Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 11:28
Behavioral task
behavioral1
Sample
JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe
-
Size
1.3MB
-
MD5
6ec2727b807d0c0f58e7f0ce4d54101b
-
SHA1
e491ef6344d448c2d0ee8e71918695f0c8a3be2c
-
SHA256
c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270
-
SHA512
81bdf5d8356caf3a68473411bd16d7a5252f5b63e86bb6aebc7186a556a40b0e6617639a81fb3df58e77bdef13a9274d76ca73b16e27bcdc6269456723a1b04c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3108 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3584 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3976 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3544 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3952 4772 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 4772 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x0007000000023c77-10.dat dcrat behavioral2/memory/2644-13-0x0000000000BA0000-0x0000000000CB0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3244 powershell.exe 1612 powershell.exe 916 powershell.exe 4928 powershell.exe 1956 powershell.exe 3128 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe -
Executes dropped EXE 13 IoCs
pid Process 2644 DllCommonsvc.exe 2968 dwm.exe 3764 dwm.exe 1500 dwm.exe 1956 dwm.exe 1704 dwm.exe 3252 dwm.exe 2164 dwm.exe 4952 dwm.exe 4576 dwm.exe 2900 dwm.exe 644 dwm.exe 1308 dwm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 49 raw.githubusercontent.com 15 raw.githubusercontent.com 22 raw.githubusercontent.com 35 raw.githubusercontent.com 36 raw.githubusercontent.com 42 raw.githubusercontent.com 48 raw.githubusercontent.com 14 raw.githubusercontent.com 37 raw.githubusercontent.com 41 raw.githubusercontent.com 50 raw.githubusercontent.com 51 raw.githubusercontent.com 52 raw.githubusercontent.com -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\22eafd247d37c3 DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\OfficeClickToRun.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\OfficeClickToRun.exe DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\e6c9b481da804f DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\TextInputHost.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dwm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5064 schtasks.exe 3952 schtasks.exe 2440 schtasks.exe 3060 schtasks.exe 3140 schtasks.exe 3584 schtasks.exe 4028 schtasks.exe 3544 schtasks.exe 3872 schtasks.exe 4128 schtasks.exe 4692 schtasks.exe 2356 schtasks.exe 3108 schtasks.exe 1864 schtasks.exe 3976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2644 DllCommonsvc.exe 2644 DllCommonsvc.exe 2644 DllCommonsvc.exe 3128 powershell.exe 3244 powershell.exe 1612 powershell.exe 4928 powershell.exe 916 powershell.exe 1612 powershell.exe 3244 powershell.exe 1956 powershell.exe 3128 powershell.exe 4928 powershell.exe 916 powershell.exe 1956 powershell.exe 2968 dwm.exe 3764 dwm.exe 1500 dwm.exe 1956 dwm.exe 1704 dwm.exe 3252 dwm.exe 2164 dwm.exe 4952 dwm.exe 4576 dwm.exe 2900 dwm.exe 644 dwm.exe 1308 dwm.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2644 DllCommonsvc.exe Token: SeDebugPrivilege 3128 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeDebugPrivilege 1956 powershell.exe Token: SeDebugPrivilege 2968 dwm.exe Token: SeDebugPrivilege 3764 dwm.exe Token: SeDebugPrivilege 1500 dwm.exe Token: SeDebugPrivilege 1956 dwm.exe Token: SeDebugPrivilege 1704 dwm.exe Token: SeDebugPrivilege 3252 dwm.exe Token: SeDebugPrivilege 2164 dwm.exe Token: SeDebugPrivilege 4952 dwm.exe Token: SeDebugPrivilege 4576 dwm.exe Token: SeDebugPrivilege 2900 dwm.exe Token: SeDebugPrivilege 644 dwm.exe Token: SeDebugPrivilege 1308 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4592 4644 JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe 83 PID 4644 wrote to memory of 4592 4644 JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe 83 PID 4644 wrote to memory of 4592 4644 JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe 83 PID 4592 wrote to memory of 3020 4592 WScript.exe 85 PID 4592 wrote to memory of 3020 4592 WScript.exe 85 PID 4592 wrote to memory of 3020 4592 WScript.exe 85 PID 3020 wrote to memory of 2644 3020 cmd.exe 87 PID 3020 wrote to memory of 2644 3020 cmd.exe 87 PID 2644 wrote to memory of 1956 2644 DllCommonsvc.exe 105 PID 2644 wrote to memory of 1956 2644 DllCommonsvc.exe 105 PID 2644 wrote to memory of 4928 2644 DllCommonsvc.exe 106 PID 2644 wrote to memory of 4928 2644 DllCommonsvc.exe 106 PID 2644 wrote to memory of 3128 2644 DllCommonsvc.exe 107 PID 2644 wrote to memory of 3128 2644 DllCommonsvc.exe 107 PID 2644 wrote to memory of 3244 2644 DllCommonsvc.exe 108 PID 2644 wrote to memory of 3244 2644 DllCommonsvc.exe 108 PID 2644 wrote to memory of 1612 2644 DllCommonsvc.exe 109 PID 2644 wrote to memory of 1612 2644 DllCommonsvc.exe 109 PID 2644 wrote to memory of 916 2644 DllCommonsvc.exe 110 PID 2644 wrote to memory of 916 2644 DllCommonsvc.exe 110 PID 2644 wrote to memory of 2964 2644 DllCommonsvc.exe 116 PID 2644 wrote to memory of 2964 2644 DllCommonsvc.exe 116 PID 2964 wrote to memory of 2748 2964 cmd.exe 119 PID 2964 wrote to memory of 2748 2964 cmd.exe 119 PID 2964 wrote to memory of 2968 2964 cmd.exe 123 PID 2964 wrote to memory of 2968 2964 cmd.exe 123 PID 2968 wrote to memory of 3544 2968 dwm.exe 130 PID 2968 wrote to memory of 3544 2968 dwm.exe 130 PID 3544 wrote to memory of 3460 3544 cmd.exe 132 PID 3544 wrote to memory of 3460 3544 cmd.exe 132 PID 3544 wrote to memory of 3764 3544 cmd.exe 138 PID 3544 wrote to memory of 3764 3544 cmd.exe 138 PID 3764 wrote to memory of 4948 3764 dwm.exe 140 PID 3764 wrote to memory of 4948 3764 dwm.exe 140 PID 4948 wrote to memory of 4600 4948 cmd.exe 142 PID 4948 wrote to memory of 4600 4948 cmd.exe 142 PID 4948 wrote to memory of 1500 4948 cmd.exe 146 PID 4948 wrote to memory of 1500 4948 cmd.exe 146 PID 1500 wrote to memory of 4084 1500 dwm.exe 149 PID 1500 wrote to memory of 4084 1500 dwm.exe 149 PID 4084 wrote to memory of 5072 4084 cmd.exe 151 PID 4084 wrote to memory of 5072 4084 cmd.exe 151 PID 4084 wrote to memory of 1956 4084 cmd.exe 153 PID 4084 wrote to memory of 1956 4084 cmd.exe 153 PID 1956 wrote to memory of 5040 1956 dwm.exe 155 PID 1956 wrote to memory of 5040 1956 dwm.exe 155 PID 5040 wrote to memory of 3080 5040 cmd.exe 157 PID 5040 wrote to memory of 3080 5040 cmd.exe 157 PID 5040 wrote to memory of 1704 5040 cmd.exe 159 PID 5040 wrote to memory of 1704 5040 cmd.exe 159 PID 1704 wrote to memory of 636 1704 dwm.exe 161 PID 1704 wrote to memory of 636 1704 dwm.exe 161 PID 636 wrote to memory of 2968 636 cmd.exe 163 PID 636 wrote to memory of 2968 636 cmd.exe 163 PID 636 wrote to memory of 3252 636 cmd.exe 165 PID 636 wrote to memory of 3252 636 cmd.exe 165 PID 3252 wrote to memory of 4992 3252 dwm.exe 167 PID 3252 wrote to memory of 4992 3252 dwm.exe 167 PID 4992 wrote to memory of 2564 4992 cmd.exe 169 PID 4992 wrote to memory of 2564 4992 cmd.exe 169 PID 4992 wrote to memory of 2164 4992 cmd.exe 171 PID 4992 wrote to memory of 2164 4992 cmd.exe 171 PID 2164 wrote to memory of 2300 2164 dwm.exe 173 PID 2164 wrote to memory of 2300 2164 dwm.exe 173 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c3b8c0b79475e76cb4b71f779aefacdd1bdb8fe12961b8b2ef1f13276cf63270.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\Framework\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b2Kfd0yOOD.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2748
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YXbxSkVmu9.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:3460
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UQ4uSu8U9J.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:4600
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BmKXfVMxAz.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:5072
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\t6OOvELCCF.bat"13⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:3080
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\00pP7nIBMq.bat"15⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2968
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\daA37ewxym.bat"17⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2564
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gWC6ojzqIZ.bat"19⤵PID:2300
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:532
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tDjG3X7WPV.bat"21⤵PID:2156
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:3244
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\00pP7nIBMq.bat"23⤵PID:4008
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:5056
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RdAvGBYmjZ.bat"25⤵PID:2244
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:4032
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ph8sa6VtQm.bat"27⤵PID:2944
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:4632
-
-
C:\Recovery\WindowsRE\dwm.exe"C:\Recovery\WindowsRE\dwm.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xEvQv3iUx6.bat"29⤵PID:4104
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:230⤵PID:836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\providercommon\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\providercommon\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
194B
MD537a2621dae0a372d001a4bb92e70116a
SHA16556a51ca3927083ceac3e05c3199d7161ff29f2
SHA2565fb3803ef7249ad8b1c2d953cd66741c4f2f859448f80cf78b824936b20f8f48
SHA51265de82d2a3f95e0cea44404a8548467da68b168043d9b4aff081d2ae3d8110e89938f07847b8141f91d39d89473eb926daa8e401017048892118a93e3ad080bc
-
Filesize
194B
MD55ae254999d2afe63bd9fbca786a633eb
SHA198ec766328d6cff7001c511be2ba98cb6955babc
SHA256212e6f0cabe9d47815d26d3999e2ac37804d63f11bdfead1ea608ada9bcaf36b
SHA512ffaeef6a9406ad5a23801d8d73a0953e1550908eb93e0664768fa077d82b7299e7cf338d40c0661f987a613fb74b0bcac7960c528205b2c3d24a7f6d83a11822
-
Filesize
194B
MD515eb9d363efea6caf139a10cf8441a6b
SHA164cb0951ab8437d914b127327d6f5261311d4f0c
SHA25629db3cb89720e6b98310580b172ffe07fc70384475622e224e1ca66ae15632c8
SHA512501b5d59ea1cda108939becb743b0114e57e4e1a6b4fe9e9bc4108bd46dad6631152b3da09c79e280f8aa637ce8a03f4089fa68b5cbad716a196bfce48383bbb
-
Filesize
194B
MD57454392011c871dd20f39bd46160405e
SHA1055550daae0bfd42ee753a1a69d36cf12f74dd9f
SHA256c595f6d3b33a1e3d9ce9700d194bc4915ce317fe1e5f72d473652342238b20f9
SHA512b6e2f8d11f6d3f7d33689fb85f6d4f98e7d2afc614590afb5a4a6f8c4b56508792c3a971d196d131ffb686b2b21ac9cf5d93a2a805d17701a2adee0d964f50ac
-
Filesize
194B
MD51749082b5c426d7ac1d0a47713b11f81
SHA103a0ade44fa7ccadf8b3ca883ba5df7175f6d27b
SHA2564469ba34dda1b951cb610b59c0e6b044a9bd2d81995c6d166bdd7a0c3c32582d
SHA51216c6051ec3da7ec0691a942ec9e876d7da186ffefd87d3575ab3032659b9c5e04cca71a7de165b712b7999318d2a3d2f8fa155da10d2ef6b3e427b88ad82f616
-
Filesize
194B
MD5f95a1083e3e638884f4d0963c7bc6a96
SHA1e41d075992fcf55768f9df82876c49d4778c436e
SHA25623f863a97c090d29b854ac1e01874c6fbd6545a2ffef2d3e6c2a9380a76ead4d
SHA512bd63fd719bde468fb24a678e653953c77b4c664f8c10c17f45c5ad5735f269004e51a294aede8920b117e6e7acfd65b2e1441dad9075ef7a68de876c935d2c8d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
194B
MD5d2ea76d871c4c7fcb29ad70a6c80ee95
SHA10ee484f11e50fc31ac27a1cce6347ca8a6fca8b6
SHA256964164258ecb153db0ef6418ce3f569a1490c68bb5e2cb7f2dcb26dae22e34fb
SHA51213722f651e87158977bef8c40371ef6a6ddc045d8acff881e65230d362667c5e630c673a89c4ef2d8e2abe856ee0f73f761493406ec42185805a2455763c5cac
-
Filesize
194B
MD57f021ef5339e9808ffea719a8c900ccf
SHA1c0fe77c1d77980ef7c02a84282c42e4423c125b7
SHA256bee7173bb714453db309a74be01dcf8ce2bd2d58130628e54027c0873171a4f6
SHA5122829c4578264ff6e112cd34726f1555966eda1ce1b6072d9211aaa6559f1854c7ece0b40a9a6bbe6d9fce6a1d14af561938a6f42f33ac4139947c5aa9c7e70ac
-
Filesize
194B
MD5e3f0ff3efaf57ac0a0063d622508038a
SHA16c00f57c0ba0da9a73294c07ccc6a97409533ff1
SHA256cbe6533dc3751a54658b7b9fc49e5c968b1843ce1703411ec9b7cd45937cdb5a
SHA5122679378b06bbfdd779c25adbc86fc8830cacd5b15ddf0a9f115cfcba776661c94d26fb4ba11f5d6b7c7057107e606247a62e7ebeb80dc9219cd1e68d41e933e1
-
Filesize
194B
MD5113fa9085450385af0f093008931bd33
SHA164903e9083aff989d697d71199204226bac850af
SHA256da1759d60ebd6eb3ba700172209d8d7b78f9c96fcca6ca65439a41c1d2f32561
SHA512f10301954f5ce1caa8b4a1625900fad909727112e31389e8ff03fd4ce349fe259ff0a879193c323a3186af1d9464e324df21ed223823e2e2bef317fbc5faa198
-
Filesize
194B
MD578490d0ca4fd7a9cba69d6e868209008
SHA18213b79f68481fa606286c3dd7b06bbce3390924
SHA256b349f46619ded45c5ffcacece1af31220df609d34f0c401aec6021ccd2e3096c
SHA5122cfcf02bfa283d76041c110823d1c8c8cb6619dd262c0c71b251e887a9965bf8642e27d94ad9a231669a92fee593b0c319031440b6abc7f2e1e91f6ad1537e69
-
Filesize
194B
MD58951f34b32fdd5b9cc14c370f0811f5f
SHA134d9fb1df6123d5c6259e2876cf350e6e193f41f
SHA256cb9397188c70cd6fb0774fdd2178caf79c7c324321626bb780ac38f1c050f961
SHA5123e4a1bd33b166a27fd7ce81cfaabe663c433fe0f99f2e8f4ec8cc8af57cbae134a04862256d73f3a899ee9b3b39007cc4fc2362644c1f4b640ccd7acfdcb028a
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478