Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 10:03 UTC
Behavioral task
behavioral1
Sample
JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe
-
Size
1.3MB
-
MD5
729025ccae706f9e22326c6a3b64dbb2
-
SHA1
27606d28d4aef51d17751dd178e9404719a81ee0
-
SHA256
1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c
-
SHA512
95061841dcde7b634d0664b83a11e66de6c70dfde657c3f6a5d3c1b9564ebd52991cde2e5c95496b1dacc0133719ea4248c9499eec6e8820de4c6f220d6a5ed1
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 848 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 576 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1372 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 648 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 960 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 284 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1160 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 828 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 2904 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x000800000001746a-10.dat dcrat behavioral1/memory/2800-13-0x0000000000C90000-0x0000000000DA0000-memory.dmp dcrat behavioral1/memory/1120-60-0x00000000009D0000-0x0000000000AE0000-memory.dmp dcrat behavioral1/memory/2096-207-0x0000000000E10000-0x0000000000F20000-memory.dmp dcrat behavioral1/memory/1720-267-0x0000000000EC0000-0x0000000000FD0000-memory.dmp dcrat behavioral1/memory/640-327-0x0000000000120000-0x0000000000230000-memory.dmp dcrat behavioral1/memory/1988-387-0x0000000000D40000-0x0000000000E50000-memory.dmp dcrat behavioral1/memory/2004-448-0x00000000011A0000-0x00000000012B0000-memory.dmp dcrat behavioral1/memory/2556-567-0x0000000000010000-0x0000000000120000-memory.dmp dcrat behavioral1/memory/2220-627-0x0000000000B00000-0x0000000000C10000-memory.dmp dcrat behavioral1/memory/2236-687-0x0000000001150000-0x0000000001260000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2408 powershell.exe 2388 powershell.exe 2576 powershell.exe 2816 powershell.exe 2636 powershell.exe 2372 powershell.exe 2696 powershell.exe 2416 powershell.exe 2080 powershell.exe 2728 powershell.exe 2804 powershell.exe 2424 powershell.exe 2836 powershell.exe 2580 powershell.exe 2540 powershell.exe 2704 powershell.exe 2860 powershell.exe 2832 powershell.exe 2724 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2800 DllCommonsvc.exe 1120 wininit.exe 2096 wininit.exe 1720 wininit.exe 640 wininit.exe 1988 wininit.exe 2004 wininit.exe 2996 wininit.exe 2556 wininit.exe 2220 wininit.exe 2236 wininit.exe -
Loads dropped DLL 2 IoCs
pid Process 1076 cmd.exe 1076 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 12 raw.githubusercontent.com 16 raw.githubusercontent.com 30 raw.githubusercontent.com 33 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 37 raw.githubusercontent.com 19 raw.githubusercontent.com 23 raw.githubusercontent.com 26 raw.githubusercontent.com -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\de-DE\lsass.exe DllCommonsvc.exe File created C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files\Google\Chrome\Application\24dbde2999530e DllCommonsvc.exe File created C:\Program Files\Google\Chrome\sppsvc.exe DllCommonsvc.exe File created C:\Program Files\Google\Chrome\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe DllCommonsvc.exe File created C:\Program Files\Windows Photo Viewer\es-ES\5940a34987c991 DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\PolicyDefinitions\ja-JP\lsm.exe DllCommonsvc.exe File created C:\Windows\PolicyDefinitions\ja-JP\101b941d020240 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 596 schtasks.exe 2644 schtasks.exe 2892 schtasks.exe 1760 schtasks.exe 1452 schtasks.exe 2744 schtasks.exe 1608 schtasks.exe 2200 schtasks.exe 3028 schtasks.exe 2536 schtasks.exe 2900 schtasks.exe 2868 schtasks.exe 1824 schtasks.exe 2220 schtasks.exe 3016 schtasks.exe 2320 schtasks.exe 964 schtasks.exe 648 schtasks.exe 960 schtasks.exe 2524 schtasks.exe 2956 schtasks.exe 576 schtasks.exe 2984 schtasks.exe 2228 schtasks.exe 2472 schtasks.exe 1628 schtasks.exe 1492 schtasks.exe 1984 schtasks.exe 1844 schtasks.exe 1700 schtasks.exe 2952 schtasks.exe 1388 schtasks.exe 2708 schtasks.exe 2164 schtasks.exe 828 schtasks.exe 1612 schtasks.exe 2776 schtasks.exe 976 schtasks.exe 1372 schtasks.exe 2156 schtasks.exe 2972 schtasks.exe 284 schtasks.exe 1740 schtasks.exe 2584 schtasks.exe 1160 schtasks.exe 2124 schtasks.exe 848 schtasks.exe 2612 schtasks.exe 2204 schtasks.exe 1028 schtasks.exe 2652 schtasks.exe 3052 schtasks.exe 316 schtasks.exe 1212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2800 DllCommonsvc.exe 2800 DllCommonsvc.exe 2800 DllCommonsvc.exe 2800 DllCommonsvc.exe 2800 DllCommonsvc.exe 2800 DllCommonsvc.exe 2800 DllCommonsvc.exe 2580 powershell.exe 2724 powershell.exe 2424 powershell.exe 2408 powershell.exe 2576 powershell.exe 2372 powershell.exe 2816 powershell.exe 2416 powershell.exe 2860 powershell.exe 2636 powershell.exe 2836 powershell.exe 2080 powershell.exe 2540 powershell.exe 2832 powershell.exe 2704 powershell.exe 2804 powershell.exe 2728 powershell.exe 2388 powershell.exe 2696 powershell.exe 1120 wininit.exe 2096 wininit.exe 1720 wininit.exe 640 wininit.exe 1988 wininit.exe 2004 wininit.exe 2996 wininit.exe 2556 wininit.exe 2220 wininit.exe 2236 wininit.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 2800 DllCommonsvc.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 2424 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 1120 wininit.exe Token: SeDebugPrivilege 2096 wininit.exe Token: SeDebugPrivilege 1720 wininit.exe Token: SeDebugPrivilege 640 wininit.exe Token: SeDebugPrivilege 1988 wininit.exe Token: SeDebugPrivilege 2004 wininit.exe Token: SeDebugPrivilege 2996 wininit.exe Token: SeDebugPrivilege 2556 wininit.exe Token: SeDebugPrivilege 2220 wininit.exe Token: SeDebugPrivilege 2236 wininit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2076 2424 JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe 30 PID 2424 wrote to memory of 2076 2424 JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe 30 PID 2424 wrote to memory of 2076 2424 JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe 30 PID 2424 wrote to memory of 2076 2424 JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe 30 PID 2076 wrote to memory of 1076 2076 WScript.exe 31 PID 2076 wrote to memory of 1076 2076 WScript.exe 31 PID 2076 wrote to memory of 1076 2076 WScript.exe 31 PID 2076 wrote to memory of 1076 2076 WScript.exe 31 PID 1076 wrote to memory of 2800 1076 cmd.exe 33 PID 1076 wrote to memory of 2800 1076 cmd.exe 33 PID 1076 wrote to memory of 2800 1076 cmd.exe 33 PID 1076 wrote to memory of 2800 1076 cmd.exe 33 PID 2800 wrote to memory of 2424 2800 DllCommonsvc.exe 89 PID 2800 wrote to memory of 2424 2800 DllCommonsvc.exe 89 PID 2800 wrote to memory of 2424 2800 DllCommonsvc.exe 89 PID 2800 wrote to memory of 2408 2800 DllCommonsvc.exe 90 PID 2800 wrote to memory of 2408 2800 DllCommonsvc.exe 90 PID 2800 wrote to memory of 2408 2800 DllCommonsvc.exe 90 PID 2800 wrote to memory of 2372 2800 DllCommonsvc.exe 91 PID 2800 wrote to memory of 2372 2800 DllCommonsvc.exe 91 PID 2800 wrote to memory of 2372 2800 DllCommonsvc.exe 91 PID 2800 wrote to memory of 2696 2800 DllCommonsvc.exe 92 PID 2800 wrote to memory of 2696 2800 DllCommonsvc.exe 92 PID 2800 wrote to memory of 2696 2800 DllCommonsvc.exe 92 PID 2800 wrote to memory of 2580 2800 DllCommonsvc.exe 93 PID 2800 wrote to memory of 2580 2800 DllCommonsvc.exe 93 PID 2800 wrote to memory of 2580 2800 DllCommonsvc.exe 93 PID 2800 wrote to memory of 2416 2800 DllCommonsvc.exe 94 PID 2800 wrote to memory of 2416 2800 DllCommonsvc.exe 94 PID 2800 wrote to memory of 2416 2800 DllCommonsvc.exe 94 PID 2800 wrote to memory of 2540 2800 DllCommonsvc.exe 95 PID 2800 wrote to memory of 2540 2800 DllCommonsvc.exe 95 PID 2800 wrote to memory of 2540 2800 DllCommonsvc.exe 95 PID 2800 wrote to memory of 2388 2800 DllCommonsvc.exe 96 PID 2800 wrote to memory of 2388 2800 DllCommonsvc.exe 96 PID 2800 wrote to memory of 2388 2800 DllCommonsvc.exe 96 PID 2800 wrote to memory of 2576 2800 DllCommonsvc.exe 97 PID 2800 wrote to memory of 2576 2800 DllCommonsvc.exe 97 PID 2800 wrote to memory of 2576 2800 DllCommonsvc.exe 97 PID 2800 wrote to memory of 2704 2800 DllCommonsvc.exe 98 PID 2800 wrote to memory of 2704 2800 DllCommonsvc.exe 98 PID 2800 wrote to memory of 2704 2800 DllCommonsvc.exe 98 PID 2800 wrote to memory of 2816 2800 DllCommonsvc.exe 99 PID 2800 wrote to memory of 2816 2800 DllCommonsvc.exe 99 PID 2800 wrote to memory of 2816 2800 DllCommonsvc.exe 99 PID 2800 wrote to memory of 2836 2800 DllCommonsvc.exe 100 PID 2800 wrote to memory of 2836 2800 DllCommonsvc.exe 100 PID 2800 wrote to memory of 2836 2800 DllCommonsvc.exe 100 PID 2800 wrote to memory of 2860 2800 DllCommonsvc.exe 101 PID 2800 wrote to memory of 2860 2800 DllCommonsvc.exe 101 PID 2800 wrote to memory of 2860 2800 DllCommonsvc.exe 101 PID 2800 wrote to memory of 2832 2800 DllCommonsvc.exe 102 PID 2800 wrote to memory of 2832 2800 DllCommonsvc.exe 102 PID 2800 wrote to memory of 2832 2800 DllCommonsvc.exe 102 PID 2800 wrote to memory of 2080 2800 DllCommonsvc.exe 103 PID 2800 wrote to memory of 2080 2800 DllCommonsvc.exe 103 PID 2800 wrote to memory of 2080 2800 DllCommonsvc.exe 103 PID 2800 wrote to memory of 2728 2800 DllCommonsvc.exe 104 PID 2800 wrote to memory of 2728 2800 DllCommonsvc.exe 104 PID 2800 wrote to memory of 2728 2800 DllCommonsvc.exe 104 PID 2800 wrote to memory of 2804 2800 DllCommonsvc.exe 105 PID 2800 wrote to memory of 2804 2800 DllCommonsvc.exe 105 PID 2800 wrote to memory of 2804 2800 DllCommonsvc.exe 105 PID 2800 wrote to memory of 2636 2800 DllCommonsvc.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Saved Games\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4WSxKcEorb.bat"6⤵PID:380
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2500
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Zi7wkUpBKE.bat"8⤵PID:496
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1104
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MzhLoGhvPq.bat"10⤵PID:780
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2696
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BAdWWGXi7E.bat"12⤵PID:1816
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1792
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7ezzJRb6cS.bat"14⤵PID:1512
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2468
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lmMgPtgxf2.bat"16⤵PID:2992
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:284
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sJ59Arupck.bat"18⤵PID:888
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:316
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fjnbjzFmbP.bat"20⤵PID:1804
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:804
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6raUEgr1vJ.bat"22⤵PID:1980
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:3068
-
-
C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8KwMxVG80h.bat"24⤵PID:2460
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:1152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Saved Games\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Saved Games\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\providercommon\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\providercommon\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\providercommon\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
Network
-
Remote address:8.8.8.8:53Requestraw.githubusercontent.comIN AResponseraw.githubusercontent.comIN A185.199.111.133raw.githubusercontent.comIN A185.199.108.133raw.githubusercontent.comIN A185.199.109.133raw.githubusercontent.comIN A185.199.110.133
-
793 B 4.2kB 10 11
-
793 B 4.2kB 10 11
-
741 B 4.1kB 9 10
-
741 B 4.1kB 9 10
-
793 B 4.2kB 10 11
-
741 B 4.1kB 9 10
-
793 B 4.2kB 10 11
-
741 B 4.1kB 9 10
-
741 B 4.1kB 9 10
-
793 B 4.2kB 10 11
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c172d4531c6d363eeb755c5706438e1
SHA1ee9348390285637f31010750a87b1857c9e5f52d
SHA256451bc51f69d4a11e852802b4395d612a4bec8a299ec5929a253322562a1e5524
SHA5126c9ae14f41191fb30db81608bbfc8f54023f42a384fab6adeab9711cd7cbf463fc32d107eb172f162883054ce6cb99ae9ef7b9c4d1583f3d863c70a5d08fa363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203909bc01124533ee5b6cdceb5f3dba
SHA17f4ca02025ba36ffab2c1c7e708a3f5e87ca6ab1
SHA256709e70153579d3a70c1b9798c13712f62268f5f098c530fec7e0c183312f3135
SHA51209fa8cbfd7f76b2c8516be884c8216b98d65b58ee3687081e0f18a54dd219b16a2a64148fed1bce2604b80a3bf0ff1be6857c053f224d8f1d2aa1eb4d4899618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb9223389e21564a8b3efa56d9b9dac
SHA1ea697a08f9235ad12d5a7dbdc312a283cd745c4a
SHA256ac3f52924fb7d495e43f3e4f2c81c8cc8e4c46381b76a472e5ece7f38202be45
SHA51260e5269e1299ff64f38e9d7d7a1f08ff94c426b888a70c818c512f35bedae3a187873a5f8afa26b10c0d8c4a743cead14c1ba8bd83416ea5829b482bec7c1e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57e43f82cefe68e4113a1358795f421
SHA151d97f408e1baac8ea3081e2cff0326c3e945948
SHA256236aadb6bcce3bab6af30ab92efc0e9840d694772a7c2a37b4da1800f0361cde
SHA512172c55312759d1fea002d9f29a362bcafb6830529b65e04c7dbb0236acf2db22444ceab355b211b4c05d74aeafa800137d7214f19c94b8e45c6c6741daeb62cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c705c5f03905ae14d54a8a80d71321a
SHA1950f252391d92a0bfaab792fb39bbb882c7dbaf1
SHA2563c61b4f6bfb34560abfc6729a2c0515bd66b9e8abb4156b8dc030d1b6c1a624d
SHA5129896e23f09e9c66dc167be382f87dbaa052b596c77e89527497ebbeb21f26c51b81c80759a1ac8ebb463972ae304759aac5477cac4954453419579b6d58c8bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8efdcc28d9b0ea9b29d653e629dd4ec
SHA1625def393cdca5fd4e931ae750d8e4a98907324e
SHA25614ee1a683383543456f59d3587d1c2dbe2d0a9adc1226d416d05d483d9724273
SHA5121b56bc34e9e62747e29e7d3f59849d1655985637812f56c3c9b41eec61d55dd319f7c0a8f3a6547a8ffdb8d852baa5cb12231062a84468cfbf78400d45a0d45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910a6fc2eb75cde0d9b5c64ed96ce3fc
SHA1c4393c7e0ec37bc2e0d86e01c62cc2e1b240747d
SHA256882da0b691eae2e693df0721b0c364a2e756944f65c094ccd778b1a0e0240de9
SHA512b6ebff81ab35575ea4faaddb9e05a1d5a5bfe9344e7dab1348e43c9b4f1889e4ab7591ee613705f76013d00ac62fac95d120ced662f613a5a4bb675b785bd4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d83b5f195f42250617af861ebf5989e
SHA19cb6bc6dafde02a1b894d67ff1a191f0ec904e7e
SHA256345fcd95f75fa6a2004beee3207f3b61cb72a87e82a305b445d426b5f52ddfc7
SHA5120ab4c034253d2d83866c40fd9702a3b2eb0daea640b747ab7478dcd2c562c580ae6b5edcaff41b2ee71d25cf2b1ae242581681101a00da5c52a4db704312b797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf3aee867d39c1157ae7737c31ded02
SHA1d22c00982e24c5ba98675c7817bba8635e34be48
SHA25659b4b6a2e1b330d47cab5355c90e60b39da9098a6b8d6ac3bec24680546222c1
SHA51272b61e64500173cede60ac12a0da6b07af0cad56a6acd005a629669311c43ab79a2b4ab15f7b8838635a23f0909f726facfa409eb765df5e7e847557e78fc8d8
-
Filesize
225B
MD5a73c157c9b0779553223f1163f9ee9f1
SHA1924e1031cbea266c6967d76346b4ef147d8db999
SHA25640fee207ad175d4a9ddd5a8d5f9e70b763bb7012c149d30cbc6312d4617c6cf5
SHA51245c07f08c92ed85fca6c162d74e5c0a729baa976c1e726274287c9d6acca972922a73616794e2545d9ab0d38ea8dc310c77e57b2b35dace9564d8e5d7fd9fad8
-
Filesize
225B
MD5d6f0eb7193a31f21d55201103e35ffe9
SHA139117f671b2c79e600bdb0eed2d77db08be14acd
SHA25668fcf3a5c801fab9fb33cca718f563fcf836dd4b4d20c33608462688e8a7506c
SHA5126534023e96b273706ad4adc59eb96fcb33875b56b12c1101a62a93e5c3affad9c42cb429b52cc6c7836499a3780d9639c27733067e6b2c78a36691c503deceda
-
Filesize
225B
MD5b80c260d968ef1818df0858342ba4bcf
SHA15421159263e911635774cd0a6c6c7a84fb5b6971
SHA2561e5151e7aae24e4cc5c4462d0e45b7c65e4820b7bf1d62923083c7c5a1178fd4
SHA51234589cd0c70897c37f142a10baa59f0b781a593b269f57dd95b51c7243ae7164b065089b42cdeb9b19c93d59ee420fbe8fd9b21e70dbb1813261bc048cfa9c91
-
Filesize
225B
MD52cb133b5a5af0fb9d14ed19cec0bcd57
SHA193348016d27a3b8837978be72d493abe75ebe5cc
SHA2569c0291d809e9d90ef556a32d3361a2c17bc5f5d6c019c6f232995ef176a6b966
SHA5121ea7339870c885b5f9f6cce592c0347e5f9945556d71f2df7cbaaf932a04f2303b47510c83afdbb881eaca7f3dde8c65413209dc477305256ed258f3d10b6401
-
Filesize
225B
MD5f0af73a8c1ddf3619da231cf19ab3f43
SHA1c6cc255c8f42a0855ac178dc73c1eb5006ebfbd2
SHA256ba2aa7ca9f46be4c4bdb14068f782bcce84198e3604881d241d94689862983d0
SHA512b3615c8dd57fcab288321ff0f809e8e3a5e03d11218ccd9623b56b5c480fbc1e80282179ef2b545f358a89e8eb86eb5d40768996246670474e0f29b0697a8ab2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
225B
MD5ec9a78fdb03a6d3f4a3461cc56758390
SHA10465ba069efa9d9ab86348d0fb2daade5a5773b5
SHA25664dec8ee2af595a6e139222c22f11d089045312d1a8b0ec7b4ce883a376f0c5c
SHA5121538362ee44912a9ef7b71cd288f153bc3be142f940fe049f1c282bcf0a5caa3a8680bd6cff04f980001605989c64ae6ac1ff527ffdb7310cf9ebed5494fe5d9
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
225B
MD555016379d882c675a4178d80e222eff8
SHA11511308da312984326cd8840ea53605983ec040a
SHA256647e85e4ae2e9c9086f76b5c3044df6deb5b1c5d17ab6801b640b5c882edf076
SHA512f00b6f61a7f792f897205dbc0832ff3310519060c8abbedb8dd838e45a8c176678f5305f59278fea135310025b940ea0250bf8817c24ca21e07c977324fcdb32
-
Filesize
225B
MD5c666b8f920c074ea99006a1c4876a336
SHA14a8b7541c676ff185a32f088c49b43e28d277441
SHA256bb3043db6afb6b9fb6cff3ac4d0dedf087b90af3eb75079f22111d4d868700ca
SHA512b2f114906d89304e12889afef847664cd9a7c026bc890cb9d353cb7e56efe8008a05ffff046f7acca7253cfa00d9a6dd5fcf796addd6e8d0048d36c29a662c93
-
Filesize
225B
MD50a80b31e84ceb07e2aab4bb707263ccd
SHA1065da784687ee5c04b9e1c54f0d888677e0d8523
SHA2561e3fea1c5ccda8c8936a8f06d21c932b7064bfb97545bf5796b7fb9bf0530735
SHA5122b865412638cdc0795bc919a11dcc5750b63093e4019f17dac3c0349c6aa63740bd083544478d26405dc414fb21c3354afd273fd65eda79856850dc7306a86ca
-
Filesize
225B
MD523ce2d1b580d761b78bba1d097c7faee
SHA18858ce0311b66dd1d37cb7890c8755ee89abc41c
SHA25658a4797e3db919e0b09b5cc5b9e36b999b116dc41c83ff92e1d2fcd09b9654a0
SHA512e07ac3df8b53deca82b9b3e4c86e87e760f4dbda89d1c784ff749dc952f21b0c9df148265f3be27615b08eb0c61ff155d88cfccc8b1fb012dcb75109ffb5cec1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c0cd586d87118154f72bf35faaec248e
SHA1f2e2d721525f300fde08a2df58d5d5b768c9db33
SHA2562e029fdd67acbe8516548e0072c1add1a0d7b6a3c6df5f063ad04a448b11e49e
SHA512e977faa98a8175fa65e8c0b3d4e15720923d0aff54e8e86858b661c70bb774c6d94e32407307c59d3068080e1ea071609a4cae83a9e87cc51a5b8119ad4a7dc2
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478