Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 09:59
Behavioral task
behavioral1
Sample
JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe
-
Size
1.3MB
-
MD5
a2682b02abff1dcc96661f5c71213d13
-
SHA1
67f79ff964c47ef65d2a1a38e2169ecefa5473c8
-
SHA256
5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b
-
SHA512
57cf43f76fc3123dcc031727a26c99880613c73b4c09385f25f3a13d28067e223a1a291087fe7889d1a00a8b909a390f9d976479a605e1921ec029f2234e5e7d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3908 1336 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 1336 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4884 1336 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 1336 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4600 1336 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1036 1336 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000a000000023b68-10.dat dcrat behavioral2/memory/2176-13-0x0000000000C40000-0x0000000000D50000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1120 powershell.exe 2280 powershell.exe 4012 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation csrss.exe -
Executes dropped EXE 14 IoCs
pid Process 2176 DllCommonsvc.exe 4780 csrss.exe 2100 csrss.exe 3720 csrss.exe 2120 csrss.exe 1308 csrss.exe 3604 csrss.exe 4840 csrss.exe 3204 csrss.exe 1984 csrss.exe 3276 csrss.exe 4196 csrss.exe 4176 csrss.exe 3868 csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 16 raw.githubusercontent.com 43 raw.githubusercontent.com 47 raw.githubusercontent.com 56 raw.githubusercontent.com 58 raw.githubusercontent.com 15 raw.githubusercontent.com 23 raw.githubusercontent.com 41 raw.githubusercontent.com 42 raw.githubusercontent.com 48 raw.githubusercontent.com 55 raw.githubusercontent.com 57 raw.githubusercontent.com 59 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings csrss.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3908 schtasks.exe 2560 schtasks.exe 4884 schtasks.exe 1564 schtasks.exe 4600 schtasks.exe 1036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2176 DllCommonsvc.exe 2280 powershell.exe 4012 powershell.exe 1120 powershell.exe 1120 powershell.exe 2280 powershell.exe 4012 powershell.exe 4780 csrss.exe 2100 csrss.exe 3720 csrss.exe 2120 csrss.exe 1308 csrss.exe 3604 csrss.exe 4840 csrss.exe 3204 csrss.exe 1984 csrss.exe 3276 csrss.exe 4196 csrss.exe 4176 csrss.exe 3868 csrss.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2176 DllCommonsvc.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 4012 powershell.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeDebugPrivilege 4780 csrss.exe Token: SeDebugPrivilege 2100 csrss.exe Token: SeDebugPrivilege 3720 csrss.exe Token: SeDebugPrivilege 2120 csrss.exe Token: SeDebugPrivilege 1308 csrss.exe Token: SeDebugPrivilege 3604 csrss.exe Token: SeDebugPrivilege 4840 csrss.exe Token: SeDebugPrivilege 3204 csrss.exe Token: SeDebugPrivilege 1984 csrss.exe Token: SeDebugPrivilege 3276 csrss.exe Token: SeDebugPrivilege 4196 csrss.exe Token: SeDebugPrivilege 4176 csrss.exe Token: SeDebugPrivilege 3868 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 3176 216 JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe 84 PID 216 wrote to memory of 3176 216 JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe 84 PID 216 wrote to memory of 3176 216 JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe 84 PID 3176 wrote to memory of 2684 3176 WScript.exe 85 PID 3176 wrote to memory of 2684 3176 WScript.exe 85 PID 3176 wrote to memory of 2684 3176 WScript.exe 85 PID 2684 wrote to memory of 2176 2684 cmd.exe 87 PID 2684 wrote to memory of 2176 2684 cmd.exe 87 PID 2176 wrote to memory of 1120 2176 DllCommonsvc.exe 95 PID 2176 wrote to memory of 1120 2176 DllCommonsvc.exe 95 PID 2176 wrote to memory of 2280 2176 DllCommonsvc.exe 96 PID 2176 wrote to memory of 2280 2176 DllCommonsvc.exe 96 PID 2176 wrote to memory of 4012 2176 DllCommonsvc.exe 97 PID 2176 wrote to memory of 4012 2176 DllCommonsvc.exe 97 PID 2176 wrote to memory of 4780 2176 DllCommonsvc.exe 101 PID 2176 wrote to memory of 4780 2176 DllCommonsvc.exe 101 PID 4780 wrote to memory of 1920 4780 csrss.exe 102 PID 4780 wrote to memory of 1920 4780 csrss.exe 102 PID 1920 wrote to memory of 3156 1920 cmd.exe 104 PID 1920 wrote to memory of 3156 1920 cmd.exe 104 PID 1920 wrote to memory of 2100 1920 cmd.exe 108 PID 1920 wrote to memory of 2100 1920 cmd.exe 108 PID 2100 wrote to memory of 2868 2100 csrss.exe 112 PID 2100 wrote to memory of 2868 2100 csrss.exe 112 PID 2868 wrote to memory of 2560 2868 cmd.exe 114 PID 2868 wrote to memory of 2560 2868 cmd.exe 114 PID 2868 wrote to memory of 3720 2868 cmd.exe 116 PID 2868 wrote to memory of 3720 2868 cmd.exe 116 PID 3720 wrote to memory of 3276 3720 csrss.exe 118 PID 3720 wrote to memory of 3276 3720 csrss.exe 118 PID 3276 wrote to memory of 3976 3276 cmd.exe 120 PID 3276 wrote to memory of 3976 3276 cmd.exe 120 PID 3276 wrote to memory of 2120 3276 cmd.exe 121 PID 3276 wrote to memory of 2120 3276 cmd.exe 121 PID 2120 wrote to memory of 5116 2120 csrss.exe 122 PID 2120 wrote to memory of 5116 2120 csrss.exe 122 PID 5116 wrote to memory of 4616 5116 cmd.exe 124 PID 5116 wrote to memory of 4616 5116 cmd.exe 124 PID 5116 wrote to memory of 1308 5116 cmd.exe 125 PID 5116 wrote to memory of 1308 5116 cmd.exe 125 PID 1308 wrote to memory of 1568 1308 csrss.exe 126 PID 1308 wrote to memory of 1568 1308 csrss.exe 126 PID 1568 wrote to memory of 3428 1568 cmd.exe 128 PID 1568 wrote to memory of 3428 1568 cmd.exe 128 PID 1568 wrote to memory of 3604 1568 cmd.exe 129 PID 1568 wrote to memory of 3604 1568 cmd.exe 129 PID 3604 wrote to memory of 4796 3604 csrss.exe 130 PID 3604 wrote to memory of 4796 3604 csrss.exe 130 PID 4796 wrote to memory of 5052 4796 cmd.exe 132 PID 4796 wrote to memory of 5052 4796 cmd.exe 132 PID 4796 wrote to memory of 4840 4796 cmd.exe 133 PID 4796 wrote to memory of 4840 4796 cmd.exe 133 PID 4840 wrote to memory of 3668 4840 csrss.exe 134 PID 4840 wrote to memory of 3668 4840 csrss.exe 134 PID 3668 wrote to memory of 4360 3668 cmd.exe 136 PID 3668 wrote to memory of 4360 3668 cmd.exe 136 PID 3668 wrote to memory of 3204 3668 cmd.exe 137 PID 3668 wrote to memory of 3204 3668 cmd.exe 137 PID 3204 wrote to memory of 372 3204 csrss.exe 138 PID 3204 wrote to memory of 372 3204 csrss.exe 138 PID 372 wrote to memory of 1656 372 cmd.exe 140 PID 372 wrote to memory of 1656 372 cmd.exe 140 PID 372 wrote to memory of 1984 372 cmd.exe 141 PID 372 wrote to memory of 1984 372 cmd.exe 141 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5faed8a565ffd08e34be5415ba66d4279b154edcb8c4635ca3f1e11d4ee9b04b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Saved Games\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Videos\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\muCkezbCVz.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3156
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uZApDsIgYI.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2560
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CSN9cxKiet.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:3976
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\grdey4A1QM.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:4616
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HAJBVlyJNQ.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:3428
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OyPKZ08zKl.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:5052
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BHs9KC1JDp.bat"18⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:4360
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zcjutnjrcv.bat"20⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:1656
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wUBsuxMZs4.bat"22⤵PID:1296
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:768
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Y29a6RA8xz.bat"24⤵PID:4464
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:3012
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Wx0Tv0d3iA.bat"26⤵PID:1120
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:4724
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0VN2lTwXPf.bat"28⤵PID:4792
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:1764
-
-
C:\Users\Admin\Videos\csrss.exe"C:\Users\Admin\Videos\csrss.exe"29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Saved Games\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Admin\Saved Games\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Saved Games\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Videos\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Videos\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Videos\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
196B
MD5b886f2d82482dc9017f527c7f2d0af52
SHA160f363c8e4cc2be97f372c73889e88f10560d471
SHA2563194ad66e0a2f6dd3eab1ad1701089d3806789a5c1e0c2270490c5acd1980470
SHA512f3fa6124b897d723d6b871647ed0f3d18c6afae6b6081cc8f745c608fae0d991e83444b3fe7addfbe34530e6d81bc5ced5dadbac57b4a40d308b3c819f4fe4c0
-
Filesize
196B
MD5d346919dd99f1f6956ccd249d9dd7eb9
SHA10babc48b055ab249c3ffbf99e67149791240c71e
SHA25644209870ba358d8de285b3e565f72f657ac79b289ccfa817e3fe159c148ea02b
SHA512a9612502053ccba24235f31c16361372f670d1f4fe4319c9d31326c117fbcef82e25be83e74c9c0d391aa9ef769834b5834a8019b4bed186c6a37fca2121ef31
-
Filesize
196B
MD540e00784139436ae55b951cca84390e7
SHA19f0db3048a66d0c07e60b63bc4f781159d132b82
SHA25664f9111d0c34608c525310790c3047c4c646bda17b9e86066795fad30be9da73
SHA5122c33bc7088f10824f1c41ce829e55298b40188aaf4f7280a4a27ba40bae42ad57342bf0706bcf80d1c5e0efce3981dd23c21955c76d2cf04b6e6ea19083f77d6
-
Filesize
196B
MD5b3c560485b99c851d883bafb1efa76ac
SHA1562d0f1dc9a2d7815894c968d5124faca23d226b
SHA25613770aed72fd82915dd9b373e2bbe0cafc0b0425ec2d3ba183960d9af49ba0e1
SHA512661a6ac65ffca44ed9d04e407e5057de30f2439c925704d277f81ff3d30a24ed4ae25afa0ad11a5ad6904cae8e259b8ac5b37f7821602d4935c0192a4dd055f7
-
Filesize
196B
MD52fe2576a7683bc237aabf12fa9b8ad04
SHA195c80d8495417517e4427f57546464261fc38dc8
SHA256fae0cb4edf440caf4b150fa26e24e58aec18fad942949343dcdaff42987608b3
SHA5126f92e2372a45e8f8050a8f20285a9972dc7472d30cd1c62211e266b92a31e51db45a4148d55f573ccad5fe4b395c815ab3a7a964f3c0cc4180bbac000fb1ea9b
-
Filesize
196B
MD5a14c9e1b44bdc81715762d901a1c6d22
SHA1451283a2e454de4f8b276c9f84869715961ecadb
SHA25622fd701e83eab72d2e8761948d73f89f44d54e3ced99fda01f22f6fef84f32a1
SHA512d3b31810b2c799e3dbe930df45196a38e8cf1a9f409a0a9b0bc12e423591f3d2f2989c360d092b32aeb93bacdfc865ea3922ceb68d3ffe3b2d0cb031f194ace2
-
Filesize
196B
MD56872b17add75762499a1e30fa4245c73
SHA17e1bc21a8e6f9aedd8ceb25357bb853e7b2ec6c6
SHA2562b4dc95809194c0f6a7005ead924bd17087be2c6030beb8d3f28034e838de66a
SHA51210ea8e2f5955e1a69ee4cc50dbafee68db213f42e1bde66f5331a8121bb9f2c5cca65b8de6f24006eaf758f2aeefa1efea88099ddd60c7221988602bf1c19c7e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
196B
MD5100719d118416db62654a65346890843
SHA1998661eedfa207d71ca4199feb36133586f601b0
SHA2567d4d61b3d0155c5cce3515f98dde95c4c9622394d8ab3c9760178862facd7408
SHA512d47a37f6f45b40053e5faca87bdd289aed16122912b225800418c21e9991c30fdc38f2a6c93147f00717aaad786dd61f8413aadda18c5fdcb68167db0d9ad652
-
Filesize
196B
MD5bf2d6407b38769f3437d442e694e1198
SHA175d883eac318d0849a3fa5ba275f254c136dc9dd
SHA25605ce8bc46f25fb9b7f7be033b5227aa5d3f342bed362950b08499b841500dab0
SHA5121d75fdf689a5a439e3eddaf3c4a2aa0694512c82ac61b76a779a1b72d15f0bd8fc8c5d67ef1cc1ed13b1ff6d66033dca306b77abbc44ecf25a53581b6e311f2a
-
Filesize
196B
MD5b5b70163558ea54bd62c5e17a530fec7
SHA137fafd05697814707159cb8a6abd51ac3c3f6e6c
SHA256a21ae13413a0e1519c9f5aac1d335d2826394a66c3dd710d9fad050c23874c9e
SHA512d3e957177807c8232d42bfa25b90e729477fcec2947a61400e5cc006932edc42cb3dad1de374015599783878994d16dbb59a5b144e8259925b57d6cedbea10a9
-
Filesize
196B
MD57c2014cbbf6cff015be1a63b01eb1a62
SHA13efbccd87d34c39c8a5b94d10ded1e822fa8d98b
SHA256f1129026486078fd9f4f6aa9889bd2558f9112868f0d782b40d4052db5d637b7
SHA5128d4c0c47684751b07f63a19f6eb6be20f80efb6e2b6f64c5bb41e72676c3f3a7b308f81cd0de3c169eedceac6f12b3eb43056b55ba7ab46718e98e5d984ad8d0
-
Filesize
196B
MD54072fe362f2244a3c351e6771dab1f06
SHA15c4ba0bda8040acb4353a91a86b8961bff36e6ef
SHA256a7faa60ca067ddc077aa96d52aed11364a0a58ba15a157f52260c02ab5b4ac44
SHA512194bbe9093667452067cc3195e4ad3e16b2c46880851fac6c7e49a5b3f80b95ce5280d36969302482a390e2d9cdd5f5c2203d9c811b94b09de6b91e9a428a825
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478