Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 09:44
Behavioral task
behavioral1
Sample
JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe
-
Size
1.3MB
-
MD5
2828ef25efda46fcb885f592cf7e129d
-
SHA1
4df0d3927cd4ae37ba8b23bbf38eb9655705ae59
-
SHA256
9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f
-
SHA512
fd785bfa0b87cdb650ea6cd3c72b270bdf176dd0a62c613f6ec963fe57864019fa1a44076d5f4a60494906ad47e713f7aa956e3328d4cc4d827a04a64a9c0a80
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 632 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1096 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1412 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3280 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4480 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4044 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4220 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3892 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4008 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3916 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4624 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1408 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3844 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4676 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3868 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3568 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 2372 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3896 2372 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000a000000023b73-10.dat dcrat behavioral2/memory/3548-13-0x0000000000F30000-0x0000000001040000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2764 powershell.exe 4636 powershell.exe 4332 powershell.exe 1548 powershell.exe 2892 powershell.exe 3468 powershell.exe 4064 powershell.exe 3788 powershell.exe 4964 powershell.exe 116 powershell.exe 2500 powershell.exe 4084 powershell.exe 1624 powershell.exe 1512 powershell.exe 4544 powershell.exe 3852 powershell.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation upfc.exe -
Executes dropped EXE 15 IoCs
pid Process 3548 DllCommonsvc.exe 3564 upfc.exe 3504 upfc.exe 4480 upfc.exe 3328 upfc.exe 964 upfc.exe 3744 upfc.exe 4724 upfc.exe 5060 upfc.exe 2276 upfc.exe 432 upfc.exe 5012 upfc.exe 4204 upfc.exe 5004 upfc.exe 2072 upfc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 15 raw.githubusercontent.com 36 raw.githubusercontent.com 38 raw.githubusercontent.com 52 raw.githubusercontent.com 16 raw.githubusercontent.com 39 raw.githubusercontent.com 43 raw.githubusercontent.com 54 raw.githubusercontent.com 56 raw.githubusercontent.com 23 raw.githubusercontent.com 44 raw.githubusercontent.com 45 raw.githubusercontent.com 53 raw.githubusercontent.com 55 raw.githubusercontent.com -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\MSBuild\Microsoft\services.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\services.exe DllCommonsvc.exe File created C:\Program Files (x86)\MSBuild\Microsoft\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\ea1d8f6d871115 DllCommonsvc.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\5b884080fd4f94 DllCommonsvc.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\sihost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\66fc9ff0ee96c2 DllCommonsvc.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\fontdrvhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\System\uk-UA\unsecapp.exe DllCommonsvc.exe File created C:\Program Files (x86)\Common Files\System\uk-UA\29c1c3cc0f7685 DllCommonsvc.exe File created C:\Program Files\VideoLAN\VLC\skins\TextInputHost.exe DllCommonsvc.exe File created C:\Program Files\VideoLAN\VLC\skins\22eafd247d37c3 DllCommonsvc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\ConstraintIndex\69ddcba757bf72 DllCommonsvc.exe File created C:\Windows\LanguageOverlayCache\RuntimeBroker.exe DllCommonsvc.exe File created C:\Windows\Globalization\Sorting\System.exe DllCommonsvc.exe File created C:\Windows\Globalization\Sorting\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\ConstraintIndex\smss.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings upfc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4008 schtasks.exe 684 schtasks.exe 2140 schtasks.exe 3868 schtasks.exe 632 schtasks.exe 3892 schtasks.exe 3648 schtasks.exe 5080 schtasks.exe 2316 schtasks.exe 2940 schtasks.exe 1412 schtasks.exe 3280 schtasks.exe 3568 schtasks.exe 5092 schtasks.exe 2304 schtasks.exe 4676 schtasks.exe 1916 schtasks.exe 1912 schtasks.exe 5116 schtasks.exe 1368 schtasks.exe 4044 schtasks.exe 3660 schtasks.exe 1408 schtasks.exe 4168 schtasks.exe 1096 schtasks.exe 5024 schtasks.exe 4984 schtasks.exe 3152 schtasks.exe 532 schtasks.exe 2972 schtasks.exe 3896 schtasks.exe 1620 schtasks.exe 2448 schtasks.exe 4220 schtasks.exe 3916 schtasks.exe 1268 schtasks.exe 3844 schtasks.exe 4400 schtasks.exe 1112 schtasks.exe 4480 schtasks.exe 2604 schtasks.exe 1632 schtasks.exe 1264 schtasks.exe 4524 schtasks.exe 4624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 3548 DllCommonsvc.exe 4964 powershell.exe 4964 powershell.exe 3788 powershell.exe 3788 powershell.exe 3468 powershell.exe 3468 powershell.exe 1624 powershell.exe 1624 powershell.exe 4332 powershell.exe 4332 powershell.exe 116 powershell.exe 116 powershell.exe 4544 powershell.exe 4544 powershell.exe 4636 powershell.exe 4636 powershell.exe 4084 powershell.exe 4084 powershell.exe 2500 powershell.exe 4064 powershell.exe 2500 powershell.exe 4064 powershell.exe 2892 powershell.exe 2892 powershell.exe 2764 powershell.exe 2764 powershell.exe 1548 powershell.exe 1548 powershell.exe 1512 powershell.exe 1512 powershell.exe 3852 powershell.exe 3852 powershell.exe 3564 upfc.exe 3564 upfc.exe 4064 powershell.exe 3852 powershell.exe 1548 powershell.exe 3468 powershell.exe 4964 powershell.exe 4544 powershell.exe 4332 powershell.exe 4636 powershell.exe 3788 powershell.exe 116 powershell.exe 1624 powershell.exe 2500 powershell.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 3548 DllCommonsvc.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 3788 powershell.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 4332 powershell.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeDebugPrivilege 116 powershell.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 2764 powershell.exe Token: SeDebugPrivilege 3564 upfc.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 3504 upfc.exe Token: SeDebugPrivilege 4480 upfc.exe Token: SeDebugPrivilege 3328 upfc.exe Token: SeDebugPrivilege 964 upfc.exe Token: SeDebugPrivilege 3744 upfc.exe Token: SeDebugPrivilege 4724 upfc.exe Token: SeDebugPrivilege 5060 upfc.exe Token: SeDebugPrivilege 2276 upfc.exe Token: SeDebugPrivilege 432 upfc.exe Token: SeDebugPrivilege 5012 upfc.exe Token: SeDebugPrivilege 4204 upfc.exe Token: SeDebugPrivilege 5004 upfc.exe Token: SeDebugPrivilege 2072 upfc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4688 4068 JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe 83 PID 4068 wrote to memory of 4688 4068 JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe 83 PID 4068 wrote to memory of 4688 4068 JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe 83 PID 4688 wrote to memory of 4500 4688 WScript.exe 85 PID 4688 wrote to memory of 4500 4688 WScript.exe 85 PID 4688 wrote to memory of 4500 4688 WScript.exe 85 PID 4500 wrote to memory of 3548 4500 cmd.exe 87 PID 4500 wrote to memory of 3548 4500 cmd.exe 87 PID 3548 wrote to memory of 3852 3548 DllCommonsvc.exe 137 PID 3548 wrote to memory of 3852 3548 DllCommonsvc.exe 137 PID 3548 wrote to memory of 4544 3548 DllCommonsvc.exe 138 PID 3548 wrote to memory of 4544 3548 DllCommonsvc.exe 138 PID 3548 wrote to memory of 4964 3548 DllCommonsvc.exe 139 PID 3548 wrote to memory of 4964 3548 DllCommonsvc.exe 139 PID 3548 wrote to memory of 1548 3548 DllCommonsvc.exe 140 PID 3548 wrote to memory of 1548 3548 DllCommonsvc.exe 140 PID 3548 wrote to memory of 4332 3548 DllCommonsvc.exe 141 PID 3548 wrote to memory of 4332 3548 DllCommonsvc.exe 141 PID 3548 wrote to memory of 3788 3548 DllCommonsvc.exe 142 PID 3548 wrote to memory of 3788 3548 DllCommonsvc.exe 142 PID 3548 wrote to memory of 4636 3548 DllCommonsvc.exe 143 PID 3548 wrote to memory of 4636 3548 DllCommonsvc.exe 143 PID 3548 wrote to memory of 2764 3548 DllCommonsvc.exe 144 PID 3548 wrote to memory of 2764 3548 DllCommonsvc.exe 144 PID 3548 wrote to memory of 4084 3548 DllCommonsvc.exe 145 PID 3548 wrote to memory of 4084 3548 DllCommonsvc.exe 145 PID 3548 wrote to memory of 2500 3548 DllCommonsvc.exe 146 PID 3548 wrote to memory of 2500 3548 DllCommonsvc.exe 146 PID 3548 wrote to memory of 116 3548 DllCommonsvc.exe 147 PID 3548 wrote to memory of 116 3548 DllCommonsvc.exe 147 PID 3548 wrote to memory of 2892 3548 DllCommonsvc.exe 148 PID 3548 wrote to memory of 2892 3548 DllCommonsvc.exe 148 PID 3548 wrote to memory of 3468 3548 DllCommonsvc.exe 149 PID 3548 wrote to memory of 3468 3548 DllCommonsvc.exe 149 PID 3548 wrote to memory of 1624 3548 DllCommonsvc.exe 150 PID 3548 wrote to memory of 1624 3548 DllCommonsvc.exe 150 PID 3548 wrote to memory of 4064 3548 DllCommonsvc.exe 151 PID 3548 wrote to memory of 4064 3548 DllCommonsvc.exe 151 PID 3548 wrote to memory of 1512 3548 DllCommonsvc.exe 152 PID 3548 wrote to memory of 1512 3548 DllCommonsvc.exe 152 PID 3548 wrote to memory of 3564 3548 DllCommonsvc.exe 168 PID 3548 wrote to memory of 3564 3548 DllCommonsvc.exe 168 PID 3564 wrote to memory of 4404 3564 upfc.exe 175 PID 3564 wrote to memory of 4404 3564 upfc.exe 175 PID 4404 wrote to memory of 3744 4404 cmd.exe 177 PID 4404 wrote to memory of 3744 4404 cmd.exe 177 PID 4404 wrote to memory of 3504 4404 cmd.exe 183 PID 4404 wrote to memory of 3504 4404 cmd.exe 183 PID 3504 wrote to memory of 1892 3504 upfc.exe 185 PID 3504 wrote to memory of 1892 3504 upfc.exe 185 PID 1892 wrote to memory of 2728 1892 cmd.exe 187 PID 1892 wrote to memory of 2728 1892 cmd.exe 187 PID 1892 wrote to memory of 4480 1892 cmd.exe 191 PID 1892 wrote to memory of 4480 1892 cmd.exe 191 PID 4480 wrote to memory of 1412 4480 upfc.exe 194 PID 4480 wrote to memory of 1412 4480 upfc.exe 194 PID 1412 wrote to memory of 2292 1412 cmd.exe 196 PID 1412 wrote to memory of 2292 1412 cmd.exe 196 PID 1412 wrote to memory of 3328 1412 cmd.exe 198 PID 1412 wrote to memory of 3328 1412 cmd.exe 198 PID 3328 wrote to memory of 4084 3328 upfc.exe 200 PID 3328 wrote to memory of 4084 3328 upfc.exe 200 PID 4084 wrote to memory of 3000 4084 cmd.exe 202 PID 4084 wrote to memory of 3000 4084 cmd.exe 202 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9d380a759e6bcb5f49575b277d93af37f850e1378259c8887a8a78a30db6cd4f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\Sorting\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Security\BrowserCore\en-US\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\ConstraintIndex\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Favorites\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\sihost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\System\uk-UA\unsecapp.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\VLC\skins\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kRqsvBC5Qb.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3744
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mWzz7cjAeP.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2728
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qO35UmqwIy.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2292
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Myoa8e0eVV.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:3000
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\H7kUlUtrsw.bat"14⤵PID:4220
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:4812
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Rhkc0SdEF2.bat"16⤵PID:2636
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:4796
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Oupdpj3XpI.bat"18⤵PID:884
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2964
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0P1AeAAEDQ.bat"20⤵PID:4480
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:3228
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FBiR4PpyYA.bat"22⤵PID:1132
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:3908
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rZY5mW9Lj2.bat"24⤵PID:964
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:4368
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cnsnMHUbNI.bat"26⤵PID:4556
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:4180
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iVopF68B7o.bat"28⤵PID:2416
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:3792
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bkUsYtfOrG.bat"30⤵PID:3472
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:2540
-
-
C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\providercommon\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Windows\Globalization\Sorting\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Globalization\Sorting\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\Globalization\Sorting\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\providercommon\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\ConstraintIndex\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\ConstraintIndex\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\ConstraintIndex\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Favorites\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default\Favorites\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Favorites\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\System\uk-UA\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\uk-UA\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\System\uk-UA\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\skins\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\skins\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Program Files\VideoLAN\VLC\skins\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\providercommon\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Admin\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
224B
MD5cdfff12cb94c19027fdafd0a386d5ae9
SHA11ce7d3f96aaaf366d9e6e0cb9a89775a1a60a03a
SHA2569c7d4ff20d809cd70cbd1e00a51ff7447f57ac65fcb957f745f14013763867e6
SHA5126a200162e6591205178b62b203b43dbf9fd9a6106b51e4de6600a66f2f7f70d812e735586058f338fd88c4cbe9234caa22f44de68227fbf286ebfab3ee17c3c3
-
Filesize
224B
MD5678d0a037055f23e5723cbde130ac5c9
SHA12b86d4714db9ba22d404523c048fca5ad4f951d3
SHA25666078a0d38353def7605acda335c5cc176e9cf22c80e31fcc31ce684b4546753
SHA51206006caafb9f89d38546945daada19101b46ddfcc7e8fa528fc6ceb9b62aadbb323b5e903ed264d6e648070b197d97c5a2f17fca3ebeb0430b18d0940b794555
-
Filesize
224B
MD562d2e2e565f6d975602681e61b059412
SHA13a864ae378cee1dda5d33471ac3969730eef4658
SHA25649223756bd59f5c89ebd5710cdb1ebffe5ef650502fffad3b2cf00a91b07e2a0
SHA5121606a4f05e781b629eca94bc19aa0029b89e2c27047fc74ca626353c4a41c0523f343d709f44bd70cfa3bb65fbb25b528e2f2edaf65a4963d80203ada20820da
-
Filesize
224B
MD5d173cc82e305b3188d87fc4d53204130
SHA1a6c3a9ec4801287d5a77938d3c92effe526665f5
SHA256898d478ed319b214670495b06dd7b02344bfb3ba847def73429eea6b2477a133
SHA512f2c07e116b1f4eb68651a5c9d39a930e7f68176052bb4cca7859cbea0d9c1211e6cf987f0bb9c5cf897c3cb0fb956b905dedfb9c4ce6b080d09ef174d4905b38
-
Filesize
224B
MD5b92aa6a10ba26ad1ffd0f1b02abb7047
SHA1a1d9c07b8216a85fcf82fa2e32e13304df6d0086
SHA25668480651672102bde26f50953a7eaba87126557a93fd6da29f96045dbd686360
SHA51231f3195f74779276c3cbc4778f296dc8e6566699755ef04f524ba9916883a4559f68fd6fc144f85ba4f2f0a4237b2412d1dcef87a305d8a4465b5c8ddb688212
-
Filesize
224B
MD5b2e8c54bddf7f8092edb508548e9d9f6
SHA13f6b8bf00292a58ce4bcdbc729cf150edbf210a2
SHA25665a8def06882edc37d9334e3f8c03d05c4d76c2275298528c35c93b8d223f8fb
SHA5122c6e2d1b0c72f64b35549099501d54837e2573f28e75349bf0a9d250f3f7c0bceda69f3a9343aaaa144cc1e3fe514bba2b833a29da8267b35ad6d4bf448d0179
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
224B
MD5222de70088a71690c3b00a98ee23883b
SHA12a6aa554a8a6c19c3845fb23cfe9454f801e1523
SHA25681215e67be7dd2e04cadddf8d4ed913a925eed8b765fd5fef484b720d746a18a
SHA512ee14ea5605c46cd192b062c7f5830dfcba7b2143ce7709e8e1b4354ee3124d0d618cd65e7fb6f35c15e29dfe0b596f206a5d37172e5216e025b1abf17454f363
-
Filesize
224B
MD53a677ac13522dbeaf84a0a0126133f03
SHA111b05bc13375655f951cc0cc5151ba4aef8107a0
SHA2560e258d36832fe74ad0bd5139f3f785e3ca4e71f970a24f45c3f4f011011b3da6
SHA51204585772b7ad9f9b7a3d25a38d0ba92d61bb5972fd78a41b9721ec7d4311d86ca51ea396e395325e1e1e317239a60146ace6eb0be2b18aa97d064e329d76196c
-
Filesize
224B
MD59f4cba33b7f0ea7eea80883ac2fa9647
SHA1e0785efb084b1be0fd61967a7ee20ff7d5df1256
SHA256bd9a320768f81b69f63c608d8a9998ced82c4b8ed41b227980b853c82592d163
SHA5121d0d49e65aeea2b659b38d49c6af68bf33ce32d5e963f474044704f757372bc9e18c5b1f560d8e4fc86c77c1201e3316915d1cb5caf6f29fea03ec65577f810f
-
Filesize
224B
MD56f0b43d4467698b2e3d2265e3d3aad40
SHA18087ed1ae09c9cc91ff00aa91abeaf4fdf55443f
SHA2567d405c478653fe046814589215ffbe91de0ca03f445afcaf4249d5fc40802c29
SHA5125984071cb773ea7ca64ac9f64633e617a39db66e03d2f9c2d7d85381320d4f76072d5f950cc78e60d576b8f84617da5a61c28dfd1c8e97df32212aebf052d43d
-
Filesize
224B
MD5fa5170ed727d024c32b795ab55690b4c
SHA13addf3a088dd732b49260b1db5dfb1722eabcad6
SHA25651e32996df87433a50e593eee465bb4c096f7e9dc70da4d7bb84e61c5728932d
SHA512061a870029c364729188ef127e46bcbfb93f59da847dc530fbf58775859cfc31bf1a5c33d3c7c66b2798f0a3c31ae2fede24fabd777d4abcc77e6f6e6d7ea01e
-
Filesize
224B
MD58de7ef1ffb03ef130b896ba450fa0180
SHA1e200eb06986d3d71e259676939f8c4fda2bc1f9f
SHA25697fb3938755ca11bf1fca27ded8e591e4c5e976db9d0466dad6e3740ae9b59df
SHA51247c21f11429a47b07cef3048619f751c120989d32dde0e37f2eeecb5d954d9e8c3eefd991d81e9d3bae2e079b0a8d9406b295d2e882fd7d4977c88c44c8b9392
-
Filesize
224B
MD533803cd755dd67539566da8b1b825f27
SHA198bb3cad0a39cd6b0a393166452e99ad96e34c01
SHA2567a3aef1266e9c39141653f02594de9c99292dcd6bad1a28d3782b0880e9151f0
SHA512f1d8cee033d69d816607c796ea07f36f45107946c871709bb692b512644863df7bb1fbaf0505d7e5f59a3f7abbbd87136190efed24c4893aaf6f7ba13668909c
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478