Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 09:43

General

  • Target

    JaffaCakes118_1074585b985ba28898af1afa8dc3c1b58b62c47610e69589cd65ed37b36bc609.exe

  • Size

    1.3MB

  • MD5

    e16908034f22fcd44a77528252138d71

  • SHA1

    96c824dc03460808a4ae16110b6beb72015bf9eb

  • SHA256

    1074585b985ba28898af1afa8dc3c1b58b62c47610e69589cd65ed37b36bc609

  • SHA512

    5c44d83d3fb2ee5585fe75c94b9f74bd99b4989cb8b3a3620b29548e9f89ebe5cea67a4b56dd2a5b1920739d1b1529a661240391d90449fcad542c6fbf39c9a4

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1074585b985ba28898af1afa8dc3c1b58b62c47610e69589cd65ed37b36bc609.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1074585b985ba28898af1afa8dc3c1b58b62c47610e69589cd65ed37b36bc609.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2132
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2300
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Web\Wallpaper\Windows\explorer.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2272
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\DVD Maker\es-ES\explorer.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2536
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:696
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PolicyDefinitions\en-US\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Games\Chess\en-US\OSPPSVC.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:976
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3048
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2516
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2400
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2684
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1352
          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
            "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2420
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vCRFnHZZKP.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2824
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2868
                • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                  "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:824
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eUivgxqvfs.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3040
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:2612
                      • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                        "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2340
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9dhy3B39XM.bat"
                          10⤵
                            PID:2860
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              11⤵
                                PID:2596
                              • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                                "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                                11⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2144
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UJpHfzfs2i.bat"
                                  12⤵
                                    PID:2532
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      13⤵
                                        PID:1720
                                      • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                                        "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                                        13⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2520
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZgKlNS7JdR.bat"
                                          14⤵
                                            PID:2740
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              15⤵
                                                PID:1044
                                              • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                                                "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                                                15⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3020
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zKs2Tjd9zb.bat"
                                                  16⤵
                                                    PID:816
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      17⤵
                                                        PID:2300
                                                      • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                                                        "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                                                        17⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1300
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JhLzHEla3w.bat"
                                                          18⤵
                                                            PID:2276
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              19⤵
                                                                PID:1472
                                                              • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                                                                "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                                                                19⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2144
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RE4R3BzSze.bat"
                                                                  20⤵
                                                                    PID:1600
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      21⤵
                                                                        PID:2252
                                                                      • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                                                                        "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                                                                        21⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2332
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\W0gPze1DKI.bat"
                                                                          22⤵
                                                                            PID:2648
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              23⤵
                                                                                PID:588
                                                                              • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe
                                                                                "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe"
                                                                                23⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:1232
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7ouYA2TrKB.bat"
                                                                                  24⤵
                                                                                    PID:1856
                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      25⤵
                                                                                        PID:2608
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Windows\Web\Wallpaper\Windows\explorer.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2852
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Web\Wallpaper\Windows\explorer.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1488
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Windows\Web\Wallpaper\Windows\explorer.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2560
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\DVD Maker\es-ES\explorer.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2716
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\es-ES\explorer.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2228
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\DVD Maker\es-ES\explorer.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2688
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2088
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1380
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\cmd.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1756
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Windows\PolicyDefinitions\en-US\services.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1816
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\en-US\services.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1824
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\PolicyDefinitions\en-US\services.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1744
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Games\Chess\en-US\OSPPSVC.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1624
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\Chess\en-US\OSPPSVC.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1500
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Games\Chess\en-US\OSPPSVC.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:952
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1344
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2220
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1128
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\dllhost.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1896
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\dllhost.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1784
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\dllhost.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2204
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\System.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2172
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2208
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2056
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Defender\System.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2256
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1040
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2264
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1852
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1724
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2540

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        638d339f7e09c1e2a51783cbbd6d7aa7

                                        SHA1

                                        8b128492ff86af8fd86ddcc1899e35f156215b99

                                        SHA256

                                        c408d1d0099c7f432907a77bb3814678849fe77facb8192067669b3652279283

                                        SHA512

                                        b79d91f27689f4d1088195a2af79fbfc5308492e615d63998cd84c53b5142c5151fd750cd2b27955f00acea3c63f0a49fd02c0c133fe36b65c340ae878411b6e

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        924c1986ac36ebc29435d58cd6e77bff

                                        SHA1

                                        4ee5470e51193e87108543cca2a613a8182aca9d

                                        SHA256

                                        768d922e29bd91589e9bd8d85954c88716fd6f89ee574af320225c11ee5f13ba

                                        SHA512

                                        750be5be91d6d568bdffb2962c645a59af6c13e6ae5ba659e37b5bcbe5e149ca5e038ee5df15eb0483463721c40599b41655ceeffd4a664d2a8cc0dd0dd9e12a

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        a8b4aefad9a950137390b5759782c9c8

                                        SHA1

                                        d2234e1188073dcd9e3297a83f7ef9a61fad8d3c

                                        SHA256

                                        c1a5480f8b5f8c491068db7076ced9be8823495cadfbbc53198981039cdcb803

                                        SHA512

                                        d86d5e8ef32e8e9b5d29e23229ab5224206817ba0d715975b9a74c9cd77eddccfbe036a3d3a8fef64eb1cbbc981a15bb32fddd1606f1797e3e580eda61c83bb7

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        9ac6f588251f1182c073ac9705bf2d65

                                        SHA1

                                        a617861bfba6d89edfc669c2025fb35a2ae4d1ea

                                        SHA256

                                        6eca4263da2e9890778fcfe4474504d4371402a9b9ea7b0fc0f7bdca8f710fb2

                                        SHA512

                                        8655da33e0dd01ae1e5e1943e8c149ba4416b3bf67e6662cde1494b751de6b32e812ce6fdc12ad032d8d8b2b7ff2573f5a718883ff119e03bc804349ab281bb1

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        b88887435760a1729fdbb79308438e95

                                        SHA1

                                        75a1384032269519bf4a33950d9534af4f1451da

                                        SHA256

                                        0fa234321463dd34cf5da2bf52279b72a1238d09019ab98cefca954bbd785d56

                                        SHA512

                                        c94162e9340c7c54305cd5967bcd6d410403b20255b61cf28d8494881f1cc9377835bd5ad14c01b4c24e667da7a8be4259bbe27b3c2dffd6fdd436698b193fe6

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        2079cd9ce881ec43417a184543c447d2

                                        SHA1

                                        ba771be3a3fda29dc7d2f22954d0579f348c9247

                                        SHA256

                                        8424d1acabab0bbe6e7caffa69d52775408d5cbb39a95d89d23f31bbca5693ce

                                        SHA512

                                        f7bea16709a339d97432dcca604b5da3ce881ea7c94a2e21d53307152d2fbbe951ea585d9b3af4c661ef599e62c15ce3cd38db5c354fd8307e423cdfcee45afc

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        a2890bb0c10069375a175afd9e64d914

                                        SHA1

                                        1cb79e4d113a15da14a552b5a7d143c3838e0b60

                                        SHA256

                                        926f9b52eeade0644934e63ce320f667c522645ed8a6ebd784a598c214d3ec10

                                        SHA512

                                        23aea4396b146e14abcc3b36af3b2ae45503bd4746fa6a35eb7aedd5f425e39cbec34e1d01a0373153d309c2d410980292b34844a8f20fc43783b88bb6912c8d

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        05c091fefd412e58392fbd52a4099b08

                                        SHA1

                                        7b7ef4caf32e626d3237f3639590d2a589e0adaf

                                        SHA256

                                        aa19e44551b60589102b4fc036f8f12e32137e3408810392045be51edc15c78a

                                        SHA512

                                        5db85b03418e9fb825fbb1d4e2600be1aff4470e5b51b32c3e9b0655d23a41ccc08ede0f51aa00c48968ff28ca6ca6a60182d9be25857859a8c9b56a8f97eb6a

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        0f0a304d701a27b742985efe509e357d

                                        SHA1

                                        bdb4a569a98d9e5483d022544c92b8c76939fcfa

                                        SHA256

                                        92287551dc67b37333be02d47d93f0c8f64d877b8903f4afd0ac98503e04c3df

                                        SHA512

                                        a53b3b783fdba8d1e89f9432ba455af38d91ed2b5a171cb317b78bed1660bc0d30967f6a082ac0870e307ba77a2a043417249856d0588dd4ef8a09d61dca2fea

                                      • C:\Users\Admin\AppData\Local\Temp\7ouYA2TrKB.bat

                                        Filesize

                                        244B

                                        MD5

                                        83b47eaa60a222d265ddf776b1828ea9

                                        SHA1

                                        3fc870e81135f7af38cd4f36cad9159984eb0517

                                        SHA256

                                        13a1abb7bf09db5ab9efd41e3550abfaae70a5605ff109834abedd860e8826ee

                                        SHA512

                                        191e3cfb6ebe70a08e3aa916d8f9dab7ed7e04d334bc7e84db1e56955669b7c445d6d2602447f833c30dc3aad0bf84cf2fa76d9df749ba45413b49555056a3c9

                                      • C:\Users\Admin\AppData\Local\Temp\9dhy3B39XM.bat

                                        Filesize

                                        244B

                                        MD5

                                        f0150d132eb74e58ad3167182477baf4

                                        SHA1

                                        ab842991d0de5bab56baacaf4c3fea925720d96c

                                        SHA256

                                        ad33e7f0b6fdb1141c34bd84e80a003db4be2a37e91e883d4bc8e77512a3a69e

                                        SHA512

                                        ece8d940b16b0be02ea63c5374d33cdcdfff3cb1289a8e353710994022fca7f05e593df869a37ae002b88c975f577b82360bb8d68e3ddee28ed0a7c6c36b7335

                                      • C:\Users\Admin\AppData\Local\Temp\Cab3D60.tmp

                                        Filesize

                                        70KB

                                        MD5

                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                        SHA1

                                        1723be06719828dda65ad804298d0431f6aff976

                                        SHA256

                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                        SHA512

                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                      • C:\Users\Admin\AppData\Local\Temp\JhLzHEla3w.bat

                                        Filesize

                                        244B

                                        MD5

                                        caa5c4bbe4a594c9480b657e9d3d7fe8

                                        SHA1

                                        7160b20f4daeeb1e206f23e1742c1c59b4ce38f2

                                        SHA256

                                        958d30bf1b3e06ab6f765d09c3d293e60c75f036151c0b74b071da031a8e2c3a

                                        SHA512

                                        29e11f831e19dd4d926ad9835d0e03571cd27fc80bfd1f3be8b8bf64e4eeb9e9631adac493aa21f66eaaf779e74bc1feeeec3d15d4b17ce3197b495fc73d3154

                                      • C:\Users\Admin\AppData\Local\Temp\RE4R3BzSze.bat

                                        Filesize

                                        244B

                                        MD5

                                        83537d25d15c1e6cc91699585cef9f47

                                        SHA1

                                        c55b17d2b2a37eb9cf85eb226a64b7448834c172

                                        SHA256

                                        c466b3ea3deb6fe49326307e5fd4899b288358e7cc83423405cb68c830a4fe5a

                                        SHA512

                                        1a0ca242f18c98adb4217fad662a1181dd545cb937d0320762dfd7df79c99af12147d9702a6cac33dedaade6c4a51419a26c0744f19705b6c651e5b86f7768f5

                                      • C:\Users\Admin\AppData\Local\Temp\Tar3D92.tmp

                                        Filesize

                                        181KB

                                        MD5

                                        4ea6026cf93ec6338144661bf1202cd1

                                        SHA1

                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                        SHA256

                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                        SHA512

                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                      • C:\Users\Admin\AppData\Local\Temp\UJpHfzfs2i.bat

                                        Filesize

                                        244B

                                        MD5

                                        7119d72773bf1a0ce53955e816369b98

                                        SHA1

                                        6d3bf365d415c52782e4bf657c296cd4696c1974

                                        SHA256

                                        b41f61e43b1f57783a0b47e364d46085bc02243b62d05db82646c1b576986c86

                                        SHA512

                                        8e1af4d2c25466a4e469740fd7773d7a25cf38c01282ff4d7eeaa4e545bfaba2a6c6b31f8992f9300446df105935726ff15b033b4c67b79d26005ee469cf3e81

                                      • C:\Users\Admin\AppData\Local\Temp\W0gPze1DKI.bat

                                        Filesize

                                        244B

                                        MD5

                                        f160d50ba37b7e13ad6ef01bd023a604

                                        SHA1

                                        aad5032d4275771ed60d27602e126006084ac9e1

                                        SHA256

                                        b516ecdec6a3cc622ab98c98f126002e24f2b66cdd960cd0caa65b1f27f7daf1

                                        SHA512

                                        1355049f497ef465b244e64b8687c71ec5ecc230782c110b9621ac488492b19049710480aa3601d06668b55806d171d6b0005b1c8cb9234cfb8e1bcc04407716

                                      • C:\Users\Admin\AppData\Local\Temp\ZgKlNS7JdR.bat

                                        Filesize

                                        244B

                                        MD5

                                        4e9bf8d184bb644d4ae26c93e187b0f5

                                        SHA1

                                        8d4140d88325f694b8bffaa5b986d6bd7c583c3f

                                        SHA256

                                        5e98a4afac30b780d09fdb516881b40360657811e64807bef14caefa9af65cba

                                        SHA512

                                        0feb7aad30abd85cff3144afd4a586aa26846a26cdbdb0d913a5f3b8b4e127fed61c6f1b0fe5414755ac9db6e8cf5e20af3a5efc57ead8576bab05b44b396630

                                      • C:\Users\Admin\AppData\Local\Temp\eUivgxqvfs.bat

                                        Filesize

                                        244B

                                        MD5

                                        3846d6ca479d750e932d1b9994c7f008

                                        SHA1

                                        68a121f0608dec3b1d356df5206ea431fdf74cf0

                                        SHA256

                                        4355d8c16d0d8b3da3e6fd6601e18496b592381a509fcfcf143f3ae31e96043f

                                        SHA512

                                        6e9208750d6209c1f32dc1b27ea7390109a7f29abde8e47393c00d91e5afeefe521bc51e3a2db111e4187fe101a847b09ae2e0297119829b7b76621f09961347

                                      • C:\Users\Admin\AppData\Local\Temp\vCRFnHZZKP.bat

                                        Filesize

                                        244B

                                        MD5

                                        776108c8f362c6a57cbb0954c81e2573

                                        SHA1

                                        50d6aa22e7610053aa545ed20d1a20bee696a763

                                        SHA256

                                        3628be80459e0b5d13eeb2535e37470202564724c63626b441549e545e790490

                                        SHA512

                                        853aac1f52409ee5995cded59835363110bd4a43f5a2a757ad02e636c7202d5831ae4c17b994e7f209a32078d4f0f929222d2a61118ab97986ad7e756c88a0df

                                      • C:\Users\Admin\AppData\Local\Temp\zKs2Tjd9zb.bat

                                        Filesize

                                        244B

                                        MD5

                                        a50a314910323a6781d0e2387fc98f1a

                                        SHA1

                                        b869fa71b32dd2dcf5539682b424db6d9648dd43

                                        SHA256

                                        b1e5f77aa3193ec17a8f539133ed60ff08ecdaf294047eaf80beadf5abb43975

                                        SHA512

                                        3d302c000a0080f4f8bd985c20302bcc07fb669e7f3e226ec9f23e7f1f9fe090aa5ce9bc0925dde1c73cae2d57f7214c9b2f13b8021e3e3a98b44e6fd71e11b2

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                        Filesize

                                        7KB

                                        MD5

                                        f61585438bbb9f4a191b1d3ab436f645

                                        SHA1

                                        15b83ad5870bfb205ded7857e200c354cf68b2ba

                                        SHA256

                                        f4b3a78d90dfef5195b1881f144cbc7241062352afb14e1650f87ef2722c4025

                                        SHA512

                                        62ebff40832e99778482242380da92b8262923449ee3a8913527040f6514111e0f060f5dcb861c717c39a9ae34f43ebf1d15f1ff6d3fa16768e83cb70db818de

                                      • C:\providercommon\1zu9dW.bat

                                        Filesize

                                        36B

                                        MD5

                                        6783c3ee07c7d151ceac57f1f9c8bed7

                                        SHA1

                                        17468f98f95bf504cc1f83c49e49a78526b3ea03

                                        SHA256

                                        8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                        SHA512

                                        c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                      • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                        Filesize

                                        197B

                                        MD5

                                        8088241160261560a02c84025d107592

                                        SHA1

                                        083121f7027557570994c9fc211df61730455bb5

                                        SHA256

                                        2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                        SHA512

                                        20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                      • \providercommon\DllCommonsvc.exe

                                        Filesize

                                        1.0MB

                                        MD5

                                        bd31e94b4143c4ce49c17d3af46bcad0

                                        SHA1

                                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                        SHA256

                                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                        SHA512

                                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                      • memory/824-157-0x0000000000CF0000-0x0000000000E00000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1232-636-0x0000000000370000-0x0000000000480000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1300-456-0x00000000003C0000-0x00000000003D2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2132-17-0x00000000009B0000-0x00000000009BC000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2132-13-0x0000000000BB0000-0x0000000000CC0000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2132-14-0x00000000002C0000-0x00000000002D2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2132-15-0x00000000002D0000-0x00000000002DC000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2132-16-0x00000000002F0000-0x00000000002FC000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2144-277-0x0000000001060000-0x0000000001170000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2144-516-0x0000000000160000-0x0000000000270000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2144-278-0x0000000000240000-0x0000000000252000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2300-48-0x000000001B260000-0x000000001B542000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2300-51-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2332-576-0x0000000000990000-0x0000000000AA0000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2340-217-0x00000000003E0000-0x00000000004F0000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2420-49-0x0000000000A70000-0x0000000000B80000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2420-66-0x00000000002B0000-0x00000000002C2000-memory.dmp

                                        Filesize

                                        72KB