Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 09:58
Behavioral task
behavioral1
Sample
JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe
-
Size
1.3MB
-
MD5
3f89c4e1f13915108895edf145ffca61
-
SHA1
c1d0b871fde87b46b8b0f2052ec607740c65e4f5
-
SHA256
984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f
-
SHA512
9fbc5c2f58274675595ab08ccf251fe8290c1778592fee07bc93810a0a22ca60239ac4b3210fd3b0af3ee42d740ced2471000c0e5a886ca728eda654feba02c1
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 900 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1404 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1156 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 292 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 708 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 268 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1572 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 864 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 2764 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 2764 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000018687-10.dat dcrat behavioral1/memory/1868-13-0x0000000000810000-0x0000000000920000-memory.dmp dcrat behavioral1/memory/1728-58-0x0000000001300000-0x0000000001410000-memory.dmp dcrat behavioral1/memory/556-96-0x0000000000BE0000-0x0000000000CF0000-memory.dmp dcrat behavioral1/memory/1724-209-0x0000000001100000-0x0000000001210000-memory.dmp dcrat behavioral1/memory/2408-270-0x0000000001320000-0x0000000001430000-memory.dmp dcrat behavioral1/memory/960-331-0x0000000001360000-0x0000000001470000-memory.dmp dcrat behavioral1/memory/1756-630-0x0000000000060000-0x0000000000170000-memory.dmp dcrat behavioral1/memory/2188-690-0x0000000000ED0000-0x0000000000FE0000-memory.dmp dcrat behavioral1/memory/864-750-0x00000000012E0000-0x00000000013F0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2156 powershell.exe 2824 powershell.exe 2804 powershell.exe 1324 powershell.exe 1032 powershell.exe 2836 powershell.exe 1556 powershell.exe 1656 powershell.exe 2632 powershell.exe 1528 powershell.exe 444 powershell.exe 1432 powershell.exe 2840 powershell.exe 1164 powershell.exe 1132 powershell.exe 1208 powershell.exe 2252 powershell.exe 1400 powershell.exe -
Executes dropped EXE 13 IoCs
pid Process 1868 DllCommonsvc.exe 1728 DllCommonsvc.exe 556 DllCommonsvc.exe 1724 DllCommonsvc.exe 2408 DllCommonsvc.exe 960 DllCommonsvc.exe 1588 DllCommonsvc.exe 3040 DllCommonsvc.exe 2836 DllCommonsvc.exe 1284 DllCommonsvc.exe 1756 DllCommonsvc.exe 2188 DllCommonsvc.exe 864 DllCommonsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2124 cmd.exe 2124 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 29 raw.githubusercontent.com 32 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 16 raw.githubusercontent.com 19 raw.githubusercontent.com 35 raw.githubusercontent.com 4 raw.githubusercontent.com 13 raw.githubusercontent.com 23 raw.githubusercontent.com 26 raw.githubusercontent.com -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\smss.exe DllCommonsvc.exe File opened for modification C:\Program Files\VideoLAN\VLC\smss.exe DllCommonsvc.exe File created C:\Program Files\VideoLAN\VLC\69ddcba757bf72 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\System.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\27d1bcfc3c54e0 DllCommonsvc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\PCHEALTH\ERRORREP\taskhost.exe DllCommonsvc.exe File created C:\Windows\PCHEALTH\ERRORREP\b75386f1303e64 DllCommonsvc.exe File created C:\Windows\servicing\Version\winlogon.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2612 schtasks.exe 1404 schtasks.exe 1828 schtasks.exe 2528 schtasks.exe 2640 schtasks.exe 1056 schtasks.exe 2736 schtasks.exe 2664 schtasks.exe 268 schtasks.exe 1572 schtasks.exe 1796 schtasks.exe 2772 schtasks.exe 2932 schtasks.exe 2036 schtasks.exe 1800 schtasks.exe 1672 schtasks.exe 2520 schtasks.exe 2408 schtasks.exe 2348 schtasks.exe 1288 schtasks.exe 332 schtasks.exe 2476 schtasks.exe 864 schtasks.exe 2740 schtasks.exe 2180 schtasks.exe 1688 schtasks.exe 2784 schtasks.exe 2168 schtasks.exe 888 schtasks.exe 2324 schtasks.exe 708 schtasks.exe 2920 schtasks.exe 2464 schtasks.exe 2812 schtasks.exe 2468 schtasks.exe 1936 schtasks.exe 1620 schtasks.exe 2748 schtasks.exe 1156 schtasks.exe 2512 schtasks.exe 292 schtasks.exe 1676 schtasks.exe 2828 schtasks.exe 2956 schtasks.exe 2260 schtasks.exe 2280 schtasks.exe 2976 schtasks.exe 900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1868 DllCommonsvc.exe 2156 powershell.exe 1656 powershell.exe 1400 powershell.exe 1432 powershell.exe 1164 powershell.exe 1728 DllCommonsvc.exe 1728 DllCommonsvc.exe 1728 DllCommonsvc.exe 1728 DllCommonsvc.exe 1728 DllCommonsvc.exe 1728 DllCommonsvc.exe 1728 DllCommonsvc.exe 2824 powershell.exe 2840 powershell.exe 2252 powershell.exe 2632 powershell.exe 1324 powershell.exe 1528 powershell.exe 1556 powershell.exe 1132 powershell.exe 1208 powershell.exe 444 powershell.exe 2836 powershell.exe 2804 powershell.exe 1032 powershell.exe 556 DllCommonsvc.exe 1724 DllCommonsvc.exe 2408 DllCommonsvc.exe 960 DllCommonsvc.exe 1588 DllCommonsvc.exe 3040 DllCommonsvc.exe 2836 DllCommonsvc.exe 1284 DllCommonsvc.exe 1756 DllCommonsvc.exe 2188 DllCommonsvc.exe 864 DllCommonsvc.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 1868 DllCommonsvc.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1400 powershell.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 1728 DllCommonsvc.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 556 DllCommonsvc.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 1132 powershell.exe Token: SeDebugPrivilege 1208 powershell.exe Token: SeDebugPrivilege 444 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 1032 powershell.exe Token: SeDebugPrivilege 1724 DllCommonsvc.exe Token: SeDebugPrivilege 2408 DllCommonsvc.exe Token: SeDebugPrivilege 960 DllCommonsvc.exe Token: SeDebugPrivilege 1588 DllCommonsvc.exe Token: SeDebugPrivilege 3040 DllCommonsvc.exe Token: SeDebugPrivilege 2836 DllCommonsvc.exe Token: SeDebugPrivilege 1284 DllCommonsvc.exe Token: SeDebugPrivilege 1756 DllCommonsvc.exe Token: SeDebugPrivilege 2188 DllCommonsvc.exe Token: SeDebugPrivilege 864 DllCommonsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2348 2080 JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe 31 PID 2080 wrote to memory of 2348 2080 JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe 31 PID 2080 wrote to memory of 2348 2080 JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe 31 PID 2080 wrote to memory of 2348 2080 JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe 31 PID 2348 wrote to memory of 2124 2348 WScript.exe 32 PID 2348 wrote to memory of 2124 2348 WScript.exe 32 PID 2348 wrote to memory of 2124 2348 WScript.exe 32 PID 2348 wrote to memory of 2124 2348 WScript.exe 32 PID 2124 wrote to memory of 1868 2124 cmd.exe 34 PID 2124 wrote to memory of 1868 2124 cmd.exe 34 PID 2124 wrote to memory of 1868 2124 cmd.exe 34 PID 2124 wrote to memory of 1868 2124 cmd.exe 34 PID 1868 wrote to memory of 1656 1868 DllCommonsvc.exe 48 PID 1868 wrote to memory of 1656 1868 DllCommonsvc.exe 48 PID 1868 wrote to memory of 1656 1868 DllCommonsvc.exe 48 PID 1868 wrote to memory of 1432 1868 DllCommonsvc.exe 49 PID 1868 wrote to memory of 1432 1868 DllCommonsvc.exe 49 PID 1868 wrote to memory of 1432 1868 DllCommonsvc.exe 49 PID 1868 wrote to memory of 1400 1868 DllCommonsvc.exe 50 PID 1868 wrote to memory of 1400 1868 DllCommonsvc.exe 50 PID 1868 wrote to memory of 1400 1868 DllCommonsvc.exe 50 PID 1868 wrote to memory of 1164 1868 DllCommonsvc.exe 51 PID 1868 wrote to memory of 1164 1868 DllCommonsvc.exe 51 PID 1868 wrote to memory of 1164 1868 DllCommonsvc.exe 51 PID 1868 wrote to memory of 2156 1868 DllCommonsvc.exe 52 PID 1868 wrote to memory of 2156 1868 DllCommonsvc.exe 52 PID 1868 wrote to memory of 2156 1868 DllCommonsvc.exe 52 PID 1868 wrote to memory of 2852 1868 DllCommonsvc.exe 58 PID 1868 wrote to memory of 2852 1868 DllCommonsvc.exe 58 PID 1868 wrote to memory of 2852 1868 DllCommonsvc.exe 58 PID 2852 wrote to memory of 660 2852 cmd.exe 60 PID 2852 wrote to memory of 660 2852 cmd.exe 60 PID 2852 wrote to memory of 660 2852 cmd.exe 60 PID 2852 wrote to memory of 1728 2852 cmd.exe 61 PID 2852 wrote to memory of 1728 2852 cmd.exe 61 PID 2852 wrote to memory of 1728 2852 cmd.exe 61 PID 1728 wrote to memory of 2824 1728 DllCommonsvc.exe 98 PID 1728 wrote to memory of 2824 1728 DllCommonsvc.exe 98 PID 1728 wrote to memory of 2824 1728 DllCommonsvc.exe 98 PID 1728 wrote to memory of 2804 1728 DllCommonsvc.exe 99 PID 1728 wrote to memory of 2804 1728 DllCommonsvc.exe 99 PID 1728 wrote to memory of 2804 1728 DllCommonsvc.exe 99 PID 1728 wrote to memory of 2252 1728 DllCommonsvc.exe 101 PID 1728 wrote to memory of 2252 1728 DllCommonsvc.exe 101 PID 1728 wrote to memory of 2252 1728 DllCommonsvc.exe 101 PID 1728 wrote to memory of 1556 1728 DllCommonsvc.exe 102 PID 1728 wrote to memory of 1556 1728 DllCommonsvc.exe 102 PID 1728 wrote to memory of 1556 1728 DllCommonsvc.exe 102 PID 1728 wrote to memory of 444 1728 DllCommonsvc.exe 103 PID 1728 wrote to memory of 444 1728 DllCommonsvc.exe 103 PID 1728 wrote to memory of 444 1728 DllCommonsvc.exe 103 PID 1728 wrote to memory of 1132 1728 DllCommonsvc.exe 104 PID 1728 wrote to memory of 1132 1728 DllCommonsvc.exe 104 PID 1728 wrote to memory of 1132 1728 DllCommonsvc.exe 104 PID 1728 wrote to memory of 1324 1728 DllCommonsvc.exe 105 PID 1728 wrote to memory of 1324 1728 DllCommonsvc.exe 105 PID 1728 wrote to memory of 1324 1728 DllCommonsvc.exe 105 PID 1728 wrote to memory of 2632 1728 DllCommonsvc.exe 107 PID 1728 wrote to memory of 2632 1728 DllCommonsvc.exe 107 PID 1728 wrote to memory of 2632 1728 DllCommonsvc.exe 107 PID 1728 wrote to memory of 2836 1728 DllCommonsvc.exe 109 PID 1728 wrote to memory of 2836 1728 DllCommonsvc.exe 109 PID 1728 wrote to memory of 2836 1728 DllCommonsvc.exe 109 PID 1728 wrote to memory of 2840 1728 DllCommonsvc.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_984d2389d834a993fdbbd1c2b35819f66683faa1938a827fa8852e86e6b7d32f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rjLuxY44un.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:660
-
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\VLC\smss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\dwm.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\winlogon.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PCHEALTH\ERRORREP\taskhost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\taskhost.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\es-ES\System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\Idle.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Favorites\System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\csrss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Dk8ljd7jBY.bat"8⤵PID:1516
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:708
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\16sHyqWYU0.bat"10⤵PID:3040
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2200
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xgactKMGCU.bat"12⤵PID:1952
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2528
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\V61H6ynXXY.bat"14⤵PID:3064
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:1928
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\P9uKrkSNlp.bat"16⤵PID:1624
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:352
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Jk1vLt9ke4.bat"18⤵PID:2080
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2408
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\38MS6cfT7h.bat"20⤵PID:1208
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2556
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\p6CE4ikEee.bat"22⤵PID:2888
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2656
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6uMgbjYtd5.bat"24⤵PID:2892
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:1036
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AMKHlt6LWj.bat"26⤵PID:2844
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:2584
-
-
C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe"27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\providercommon\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\VideoLAN\VLC\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\VideoLAN\VLC\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Windows\PCHEALTH\ERRORREP\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\PCHEALTH\ERRORREP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Windows\PCHEALTH\ERRORREP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Favorites\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\Favorites\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Favorites\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Default\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Default\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ec17564b68e1c1845a1f878b11eea4
SHA1c1aa535e12de68d1f547327bccf6988b6ed71cb3
SHA256a6d36ca6991e872903d307b2635919d25d21568b28332932ff77e3d961b0a899
SHA5121cf128281fabfb968c74da17d05ebdbb110f64fab3af24d0e5a5a8edc9a153f3faaa9f5234503ed6f780af4b31b2c287146dec8b9e1c72a15f8b6d10604fb821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cef3a9c6c905b2ef2d9ad15d5f1b43d
SHA12480a8ef8623fca0a63cc4763eac245a039e984e
SHA256af123bd233b8fbc68e300709b9cebcc7cc4595f4acef5d10c48f0988db72a357
SHA512881e7d8bca86333bb12fbef590d9cf90149e80b97199801a4b5d3170928e6fa5902825c9284f4ac2c7e61deb185ff7b39c463cfbea0323818862d12f3788d9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51178adb35da2446645f9ba59a06e78e6
SHA15f42493e4625bb4149d2adf8fcf37bfec49fbfcf
SHA256d3f5c14d39e01aaea6d86e0a0b97a6556c9bcc5735c1134f0024c2b62fd09f86
SHA5121ffa534a3804d3111347d4014a83d355878d2b2a95cf3ec03bff083c1c65bfeca4936ebe0ca6e20ed496ab2f0862c6c0f286fcb9d01f6004dbd7a6b1e459a6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ca70ec29133aa43b3e5723a0aefa72
SHA1413ef435cd3e0ce4e34ecc555f1476d818322742
SHA256cadc3567d4bbb116ce4636b7c49ceb95b132f75b6bcec2a5a26f6a32e0d6087c
SHA5124ff0c0cc7b66c144cb9203406396e33fd201c693de1e458edb52bd5dcf4dc1c601f9b4bb7a01769b0e532f5bf336a7418b83ea9a0bd28464f17793fbc1912ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb6d41a22e4cab8f4d4f96dfc2729b2
SHA1e8f71dc411d1015b31031f91687ee83d8d7e381b
SHA25692835d89d76d88fd4b1b68d2d19e7aa3e8ef3f7b8d446be4ce37afcb87271391
SHA5122f8cae6c50c14505919b44740678ecd827079863792424b200d4d6b7ef0065781c5f43d790f148dfbd1eef25033a9542d70ec4c2eae927714be7fc112a2005ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a069dad45cb475723480c626c9d285
SHA176d9f5d1d7624c4c7604e76093d2868849116409
SHA256a1c4e47b3a7f7827af62a9c6855ac517853f261afa1700d20924a472687e0761
SHA512a10cc669ae7f37dc1e3a4f15351aca581c160be9870a0aa1bcaa0362d328c8d32340832d60b3ffd715659927f1ae555769e35606840c40defc7d624bc56f6435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a197681ba5f45f59344ef94bf16e368
SHA1ef0fedc40317d4a2643d9171e6d5262724825851
SHA2569b96c64ecadd8e5cddfc8161b8d4745b638222f84c534b66ffd105e8e13066f9
SHA51297c1740566f8916f6d9741cc566bd0d5890e61af8cd4625bb06660c88940de18c790fb77e804bb5b3bf90a27cba25893cfa78dafddd8036823a0ae64d73b35d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deaa366469b811d588e2394972ff477d
SHA1e5f9289795954df0a44a131d67db411ed7294458
SHA2566be52e67d492390d1e750103d6da2ac904e46db6213d7d8c38b768dd1a553f3a
SHA512a8b5ea4c90dd45f72d458b451c5f36689de0f55c72e6ce0bafe0783f6c9293305ad0ceec422d9b67f4700d2c5f36094acdc52442e58a80492b7d6038901434bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712148303a5c78450e99d5758edc3187
SHA123b5e6f0bbb1302f3b71817fdab74cedd836f38f
SHA256cd0ebf0657d1c145946cf96f478b0a4ecc95b1447af86f8eee30f4d11b7f81a4
SHA512d45824decdce2f1a5810ea32f2a7344cf480740bf1ba0c9b41c4037e80449978dbf10ed8788d1966dc6143bfa6b37d596438a6c2f9bd2909aab713b0954ecd1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b3261c2dc5e9aa6082cba51c818e9f
SHA1192c528e88647b590367b0473ba468608588af27
SHA256cf705ee549961d04ea8394746713aede2755eba439b38f31e2b6bbab5242929f
SHA51277a9a0e6e3469a4e4b6b9184fccd38f94c1b8eeec1128768941fe1234f677c2346cc78f795d026bcb2980b5ff0b1e57d7e623ec3c31b3758fc141ba07086f052
-
Filesize
230B
MD5fe4d2639be5bdddf33080d790c7ccdaa
SHA1ba7a7591f627e5cdf1c6547442beda42f1317d40
SHA256114019c5226b338519e9d9c634938e063b3f123abe9e50fe3fa65f6c9d8e6483
SHA512e54f485d26835ed30776e35d9903f47154df7d74b2fb42fbdaf801beb683ec2aabb8b28ee8df2c1d577369503cc7f7e5f4150db2c137a196d0fea7ae347dabf8
-
Filesize
230B
MD51f7dd43eac1ca006230e6f1ff609a2ba
SHA1f1c12d229cfed8ae58f5df4781b6c01435a857f3
SHA256001b8f8b4661621d6f04bfaaaf05f040d3da2118eeb8d8de1fb2be4e5f1dbfd0
SHA51278d80a6866d3235e9224f220cc39bb8234727112443fe03b0207765c3efe6c17efbf9afe986a01fc43abcdb128ae00c4d7491218d5da74e2a5ff241209670013
-
Filesize
230B
MD569a01a4b2f899fcc330514bae88cc2cf
SHA16806db52e39dc91b2a64a67564d3f982ec6e228f
SHA256023c6f9c21e02786e6903ba89f0233e64dced85c18389b94d823a1f2b41a4390
SHA512f451d82bfa01b376e909f019210a47ba6f522c9eada161e0bbe15dc26aac083b8e98eb31fa559007601563fb717d4b62d521fba7fcd11dcd28052cb0efc37bb4
-
Filesize
230B
MD5f5f51817d0124e35217c48d82b53be63
SHA14de654be5be35ad9392857eb47464ca5f9e5334b
SHA256216b5b02ff8593489ffe0127ba1954d24b34ddf894e171eadd1c3a7640e84642
SHA5129a8bdb3255c581f9d19aa0dc4c3117557dc6a424103e87fa20d80bb5609da213e555eea9baef0bed2cd68cc5dce3032f842193a4d773a3658eb0334762f0a777
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
230B
MD5007d6e4aa5ddf43bd2819927991bcb2d
SHA16d0c26d59ca69de4234a4e02ef144425d6553486
SHA2567eb127cecbe57ecacb973b207d1820abb3ea0e54561f5993165b226ce59cd96f
SHA5128e497c25af7e27cc06fc50de53e67db764075c41503042d501d167751b9d720206a71beee0d08f3b613e46010b638a3191bdff814686ace8ef428e02d064b194
-
Filesize
230B
MD5f78f6deccbf82b29aa4d00321d737e6d
SHA1352cb32bed2d2c559a6db0036980259b467c8b92
SHA2567e5825493c2e4bf74e71db7598b05949db783e38a2be71ab4c4c6a1e9026cb26
SHA5121a221f08d89aad06e4c72cc6a0b180d8e038c6dd633899e0c8c9c1e7b0561e7cfb659a9afa07b43d14b37485ca20c7dc7464e1d9da2b6294f8ec09c97905cc6e
-
Filesize
230B
MD5345fb43e157d292a1545f0870930680c
SHA179b9552617da5aea0605ca35f9570963ab6651f2
SHA256f8a772c9a75bfb339cea27ca6df47dba46bc82b297ad902d23068c451078f374
SHA51200c4312a5bd60bc8b37450f76ee75b3081f83d95c1fffaa3f18670d7056809622a903c9ee8d31a6ca06409c2aaf5f596dd7658d4b0494ebd502d2da860d893af
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230B
MD5da53470396e27891a4fac797e08654d6
SHA15590f190f63ae2762433d11e3de11fb1dbe6fd8a
SHA256009a310f222715e51af81bedefdf15fbbdc362d528cb4043a6c175bb2451746c
SHA512639fa83a3094cf6876739de14eb142feaaddd0147beef15d3bc8025fbf19d72eb24071d4137dbd1072daf87797c603b8977ca1131bdebbe92224173cc495351a
-
Filesize
230B
MD54a26e26d8a0e37dab3620db8be1f164b
SHA11762785c3aca842f40e58bad97b327e41fca4bcb
SHA256cfc320b1ba3990597b01dd90e7be748b85901d3c6bf8c7cb61c6577480ac257e
SHA512f50f688674ac03e6f85d352f72cc0cf8ba4114c05e8a1e25ff4f901103397fb83181f20f418a382bb1695201f27275aa9618882b88cd48ce5d49dc2e1d31a98a
-
Filesize
199B
MD50fa0479de9acc566d5a600113bf59aa2
SHA15f3811f8f8e8b324eb6fa9856efe736a3e96c8b1
SHA256f311bb2043e00e4dc8591536fa8dc598c9fe52536d3f8a252974a11a2388a6ca
SHA512a2cfeaac5f29b35b472f2ed7d96af99191fc419780c8fcab0cf26f53f19125cc3dee71f63e7cfdcaeabc4740619f387c9c52d980a2709931ef8c14500f47413e
-
Filesize
230B
MD534657eeb21bc9b5eaa214f778526186e
SHA1478027468aee6feb8b2eea9c9939659ff9d6a28b
SHA25698506072599fade396c33f983d7372f9746825bdff77c12bb595e7ed7e57c7d9
SHA512820925d8b201b4cc8bea11a3782849e26c7841b664061d6acf15781a3b7326100e5354ecb17fb57ea66d16bb708a34eccbedcf2f1c95b74f9f2083467f77a513
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d7a0d7a59470e2d69e104593dd0385a8
SHA129c6e473df326a0d2d614235e0419774e6187940
SHA25629483bef9311d8287026d53f30061df47b9a920b88ff1fa32b7fbbeee74f5ab9
SHA512da91dca123e0233b83f7f6eef6f255b5ff818bda109c61424d37f238d5e2ee9787f416bdc4810495158d322fb19fecb27da777328a13e4e8f14fa0c243c44bfe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5dff6aaad5915457f9a19562835f8775d
SHA13d97046bcf2463dda01a2ef9612017c767fc5c8c
SHA25635a860d58f2ef3b688d3134760e5b84b948d82af7d28b95ef9665c2d917de05b
SHA512e3e4e1d520ae44619fb60f38176a4211699927bdaf0d03f856c9208df3d2b0f25e42bab6b648e426243a54cd467177baf3175e915e4b80be9006568b7d72f083
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478