvc.exe 82 PID 2028 wrote to memory of 2928 2028 DllCommonsvc.exe 82 PID 2028 wrote to memory of 2812 2028 DllCommonsvc.exe 83 PID 2028 wrote to memory of 2812 2028 DllCommonsvc.exe 83 PID 2028 wrote to memory of 2812 2028 DllCommonsvc.exe 83 PID 2028 wrote to memory of 2876 2028 DllCommonsvc.exe 84 PID 2028 wrote to memory of 2876 2028 DllCommonsvc.exe 84 PID 2028 wrote to memory of 2876 2028 DllCommonsvc.exe 84 PID 2028 wrote to memory of 2616 2028 DllCommonsvc.exe 90 PID 2028 wrote to memory of 2616 2028 DllCommonsvc.exe 90 PID 2028 wrote to memory of 2616 2028 DllCommonsvc.exe 90 PID 2616 wrote to memory of 2044 2616 cmd.exe 92 PID 2616 wrote to memory of 2044 2616 cmd.exe 92 PID 2616 wrote to memory of 2044 2616 cmd.exe 92 PID 2616 wrote to memory of 1564 2616 cmd.exe 93 PID 2616 wrote to memory of 1564 2616 cmd.exe 93 PID 2616 wrote to memory of 1564 2616 cmd.exe 93 PID 1564 wrote to memory of 3020 1564 DllCommonsvc.exe 121 PID 1564 wrote to memory of 3020 1564 DllCommonsvc.exe 121 PID 1564 wrote to memory of 3020 1564 DllCommonsvc.exe 121 PID 1564 wrote to memory of 1628 1564 DllCommonsvc.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca4154203347ca772fdf06adc29733851925025d1756f46e420909820c54e3f7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\L2Schemas\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ServiceProfiles\NetworkService\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\AppPatch\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Application Data\lsass.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\WmiPrvSE.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\Visualizations\csrss.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\csrss.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iJ1YqAQlzh.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2044
-
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\defaults\pref\dllhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\dllhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Office\Idle.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\DllCommonsvc.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\dwm.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Favorites\dllhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\Reports\fr-FR\lsm.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UucX7bnqC8.bat"9⤵PID:2888
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:472
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\srJhtCwLGi.bat"11⤵PID:2448
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:580
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BcPyovVCSH.bat"13⤵PID:2044
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2928
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fcYyv3mAUp.bat"15⤵PID:1972
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2628
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bhowVEGEG8.bat"17⤵PID:2280
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:1820
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Urxb3wPgb0.bat"19⤵PID:2904
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:1704
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kYBl3UyOdq.bat"21⤵PID:2940
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2500
-
-
C:\Windows\PLA\Reports\fr-FR\lsm.exe"C:\Windows\PLA\Reports\fr-FR\lsm.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\providercommon\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Windows\L2Schemas\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\L2Schemas\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Windows\L2Schemas\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\ServiceProfiles\NetworkService\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\NetworkService\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Windows\ServiceProfiles\NetworkService\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\AppPatch\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\AppPatch\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Windows\AppPatch\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Application Data\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\All Users\Application Data\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Application Data\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\providercommon\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Office\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Office\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Favorites\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\Favorites\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Favorites\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Windows\PLA\Reports\fr-FR\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\PLA\Reports\fr-FR\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Windows\PLA\Reports\fr-FR\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906fc15c8f3cf8d85590a1dde9ee22ce
SHA1e53300db75c6743ef48cfd960cdfa2826a7e7eea
SHA2565c249d6487337c4ffff785512f1cff7e4a1d9bd2b410b93c8f4f895f116649f9
SHA512eb38acbdb66925adcc4bcd338a7809140bfdac1e61d20b735b38339d269f8dc76b2220db57e78515ae3bba93b9bc446169f4489fa3cbef05613ba1c5e96d77d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ab279f71b0d5247998b42233433137
SHA18538217ce006be7c9587eae61cb001ee8f7d1bdc
SHA2568a5f138580b1bec2cadaa89cf3cb92fd8c1aa996cb5287488f84bebd84c67a8a
SHA512cea9f411095880b30b9dcab48a55d9e3b5e087d926023d3087b151792e623faa44741edbaed96a8aa28a9246e43f76d7ca2ba980bdde992cc541bcc5e796d75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5eedb1ddd3f0d31031830e1d1946d58
SHA127e472663dd8c1c8b3cf24b96c6aed6e4066972d
SHA25614685f13b494983e7ea3c45e2e0567ef1a314497f0343b319d4faf1f10b59caf
SHA5121a71a5a1b8a71547fdcb501a0fc3b7b5dc1614ffaa2defa4c54fe73b0b275130f6cac3757142d0c8571dea1fc1bec308ea11066f46e2aae3604126e990b1db01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287adcfa8cf7ef6241068e26e234fdba
SHA19783abcf2a354a8be803aa403a9a2a5c4f464a76
SHA25602d37a43ea8c6f7ac4fe4e29911ec6532c376c06e965ae347d33391abff1d7bc
SHA51200e86ab48ba03406f741035700707d313bbe9773a46035e63cff79fbd99a152d5fb4168462a74bd65d4782aef740f5879b8235f24cdbce668e5a9df4dfef15f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c814bc15107b2c6889a1bde54888ee50
SHA151e15129a8b3c0b659b1edec520203292f67b54a
SHA256c60420e5d3217698c44ee186a832f6fe15275ae1a7f6cded3e7273a4d9eeb2e2
SHA512817993e91031d82571edcc7ca68c54e9829107790cb9b9880706577bbd6d4983907b08b84f3252d7ae576bae34f320a9b0989053c53eacd2265c6b965cf08bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f6f0e8d4416108af9ca906470b07c1
SHA1cd3eaeba283289b18b19b54ba23fc448359d65f6
SHA256f2e6fefc9fbbea9a1b2132994724f22730d6c07cd240fec3b634e8e09f3877c8
SHA5120110cf2f6d3c04bf9644597761140ea84b6911665a866efc84e3ba4e6f0964fd1054df98ed4c8574189d85ffd0550b1d01cc307c1568f4fefdd71797722e446c
-
Filesize
201B
MD53559043cddbdab0b9b2274903b5dd926
SHA10835c5a388fc1a7b3b0a4768c3b16dd586243882
SHA25612453d44f08ff29d062b265d95f6b99b19401935dec95a61eb4589334f51e8c1
SHA51272a71a2324dcb003f321438a79d6192d33140f9722ea510e0380c2286d5a87163713c610cbd67ca6d0012013dc5139370001082ccd26ff1f04d01190ba7732b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
201B
MD510ad8fa754762a79eaeec8e4e5e3f049
SHA165a46a7688fac1b0f0fecca3e4b0af21e7830e42
SHA25631620723c62e8af7bcd816d1a092d285c6573e30be8910b00c1404b512b5f2d4
SHA512732c2d169237bf813936bdf1744a5aacad475cea6f36190f4b55da92e7c3d53bd3e55787e46db54ad0a68dbd956e06d736652e8f46141e41b0d2ee199e9bfb4b
-
Filesize
201B
MD554e4b11c38b818c6e37427db437caae1
SHA1da649bd6b86a8ea738c5164ad5e9cbd08e035ba1
SHA256ebee937b3a531b01372a96e103d3c752f9d08a499006e4ded4c3c80003a4f816
SHA512f42864937848657d0e023143ec7789d373588ae0deb73617f65e12d2166bd0dd42ca53f1453854b75a63da5eec1fd6224bb94902ed5f8225000ab58a9bbe081d
-
Filesize
201B
MD54dbb524378e277c473c4b5295764869b
SHA15056016dc99f1c471f3ae47f9958409712d5e223
SHA256cb225aa01f027f95b55da37e84838737874d01f1c617c41339ce88bda4700beb
SHA512a876de7209a3dbfc56dac97e8b084d1526759cb29f73dd93c40feb14703d5d74a41f2193c8274f4e29f714cc6613ea8f15421cc0e5c8967c9cef9c498287def1
-
Filesize
201B
MD59e72bb7ae6899fd0a892c60b8bdedb8d
SHA1f1a9fc086b4179dfe7c0be486602df2a966c26a5
SHA256335e7bacd8cf7de1e5eca823fa4e28a3c6b8098d71bd2a440dd646772029a1bb
SHA5121affcf4544b6e61453f77c64d026333271d2c042565879395aa0afdda62eac8cad045dfa801793af8a2ec447fa248aa430fae43aa71e6ce0853b9f46619632eb
-
Filesize
199B
MD55b7f405b53327cfa601adc4d1ec43786
SHA1361893e4dda7b4b658e44f8377a70011f6073220
SHA256ea18d848797d8cdbb50c5747fe2612bfc70cee836e7d06604ee7f75cf741bb28
SHA512c1eabe6de3a3f5ec21222cc7e9f9f6196b5678b27242d2c3957e924abb447556ac0455822fab89784df6ceae5f73be81712d814cd3e0f9bbbc1c1a882e919f57
-
Filesize
201B
MD5e4bfac4f6fe74b65f4646a7242013e4a
SHA1f7bd50affebc5fd6f3fb19f5d76157f82e3e1b2f
SHA256916ddd07d543b2938c010524b12988d849aea60cab7e13968fde108826d63619
SHA512704aec39f117a2219a70ea1b5a13c301cb5b649f24132d8adbda63836722d102497301830934cd5762b2ed1c49192fdeadec58b5481702126e92f916e0de5902
-
Filesize
201B
MD5e9a9bd113700ff14a41d32a68a9a5375
SHA190d572dcbf01a29de7487d069ceb10330948bf07
SHA256f8b693e9bfed1a0d038f1cad067aab28eef5430aef78f44df218128ab61e7e9a
SHA51278ff61ba6beab55dbec00386bb988597c261bb1c1dc824c10b92040236f685fae5fc15d43e9c1ffe9e47d2de0dc2c88e761b43ffb28406a63900b836b1016f0f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5352144c56a9f318e4ab029479c4fa1a9
SHA1ca63fbd1fd35eda37744d56160855c7fa3aea107
SHA256f4270b332ec9133d5993789ed73674f487cfdf2105ecf4103a3c571d778e42d4
SHA512ff57d006efca140132d3fa1fc8f6337d220bbdd1b0ccc806455f38b8bb7890975a32713a55620ff382e87153c1af3985a2e567e95142e7bc8000fc616fadb2d7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7NY70B4V2MFJJQEDCGVP.temp
Filesize7KB
MD522eafd9a9cb646acf95520fe7d44e221
SHA1c5cd1a983659a0d8e8618574af2008f16d7ec06e
SHA25615f72779d52d4f4215582ae839e6d08fb84c5662651502d787893846c0e92a46
SHA512ccc707189a8300bc66445fdefa39b1a568111fca3e60f7be8419e5c7965187c5f84b9795a0b9f98fe5909b0b7a64d73f63cd720d3dd66392bbca0e6111b6db48
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394