Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 08:51
Behavioral task
behavioral1
Sample
JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe
-
Size
1.3MB
-
MD5
95655ccd25fbec3f975fa42bb78a9aa3
-
SHA1
a559392860ef2372f633d88fce8da619fbcf0392
-
SHA256
8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c
-
SHA512
b7df2e447e49cec22d5246be7f5bc5c71e8cfac3a963cbcf41da61af6318e65a1b58b7948946009bcc414899f128717ca0cad2ef35735cec9ea294c5e7018e0f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4304 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4940 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4664 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3320 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 716 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4792 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3960 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3932 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 828 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 824 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3416 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3656 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3136 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 2316 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 2316 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x000a000000023b8e-10.dat dcrat behavioral2/memory/3548-13-0x0000000000EA0000-0x0000000000FB0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3608 powershell.exe 4348 powershell.exe 4436 powershell.exe 2380 powershell.exe 3736 powershell.exe 1092 powershell.exe 296 powershell.exe 4140 powershell.exe 1100 powershell.exe 3924 powershell.exe 3260 powershell.exe 1268 powershell.exe 516 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe -
Executes dropped EXE 14 IoCs
pid Process 3548 DllCommonsvc.exe 3716 explorer.exe 736 explorer.exe 4564 explorer.exe 1192 explorer.exe 2804 explorer.exe 1248 explorer.exe 620 explorer.exe 4456 explorer.exe 1708 explorer.exe 4924 explorer.exe 4584 explorer.exe 4856 explorer.exe 1732 explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 50 raw.githubusercontent.com 52 raw.githubusercontent.com 55 raw.githubusercontent.com 18 raw.githubusercontent.com 39 raw.githubusercontent.com 40 raw.githubusercontent.com 41 raw.githubusercontent.com 53 raw.githubusercontent.com 54 raw.githubusercontent.com 17 raw.githubusercontent.com 38 raw.githubusercontent.com 44 raw.githubusercontent.com 45 raw.githubusercontent.com -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\de-DE\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files\Windows Media Player\Network Sharing\SearchApp.exe DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\services.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files\Internet Explorer\de-DE\explorer.exe DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\cmd.exe DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files\Windows Media Player\Network Sharing\38384e6a620884 DllCommonsvc.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\System.exe DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe DllCommonsvc.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\27d1bcfc3c54e0 DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ja-JP\services.exe DllCommonsvc.exe File created C:\Windows\ja-JP\c5b4cb5e9653cc DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3136 schtasks.exe 1344 schtasks.exe 1484 schtasks.exe 4896 schtasks.exe 824 schtasks.exe 1952 schtasks.exe 3656 schtasks.exe 5064 schtasks.exe 1592 schtasks.exe 4792 schtasks.exe 3960 schtasks.exe 2992 schtasks.exe 4728 schtasks.exe 1196 schtasks.exe 4664 schtasks.exe 3320 schtasks.exe 3932 schtasks.exe 828 schtasks.exe 2224 schtasks.exe 4304 schtasks.exe 1252 schtasks.exe 4940 schtasks.exe 1580 schtasks.exe 2436 schtasks.exe 2108 schtasks.exe 2792 schtasks.exe 1184 schtasks.exe 1948 schtasks.exe 1388 schtasks.exe 716 schtasks.exe 1688 schtasks.exe 4236 schtasks.exe 3416 schtasks.exe 1248 schtasks.exe 2104 schtasks.exe 2956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 4348 powershell.exe 4348 powershell.exe 4140 powershell.exe 4140 powershell.exe 4436 powershell.exe 4436 powershell.exe 516 powershell.exe 516 powershell.exe 1092 powershell.exe 1092 powershell.exe 3608 powershell.exe 3608 powershell.exe 2380 powershell.exe 2380 powershell.exe 1268 powershell.exe 1268 powershell.exe 3260 powershell.exe 3260 powershell.exe 1100 powershell.exe 1100 powershell.exe 3736 powershell.exe 3736 powershell.exe 1100 powershell.exe 3924 powershell.exe 3924 powershell.exe 4348 powershell.exe 296 powershell.exe 296 powershell.exe 4140 powershell.exe 4436 powershell.exe 1268 powershell.exe 1092 powershell.exe 516 powershell.exe 2380 powershell.exe 3608 powershell.exe 3736 powershell.exe 3924 powershell.exe 3260 powershell.exe 296 powershell.exe 3716 explorer.exe 736 explorer.exe 4564 explorer.exe 1192 explorer.exe 2804 explorer.exe 1248 explorer.exe 620 explorer.exe 4456 explorer.exe 1708 explorer.exe 4924 explorer.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 3548 DllCommonsvc.exe Token: SeDebugPrivilege 4348 powershell.exe Token: SeDebugPrivilege 4140 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 516 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeDebugPrivilege 3260 powershell.exe Token: SeDebugPrivilege 296 powershell.exe Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 3736 powershell.exe Token: SeDebugPrivilege 3716 explorer.exe Token: SeDebugPrivilege 736 explorer.exe Token: SeDebugPrivilege 4564 explorer.exe Token: SeDebugPrivilege 1192 explorer.exe Token: SeDebugPrivilege 2804 explorer.exe Token: SeDebugPrivilege 1248 explorer.exe Token: SeDebugPrivilege 620 explorer.exe Token: SeDebugPrivilege 4456 explorer.exe Token: SeDebugPrivilege 1708 explorer.exe Token: SeDebugPrivilege 4924 explorer.exe Token: SeDebugPrivilege 4584 explorer.exe Token: SeDebugPrivilege 4856 explorer.exe Token: SeDebugPrivilege 1732 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3636 wrote to memory of 448 3636 JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe 82 PID 3636 wrote to memory of 448 3636 JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe 82 PID 3636 wrote to memory of 448 3636 JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe 82 PID 448 wrote to memory of 2384 448 WScript.exe 83 PID 448 wrote to memory of 2384 448 WScript.exe 83 PID 448 wrote to memory of 2384 448 WScript.exe 83 PID 2384 wrote to memory of 3548 2384 cmd.exe 85 PID 2384 wrote to memory of 3548 2384 cmd.exe 85 PID 3548 wrote to memory of 3736 3548 DllCommonsvc.exe 123 PID 3548 wrote to memory of 3736 3548 DllCommonsvc.exe 123 PID 3548 wrote to memory of 3260 3548 DllCommonsvc.exe 124 PID 3548 wrote to memory of 3260 3548 DllCommonsvc.exe 124 PID 3548 wrote to memory of 1268 3548 DllCommonsvc.exe 125 PID 3548 wrote to memory of 1268 3548 DllCommonsvc.exe 125 PID 3548 wrote to memory of 516 3548 DllCommonsvc.exe 126 PID 3548 wrote to memory of 516 3548 DllCommonsvc.exe 126 PID 3548 wrote to memory of 4140 3548 DllCommonsvc.exe 127 PID 3548 wrote to memory of 4140 3548 DllCommonsvc.exe 127 PID 3548 wrote to memory of 1092 3548 DllCommonsvc.exe 128 PID 3548 wrote to memory of 1092 3548 DllCommonsvc.exe 128 PID 3548 wrote to memory of 296 3548 DllCommonsvc.exe 129 PID 3548 wrote to memory of 296 3548 DllCommonsvc.exe 129 PID 3548 wrote to memory of 3608 3548 DllCommonsvc.exe 130 PID 3548 wrote to memory of 3608 3548 DllCommonsvc.exe 130 PID 3548 wrote to memory of 4348 3548 DllCommonsvc.exe 131 PID 3548 wrote to memory of 4348 3548 DllCommonsvc.exe 131 PID 3548 wrote to memory of 4436 3548 DllCommonsvc.exe 132 PID 3548 wrote to memory of 4436 3548 DllCommonsvc.exe 132 PID 3548 wrote to memory of 2380 3548 DllCommonsvc.exe 133 PID 3548 wrote to memory of 2380 3548 DllCommonsvc.exe 133 PID 3548 wrote to memory of 1100 3548 DllCommonsvc.exe 134 PID 3548 wrote to memory of 1100 3548 DllCommonsvc.exe 134 PID 3548 wrote to memory of 3924 3548 DllCommonsvc.exe 135 PID 3548 wrote to memory of 3924 3548 DllCommonsvc.exe 135 PID 3548 wrote to memory of 2456 3548 DllCommonsvc.exe 149 PID 3548 wrote to memory of 2456 3548 DllCommonsvc.exe 149 PID 2456 wrote to memory of 1156 2456 cmd.exe 151 PID 2456 wrote to memory of 1156 2456 cmd.exe 151 PID 2456 wrote to memory of 3716 2456 cmd.exe 152 PID 2456 wrote to memory of 3716 2456 cmd.exe 152 PID 3716 wrote to memory of 3164 3716 explorer.exe 157 PID 3716 wrote to memory of 3164 3716 explorer.exe 157 PID 3164 wrote to memory of 4360 3164 cmd.exe 161 PID 3164 wrote to memory of 4360 3164 cmd.exe 161 PID 3164 wrote to memory of 736 3164 cmd.exe 162 PID 3164 wrote to memory of 736 3164 cmd.exe 162 PID 736 wrote to memory of 4792 736 explorer.exe 165 PID 736 wrote to memory of 4792 736 explorer.exe 165 PID 4792 wrote to memory of 3964 4792 cmd.exe 167 PID 4792 wrote to memory of 3964 4792 cmd.exe 167 PID 4792 wrote to memory of 4564 4792 cmd.exe 168 PID 4792 wrote to memory of 4564 4792 cmd.exe 168 PID 4564 wrote to memory of 3920 4564 explorer.exe 169 PID 4564 wrote to memory of 3920 4564 explorer.exe 169 PID 3920 wrote to memory of 4544 3920 cmd.exe 171 PID 3920 wrote to memory of 4544 3920 cmd.exe 171 PID 3920 wrote to memory of 1192 3920 cmd.exe 172 PID 3920 wrote to memory of 1192 3920 cmd.exe 172 PID 1192 wrote to memory of 4840 1192 explorer.exe 173 PID 1192 wrote to memory of 4840 1192 explorer.exe 173 PID 4840 wrote to memory of 3868 4840 cmd.exe 175 PID 4840 wrote to memory of 3868 4840 cmd.exe 175 PID 4840 wrote to memory of 2804 4840 cmd.exe 176 PID 4840 wrote to memory of 2804 4840 cmd.exe 176 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f454a072c53600324b5aba6730a123cea7883ad3ad7246deba60253d858e58c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ja-JP\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\de-DE\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\Network Sharing\SearchApp.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VGm7U9D4eW.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1156
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8YXrskW4JY.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:4360
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OVj8bjUD5N.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:3964
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vhtd8auDHa.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:4544
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ESzt3JT3T8.bat"13⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:3868
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3gUlVaPHfz.bat"15⤵PID:2344
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:4660
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5cWoBfSAzl.bat"17⤵PID:1196
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2800
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hGpPWS23Hw.bat"19⤵PID:3020
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:3592
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VAhDAdBh8f.bat"21⤵PID:3904
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:1168
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SNnEytbzjv.bat"23⤵PID:2544
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:1008
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TEfATY8not.bat"25⤵PID:2228
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:4680
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4584 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TEfATY8not.bat"27⤵PID:1256
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:4420
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5cWoBfSAzl.bat"29⤵PID:4252
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:230⤵PID:3260
-
-
C:\Program Files\Internet Explorer\de-DE\explorer.exe"C:\Program Files\Internet Explorer\de-DE\explorer.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\providercommon\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Windows\ja-JP\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Windows\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Default User\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\de-DE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\de-DE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\de-DE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Reference Assemblies\Microsoft\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Reference Assemblies\Microsoft\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Media Player\Network Sharing\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Network Sharing\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\Network Sharing\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
218B
MD5ac25ec953a5e20c0197b09ab452579ee
SHA1520a28c3ae0b372bcf833c5ab50ecda34d20b2e7
SHA256cfcc15d95e5dfe558c8f24dc5c2e0b52b03835943f2a7e85a12be86ef3f260bf
SHA512682dd34365981be913040c87af18c6106ddda1b45a01e65011a45e6de92d6b2073986d262e32c332d40155a45696a9517ef2f2834380a77903bb85f048844b22
-
Filesize
218B
MD5c0e99c461e591dc689b81900f55b74bb
SHA1caf102fb226cece6ecdedbe620ac593ee826eb4d
SHA2561d178f2e64a47c42e8b9c7506ceb5943fbe8f14fe90426bf0eccafbe1ea13476
SHA5128e9204d2229e6d28aba4dec0e0a20d136f70a6ce52fc4ac2c4879c9157f93bed9c0bc8d4613c954cc7e5f53cc6e7acdcd857a86956f6cd8bcf33772b99cb9acc
-
Filesize
218B
MD594f9d961f7c1837f5788acbc82312a6c
SHA15e40028733bc5fd0a4f4608511399c47694ebdb3
SHA256b4cbe005b70a86677631ffc8eb73efdeb96e51eda8a17dda1bc092da5dba37d7
SHA5125ac5ca8acb6c21a9d627862de853bbaaf4bd504d229970112d1aeaf46cea2c609dbbf5c76719052585849be255c202638366f9d9fe0b66acfc123d59d21f3fdf
-
Filesize
218B
MD53e0a27158df98ea241821ea7aca8d23f
SHA13e4adb2c908bf4ef3b0a503b9f2bf78c91a5fb4d
SHA2564ba80b6ae03f1a3ef4efe5ccd178e2eddb477ec98b62d528e37a16c4b6cd7a19
SHA51294bac6e510c78c939d0b47d8bcf477f7ccbda9bfa756216259cfda55d89019fc01000237658caccddffabe81efa58ab20c45e559a10b25d7f531e6da5d1d8eea
-
Filesize
218B
MD56151d35a6a6aa1d89d1549a2036f5b30
SHA129eea602ab09cb51ccc7d10f528bfa9a770aac1d
SHA2561d3903281bed9e79efeab057c49dafa6be051a8d67b3fac479d8fe06319880f8
SHA512765443116b3e8fd75ee63927eb45c708efe54b7a20f69445446ac916f11f35d43eb6c0cb6741ce853887b150f5e1d743de7c9592d9e0c18efbdeb0db6fbf4946
-
Filesize
218B
MD53603539f965830fea013bf54870dec37
SHA15d114c7f7d4a5ecf17f8b3ba773feb5bad8d48fb
SHA256a32c7fa56dfa5d70676aff20088c7c3feea8de044aa6ef1c4333d1580d4c5612
SHA512bc9eaaa4aa411d35e6230047d670e1654b42bf93ecb101d165861f13241f4c89ddf532b6d7cf83c4c5228342b08d0111fd0dccb2fb8b467abc9d8b3b7d54c780
-
Filesize
218B
MD53da13bacd2779b1fb45260c859aaad73
SHA148b7bbe794a97d4d813d689afbe352f359a616c8
SHA256e87c6269a533dc62c7f808d2fa3c536eb904ed1036a6d59300409387d790ec83
SHA5123eadde13180ed46304f93e8d0739ccb24bb08044e7d17a57f0b8a320d576d9191d08ec9fd92412f6d6046a5e697e3e2c85ff90a5ff08e633bad4c64a91d0c46c
-
Filesize
218B
MD5d45538528ead1be44ef57ada7f9e60ea
SHA1c618829394deba5b21016b035ae5e4eb4ef05226
SHA25639d4e1044fa25e989e7fc01a411e4900ec2a3372cccacc4d90edf10ee1f670b3
SHA512f46dd43126ca744d8d01523a067a5c3eefa11af38bbd61a50aa564ebf518a7cd973dc53b7ea012942f352ee2f422fb32e2f1cd1f07887c2a4a353c1d9eb58ee7
-
Filesize
218B
MD5fd1a6c55a0fc5dd81ac39c6158d93e97
SHA1673ce7b50d8220f701edf3a5a488e34df66b4a6e
SHA25636ddc78de50778f319dc873a62bb638187fd5a184c0a4d3578d03284e383b22f
SHA512d494308ea762fe605d76070e467edf22658a8c57f55676c9c864fc9adef57b09a97d022862bd5115aaa5264a262cf12f889fea240d67c956fec493614e2a14cb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
218B
MD52c621e51fcb6ac587d12d4d3beb0a2b9
SHA1bab49cb36981448b3cfdb364f013668b589296a0
SHA256e40735aee80a96dd22916243624d5456c023c63a13b5f21bfd2e053d5b6b890e
SHA512e28ccd25591af03c737614357ab195908c78c1a9efea3025c2d0a7a5262a405ca7034dd00bdcaddc24739207c5da8069f2753be7a669aaccdce8eafe1c99984a
-
Filesize
218B
MD5466df3bf8d7e6b78ac1aa2d89d39c4d3
SHA1601a7abeafa273b88b913bf4d529e7290776cd1c
SHA2569af0958dab8e042da5ca428a59a2a83f48b0903b7049b3c1fdd6176d03bd9745
SHA512fcc30b1527877059c4b18a4cdb86fe4f522a169834f53486bf7ca20cc26af941e09f3cc93960ecba8c500b0bcb0a48f94778213fe813ef45a502bf5032389ef2
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478