Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 10:17

General

  • Target

    JaffaCakes118_13d78f0d2f1a837b6755ffc07b22d86e436c47393eed08329fccb22b8879907b.exe

  • Size

    1.3MB

  • MD5

    ae270c5dd0975f854d99f4e3e790e6d5

  • SHA1

    7d342c871726622b651007878bbe0afe5f899555

  • SHA256

    13d78f0d2f1a837b6755ffc07b22d86e436c47393eed08329fccb22b8879907b

  • SHA512

    7e8b0a5738d8adc0380f203273c35c21415b29571d1fd14a59bda64ec1efef183def89720bdd7ee1190d7850f94d8b7bd88799d5c69a0605139b1fb765780a8d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_13d78f0d2f1a837b6755ffc07b22d86e436c47393eed08329fccb22b8879907b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_13d78f0d2f1a837b6755ffc07b22d86e436c47393eed08329fccb22b8879907b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2808
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:680
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Videos\Sample Videos\dwm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1680
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Fonts\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:952
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dwm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1340
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\es-ES\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:632
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\dwm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2536
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1672
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\audiodg.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1476
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2444
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:900
          • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
            "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1744
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\be8zRZs4e0.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1388
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:1392
                • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                  "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1052
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\a1lJXnITmE.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2076
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:2080
                      • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                        "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:612
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3B2OAH3dio.bat"
                          10⤵
                            PID:2956
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              11⤵
                                PID:952
                              • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                11⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2196
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GQn77QEoUi.bat"
                                  12⤵
                                    PID:1364
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      13⤵
                                        PID:2344
                                      • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                        "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                        13⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1736
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DegeIw2hse.bat"
                                          14⤵
                                            PID:2108
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              15⤵
                                                PID:1676
                                              • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                                "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                                15⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3068
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EzDSmeWZ76.bat"
                                                  16⤵
                                                    PID:2764
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      17⤵
                                                        PID:1516
                                                      • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                                        "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                                        17⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2312
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hlHmrlOhE6.bat"
                                                          18⤵
                                                            PID:2140
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              19⤵
                                                                PID:568
                                                              • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                                                "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                                                19⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2552
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4Tm0GxqeGU.bat"
                                                                  20⤵
                                                                    PID:2720
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      21⤵
                                                                        PID:2732
                                                                      • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                                                        "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                                                        21⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2760
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6qhkY4Aj1y.bat"
                                                                          22⤵
                                                                            PID:1540
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              23⤵
                                                                                PID:1340
                                                                              • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                                                                "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                                                                23⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2112
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ph8sa6VtQm.bat"
                                                                                  24⤵
                                                                                    PID:792
                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      25⤵
                                                                                        PID:2852
                                                                                      • C:\Program Files\Windows Sidebar\es-ES\Idle.exe
                                                                                        "C:\Program Files\Windows Sidebar\es-ES\Idle.exe"
                                                                                        25⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:536
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ph8sa6VtQm.bat"
                                                                                          26⤵
                                                                                            PID:2404
                                                                                            • C:\Windows\system32\w32tm.exe
                                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                              27⤵
                                                                                                PID:2700
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Videos\Sample Videos\dwm.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1840
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Videos\Sample Videos\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:820
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Videos\Sample Videos\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2968
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\Fonts\wininit.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2224
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Fonts\wininit.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2424
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Windows\Fonts\wininit.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2112
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\providercommon\dwm.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2528
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3044
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1096
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Sidebar\es-ES\Idle.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2972
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\es-ES\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2756
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\es-ES\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3012
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\providercommon\Idle.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2924
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2816
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1312
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\dwm.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1988
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2860
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\dwm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1784
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\providercommon\services.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:568
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2308
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1944
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\audiodg.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2344
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Default User\audiodg.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:332
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\audiodg.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1976
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2176
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2104
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2304
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1196
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1932
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2984

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            638cd0a23f10ea4f7d940d83add31f0e

                                            SHA1

                                            26fd73259d13b306c3b5d81c6475767094e02c99

                                            SHA256

                                            6f4c9f35af65d8dfbe15c6c7e29758a23079fbf461bb49c59a734f6b87aa152f

                                            SHA512

                                            63381ac7851fb909315629317cb63df75d4b7ec8353179be6f04a64a0be7a8c505cb1be3a7b37f855e28b569803802f279d297d32877e1e1568733944b9074d1

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            bf81a58940a1593bbfefe35d29a74d57

                                            SHA1

                                            9e358990094ac401fc32cfcf4770bd5d3d6f7b9c

                                            SHA256

                                            24c876d1141c07d230da946d8ca975ef5dcd9896ce08719a67e1fc1e035896e1

                                            SHA512

                                            03e3c68fb41c815699f2d5969ecaa25f11a8ca4a0dce9a0a2942b44eb086c291e0a6f9923b20d33da95ba4b1c7d25b3bfa0c65fff26ae375d449ba7cd9e8664b

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            31af781274533105760d44498348b986

                                            SHA1

                                            be031944f4974fda1ef0eb9341688054153f8b00

                                            SHA256

                                            ed24af1c31c27ece1f63656eceda329eb54c8b4e6db605ca00f9e53f5df2b9e0

                                            SHA512

                                            07501de53595e59c61a8a4f5b94322913718022b524786d8c731a2f3492d8fee76cad81ab9b2837db520871d2bb3bd5f1f5d6b355cb92ad03a8107660036ece2

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            b0845d9e5095a54b3c11f14423015725

                                            SHA1

                                            f48eafea86a1627bf2737372598157b9a4286531

                                            SHA256

                                            15fc9f8dfec2de5f064ce12b7ef25e5f7c13794423186b3e583d46133c3b0af5

                                            SHA512

                                            fe9f1f0304bf1601e086fdd819b949ce9ebb3a42be9b98bcead97baef345fc3355b10f60071dc161d7084eb6993b9944ebade7cfb8358424ffd5b893f13786c2

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            2b9f3047c32d14fd24b608fea9ca1b03

                                            SHA1

                                            aea5a8c85e2d4fef82c13f34eac7daf76f83bd0e

                                            SHA256

                                            ece01d8a013c14ae08d503dab1b385fa691c45f6cbfb4959041eaf429ff2a319

                                            SHA512

                                            df8ed578d5306166df7ebb97939dbb474aa249c2b12d9c2c3e701986ec7a151c65abf95c064d4e0286ef535b7697733f4af978c3bcb03b9851480f739f5949ea

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            40623188ed67978ac9f0459b014b8bb4

                                            SHA1

                                            34d2d7b8905e6d129412e8d1ddfb91f7fb6ee7c7

                                            SHA256

                                            178d222b59f5b483077c156aec4ec2af96b3473588d8e737a85499753f1f12c5

                                            SHA512

                                            80c39e23ce40b9c8cc59bb142e45c22ac231a1ed5da0c5f779ecf6efbc7558a360127cc311fda440b30787a33609a8eb75cdff1c9b990b19fc29628e20b5b028

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            2762ead6f9e1b8030e7e784a73f74f79

                                            SHA1

                                            2ebd66d58a8f3942017a0c798bf888f47677e754

                                            SHA256

                                            dd19d1a1fb8db7bc1823986bcdf9d02620f5fa847648c605fa8d0ab8393ebc5d

                                            SHA512

                                            645fbfd29158190944d340b0aa8af061f2ae29dcfef450c0612e4d4962bdd6d67c9dc76942bf18e1f8f5a81079fabf9234798be014b853190aea191938c9f366

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            d0eb3744cabbecdc90812488bf48c1b4

                                            SHA1

                                            3eddcaf2cdf91fcc8aceead2804469a596b62e25

                                            SHA256

                                            768ab67d7b6df03d82c121d2df74837e5cb40dd03eecff54974e48522cfca1d5

                                            SHA512

                                            784e81d332753b823ad32043705706d23af4ea9d0af600bd5d8116c6688bf4700200e32d6465ed253ac30e7ccc7dc6b19af9dd5631b6981e963b6a7a17d5aff1

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            d25a965a9beeacbed06aead1f51e2a06

                                            SHA1

                                            12b276625b2c98587084eae124e6a8b76b9b75af

                                            SHA256

                                            92cb58a7ff9af20c183454ee702589a8668e31b64d600f6cf45acfb5bbf5b35e

                                            SHA512

                                            f4443047e0f340ef57921c2ca9b6fe6ee6ca1f865afc62e6f15552fdea69cdb906c0401549f6005034029f686194094530959af1f3a4a6d1860e0946dd48495c

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            96c1fa20657823069fe10786e5478bdf

                                            SHA1

                                            cc08e77be49031f80fca4441668a62131510091a

                                            SHA256

                                            6e1663fe80fe9f21352c6de6e3f50648860552f8bc41c6a9cd4bc897d011332d

                                            SHA512

                                            ea9d1303234638f3944b5af6791e1c49a412059c418f4cad636c8311b2b557cad11a5ecb53c80eda3d2d72ac0b9bbfcc3c7b3f69da129a30e15bd0cb5ba4f977

                                          • C:\Users\Admin\AppData\Local\Temp\3B2OAH3dio.bat

                                            Filesize

                                            212B

                                            MD5

                                            319d6e7d0a0971083e711b1b73103bca

                                            SHA1

                                            7129710b5724eef23c31cdcaebf3ed428c195d11

                                            SHA256

                                            7ab1de61562511666b9f1d4e7cfb8da47cce9f7522fc6322a457e2c1be2cdbb5

                                            SHA512

                                            26cc6095fa1f4b15240050ae5632d9d58019476c90a75b6b77b8f27ef308b018d6dd9c4bc7cebc5f043ec11cabef5d496703dffadb4f7004462676a6ecf6b8ca

                                          • C:\Users\Admin\AppData\Local\Temp\4Tm0GxqeGU.bat

                                            Filesize

                                            212B

                                            MD5

                                            734919d1e301fbb8ea8163fc61ab5362

                                            SHA1

                                            25d2f3f887b4ab982e630b40fd385e916bc6ec3c

                                            SHA256

                                            3af337fe60b05d65f8da016298040c4c35a246f47822175f71d6a28986811ae7

                                            SHA512

                                            41a6345fcb9b75d7e64f725fb7fd1f81783947345cd79b280ac60f8136d414432fcbdf22ada945f9ad35a0466c870f702f35078b12198d13da0b918e58e5b3f4

                                          • C:\Users\Admin\AppData\Local\Temp\6qhkY4Aj1y.bat

                                            Filesize

                                            212B

                                            MD5

                                            5810271a7fe88245b0c17c03c97e64ae

                                            SHA1

                                            80f9f500e0d4c64d986f32707a60bc3b1bb384cc

                                            SHA256

                                            fd9f2d39e09c956d890871ae0bbdccc9d574b9ae0f755b724aaf25b81c36fb36

                                            SHA512

                                            5d5d11c84d43ade0a1575cace1ff77c56e45e2ac632f1df0fbedbe71af605627a59e095e834c8e2e1e61ebb8e3d67bbb93566e97989e854fd3730c7a4c086ad9

                                          • C:\Users\Admin\AppData\Local\Temp\Cab3140.tmp

                                            Filesize

                                            70KB

                                            MD5

                                            49aebf8cbd62d92ac215b2923fb1b9f5

                                            SHA1

                                            1723be06719828dda65ad804298d0431f6aff976

                                            SHA256

                                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                            SHA512

                                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                          • C:\Users\Admin\AppData\Local\Temp\DegeIw2hse.bat

                                            Filesize

                                            212B

                                            MD5

                                            bc005d12067c6086a06b9205b66039cf

                                            SHA1

                                            92f10f90962aaf0016a0bff243d70b014f59e6ec

                                            SHA256

                                            b509cedc2ef8fb18dcdbaab2167a3e7e6762cc13c1879e8437f1a0af351c693a

                                            SHA512

                                            ab981a6a638284018dcfacaacf8cf61e371431b4e8776af0245362150b2ce9d069d7e534d484b7b287651fa76c3aa46c19303640aad1eca4e0867504f07c6a3b

                                          • C:\Users\Admin\AppData\Local\Temp\EzDSmeWZ76.bat

                                            Filesize

                                            212B

                                            MD5

                                            79973a38d8ea1b782e33646a0057c569

                                            SHA1

                                            db0dabe93c75a134e5d1474e8e83d50a7c40ae53

                                            SHA256

                                            5c0a086942f3aeded3b9b7c346a723d4126c716b3170abbc01e88fda5a3548bf

                                            SHA512

                                            8f244339d8ad7206e1666f747b0b3331071fda6314c18643d81e7cf0eb91fc13b1d4445837dea028dc2f324b12e6db241949252a656394462979730e06b066e4

                                          • C:\Users\Admin\AppData\Local\Temp\GQn77QEoUi.bat

                                            Filesize

                                            212B

                                            MD5

                                            a9f4f8c37b8fa5561355215af3d1da8e

                                            SHA1

                                            84109252baca97599f177a697e76c7e308f50d0b

                                            SHA256

                                            ffa939797ff655c8685e8eb9e97890780842969530017cd9084501c37276d69f

                                            SHA512

                                            8e79702eeb2602e1e0d8a7df953dd294bf3b862c429b47409aec9b8ab9d1792fd5214199398b9e7154078d6036ed0d2cdc3256668dc9c00d3dc33468264af31c

                                          • C:\Users\Admin\AppData\Local\Temp\Ph8sa6VtQm.bat

                                            Filesize

                                            212B

                                            MD5

                                            75cc628e8edc2b71263390d40adbde88

                                            SHA1

                                            bb3319a52aea307d5a4cdefbaafdbd9fbdd22f6c

                                            SHA256

                                            6bc3e71c58ec34fc976dabe2e9b90df7918f4e6d030a38bec55acb5ef09734cb

                                            SHA512

                                            7670c66c48fe1005e2fa41e56f42966edae65de024a3262d048b0487ae1f2d09a273cae1728b4d459cf3b65312d4db31294232d136e8b58a3d4cc96c856d6cf9

                                          • C:\Users\Admin\AppData\Local\Temp\Tar3143.tmp

                                            Filesize

                                            181KB

                                            MD5

                                            4ea6026cf93ec6338144661bf1202cd1

                                            SHA1

                                            a1dec9044f750ad887935a01430bf49322fbdcb7

                                            SHA256

                                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                            SHA512

                                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                          • C:\Users\Admin\AppData\Local\Temp\a1lJXnITmE.bat

                                            Filesize

                                            212B

                                            MD5

                                            9bb5af938f3d691d9083ed341d1e4669

                                            SHA1

                                            733ca856f3dcef71432bbc34ca4da2480840d03c

                                            SHA256

                                            72acc7ef10b85b8343d10a9ccba7a6ea7fc22125adbefa85fec8fb2748725f58

                                            SHA512

                                            35bf2a77d60843064220e72f2e0b05e396aac74ad210d5289986ae67287d9696d02251d97c824aef138d143d01d849ca8232fe22a363e0aa3986de46ce4a3cbb

                                          • C:\Users\Admin\AppData\Local\Temp\be8zRZs4e0.bat

                                            Filesize

                                            212B

                                            MD5

                                            327385c24216ccd10df298cd29c08131

                                            SHA1

                                            9504e9ab5744cb995a39b715abc25195dee4179b

                                            SHA256

                                            a88128b486bf8f86d08509b61d23a44cabe1d7eda4f5eae5e1cba163f8c654d6

                                            SHA512

                                            e88fe999121c4683f380a36d789201525b8396df566f40e11f2b5188c4059f7d5539468b56456ea898f60e873a012db3e9380330026ca78ea48b9ee626cd8f3d

                                          • C:\Users\Admin\AppData\Local\Temp\hlHmrlOhE6.bat

                                            Filesize

                                            212B

                                            MD5

                                            994745572ad1057a2e2a1570a3737908

                                            SHA1

                                            fa95f1e108140e42fd49a260a9f2bfcc1bba046b

                                            SHA256

                                            f75612c6f12339e4c7b7edb76a6281cae1bc2c02ddf08a7b9c0744bcf467c8b7

                                            SHA512

                                            cebb033dbdb788114e519e34c8e4a757993aa487411ccbcaa7a0c64fb06c1de51f30694e88cd743f83744de7efd9365ad0865b86e1e509b5c83621a22be6639d

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                            Filesize

                                            7KB

                                            MD5

                                            87d6d6dd1e601bba628e15f27d9675be

                                            SHA1

                                            677f548f1c039731d2bb3012dae2391419cef4ec

                                            SHA256

                                            16e8d40e4a128b33ed97c1e971f18f20e21158b44f1af19e870bcce01040d203

                                            SHA512

                                            0ef1c92bfea51c24167d66158f407f8be9df798ef5d71ee04b9807800de516dda530d972bd8e2c88d269665c1c4ae4c0d838061f17d412db151630a3ef4834a6

                                          • C:\providercommon\1zu9dW.bat

                                            Filesize

                                            36B

                                            MD5

                                            6783c3ee07c7d151ceac57f1f9c8bed7

                                            SHA1

                                            17468f98f95bf504cc1f83c49e49a78526b3ea03

                                            SHA256

                                            8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                            SHA512

                                            c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                          • C:\providercommon\DllCommonsvc.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            bd31e94b4143c4ce49c17d3af46bcad0

                                            SHA1

                                            f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                            SHA256

                                            b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                            SHA512

                                            f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                          • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                            Filesize

                                            197B

                                            MD5

                                            8088241160261560a02c84025d107592

                                            SHA1

                                            083121f7027557570994c9fc211df61730455bb5

                                            SHA256

                                            2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                            SHA512

                                            20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                          • memory/680-71-0x000000001B740000-0x000000001BA22000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/1476-72-0x0000000001F00000-0x0000000001F08000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/1736-334-0x0000000000FE0000-0x00000000010F0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1744-44-0x0000000000CE0000-0x0000000000DF0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2196-274-0x0000000000D70000-0x0000000000E80000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2312-454-0x0000000001270000-0x0000000001380000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2808-17-0x0000000000410000-0x000000000041C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2808-16-0x00000000001E0000-0x00000000001EC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2808-15-0x00000000001F0000-0x00000000001FC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2808-14-0x00000000001D0000-0x00000000001E2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2808-13-0x0000000001190000-0x00000000012A0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/3068-394-0x0000000000FF0000-0x0000000001100000-memory.dmp

                                            Filesize

                                            1.1MB