Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 12:26
Behavioral task
behavioral1
Sample
JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe
-
Size
1.3MB
-
MD5
bdcb8c1d9376c5c0917adce0944d42b6
-
SHA1
c84eb2c0748a5fbb39180da64219c68b1736199e
-
SHA256
8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e
-
SHA512
33d49f0909ef278c73540e3559cebf196d94b1adbaccabaa9eb54ec8337aa5d8e982c298fb29f2a0727859a27a07d843f705cdb8e9838e47630364556eb41f6e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1348 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 660 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3864 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 472 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3480 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3572 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4072 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4960 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 504 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4820 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3964 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 868 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3176 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3452 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3088 4840 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3856 4840 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000a000000023b92-10.dat dcrat behavioral2/memory/2304-13-0x0000000000AA0000-0x0000000000BB0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4952 powershell.exe 3552 powershell.exe 1704 powershell.exe 2796 powershell.exe 4468 powershell.exe 1636 powershell.exe 1264 powershell.exe 2608 powershell.exe 2580 powershell.exe 2448 powershell.exe 2204 powershell.exe 3956 powershell.exe 2328 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe -
Executes dropped EXE 13 IoCs
pid Process 2304 DllCommonsvc.exe 872 spoolsv.exe 2728 spoolsv.exe 1056 spoolsv.exe 2440 spoolsv.exe 5024 spoolsv.exe 3052 spoolsv.exe 4548 spoolsv.exe 2852 spoolsv.exe 3296 spoolsv.exe 4668 spoolsv.exe 4896 spoolsv.exe 2264 spoolsv.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 47 raw.githubusercontent.com 57 raw.githubusercontent.com 59 raw.githubusercontent.com 19 raw.githubusercontent.com 42 raw.githubusercontent.com 41 raw.githubusercontent.com 45 raw.githubusercontent.com 51 raw.githubusercontent.com 55 raw.githubusercontent.com 56 raw.githubusercontent.com 58 raw.githubusercontent.com 18 raw.githubusercontent.com 39 raw.githubusercontent.com -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Mail\csrss.exe DllCommonsvc.exe File created C:\Program Files\Windows Mail\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files\MSBuild\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\MSBuild\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files\Windows Security\taskhostw.exe DllCommonsvc.exe File created C:\Program Files\Windows Security\ea9f0e6c9e2dcd DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\e6c9b481da804f DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2576 schtasks.exe 2108 schtasks.exe 3856 schtasks.exe 2260 schtasks.exe 868 schtasks.exe 404 schtasks.exe 1996 schtasks.exe 936 schtasks.exe 4844 schtasks.exe 3176 schtasks.exe 2560 schtasks.exe 1584 schtasks.exe 4716 schtasks.exe 3020 schtasks.exe 1220 schtasks.exe 3088 schtasks.exe 3480 schtasks.exe 4072 schtasks.exe 504 schtasks.exe 3572 schtasks.exe 3452 schtasks.exe 4960 schtasks.exe 1076 schtasks.exe 3864 schtasks.exe 2892 schtasks.exe 3140 schtasks.exe 872 schtasks.exe 3964 schtasks.exe 4428 schtasks.exe 1348 schtasks.exe 4424 schtasks.exe 472 schtasks.exe 4820 schtasks.exe 660 schtasks.exe 4880 schtasks.exe 4236 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 2304 DllCommonsvc.exe 3552 powershell.exe 3552 powershell.exe 3956 powershell.exe 3956 powershell.exe 1636 powershell.exe 1636 powershell.exe 2580 powershell.exe 2580 powershell.exe 4952 powershell.exe 4952 powershell.exe 2608 powershell.exe 2608 powershell.exe 4468 powershell.exe 4468 powershell.exe 2204 powershell.exe 2328 powershell.exe 2328 powershell.exe 2204 powershell.exe 2796 powershell.exe 2796 powershell.exe 1704 powershell.exe 1704 powershell.exe 1264 powershell.exe 1264 powershell.exe 2448 powershell.exe 2448 powershell.exe 4468 powershell.exe 1636 powershell.exe 3552 powershell.exe 2580 powershell.exe 3956 powershell.exe 2608 powershell.exe 2328 powershell.exe 2204 powershell.exe 1704 powershell.exe 4952 powershell.exe 2796 powershell.exe 1264 powershell.exe 2448 powershell.exe 872 spoolsv.exe 2728 spoolsv.exe 1056 spoolsv.exe 2440 spoolsv.exe 5024 spoolsv.exe 3052 spoolsv.exe 4548 spoolsv.exe 2852 spoolsv.exe 3296 spoolsv.exe 4668 spoolsv.exe 4896 spoolsv.exe 2264 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 2304 DllCommonsvc.exe Token: SeDebugPrivilege 3552 powershell.exe Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 2328 powershell.exe Token: SeDebugPrivilege 2796 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 1264 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 872 spoolsv.exe Token: SeDebugPrivilege 2728 spoolsv.exe Token: SeDebugPrivilege 1056 spoolsv.exe Token: SeDebugPrivilege 2440 spoolsv.exe Token: SeDebugPrivilege 5024 spoolsv.exe Token: SeDebugPrivilege 3052 spoolsv.exe Token: SeDebugPrivilege 4548 spoolsv.exe Token: SeDebugPrivilege 2852 spoolsv.exe Token: SeDebugPrivilege 3296 spoolsv.exe Token: SeDebugPrivilege 4668 spoolsv.exe Token: SeDebugPrivilege 4896 spoolsv.exe Token: SeDebugPrivilege 2264 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 64 3712 JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe 84 PID 3712 wrote to memory of 64 3712 JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe 84 PID 3712 wrote to memory of 64 3712 JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe 84 PID 64 wrote to memory of 760 64 WScript.exe 85 PID 64 wrote to memory of 760 64 WScript.exe 85 PID 64 wrote to memory of 760 64 WScript.exe 85 PID 760 wrote to memory of 2304 760 cmd.exe 87 PID 760 wrote to memory of 2304 760 cmd.exe 87 PID 2304 wrote to memory of 2448 2304 DllCommonsvc.exe 125 PID 2304 wrote to memory of 2448 2304 DllCommonsvc.exe 125 PID 2304 wrote to memory of 2204 2304 DllCommonsvc.exe 126 PID 2304 wrote to memory of 2204 2304 DllCommonsvc.exe 126 PID 2304 wrote to memory of 3552 2304 DllCommonsvc.exe 127 PID 2304 wrote to memory of 3552 2304 DllCommonsvc.exe 127 PID 2304 wrote to memory of 1704 2304 DllCommonsvc.exe 128 PID 2304 wrote to memory of 1704 2304 DllCommonsvc.exe 128 PID 2304 wrote to memory of 2796 2304 DllCommonsvc.exe 129 PID 2304 wrote to memory of 2796 2304 DllCommonsvc.exe 129 PID 2304 wrote to memory of 3956 2304 DllCommonsvc.exe 130 PID 2304 wrote to memory of 3956 2304 DllCommonsvc.exe 130 PID 2304 wrote to memory of 2328 2304 DllCommonsvc.exe 131 PID 2304 wrote to memory of 2328 2304 DllCommonsvc.exe 131 PID 2304 wrote to memory of 1636 2304 DllCommonsvc.exe 132 PID 2304 wrote to memory of 1636 2304 DllCommonsvc.exe 132 PID 2304 wrote to memory of 1264 2304 DllCommonsvc.exe 133 PID 2304 wrote to memory of 1264 2304 DllCommonsvc.exe 133 PID 2304 wrote to memory of 4468 2304 DllCommonsvc.exe 134 PID 2304 wrote to memory of 4468 2304 DllCommonsvc.exe 134 PID 2304 wrote to memory of 4952 2304 DllCommonsvc.exe 135 PID 2304 wrote to memory of 4952 2304 DllCommonsvc.exe 135 PID 2304 wrote to memory of 2608 2304 DllCommonsvc.exe 136 PID 2304 wrote to memory of 2608 2304 DllCommonsvc.exe 136 PID 2304 wrote to memory of 2580 2304 DllCommonsvc.exe 137 PID 2304 wrote to memory of 2580 2304 DllCommonsvc.exe 137 PID 2304 wrote to memory of 4308 2304 DllCommonsvc.exe 150 PID 2304 wrote to memory of 4308 2304 DllCommonsvc.exe 150 PID 4308 wrote to memory of 2776 4308 cmd.exe 153 PID 4308 wrote to memory of 2776 4308 cmd.exe 153 PID 4308 wrote to memory of 872 4308 cmd.exe 154 PID 4308 wrote to memory of 872 4308 cmd.exe 154 PID 872 wrote to memory of 2072 872 spoolsv.exe 159 PID 872 wrote to memory of 2072 872 spoolsv.exe 159 PID 2072 wrote to memory of 1932 2072 cmd.exe 161 PID 2072 wrote to memory of 1932 2072 cmd.exe 161 PID 2072 wrote to memory of 2728 2072 cmd.exe 164 PID 2072 wrote to memory of 2728 2072 cmd.exe 164 PID 2728 wrote to memory of 2204 2728 spoolsv.exe 167 PID 2728 wrote to memory of 2204 2728 spoolsv.exe 167 PID 2204 wrote to memory of 3296 2204 cmd.exe 169 PID 2204 wrote to memory of 3296 2204 cmd.exe 169 PID 2204 wrote to memory of 1056 2204 cmd.exe 170 PID 2204 wrote to memory of 1056 2204 cmd.exe 170 PID 1056 wrote to memory of 736 1056 spoolsv.exe 171 PID 1056 wrote to memory of 736 1056 spoolsv.exe 171 PID 736 wrote to memory of 3288 736 cmd.exe 173 PID 736 wrote to memory of 3288 736 cmd.exe 173 PID 736 wrote to memory of 2440 736 cmd.exe 174 PID 736 wrote to memory of 2440 736 cmd.exe 174 PID 2440 wrote to memory of 4396 2440 spoolsv.exe 175 PID 2440 wrote to memory of 4396 2440 spoolsv.exe 175 PID 4396 wrote to memory of 4108 4396 cmd.exe 177 PID 4396 wrote to memory of 4108 4396 cmd.exe 177 PID 4396 wrote to memory of 5024 4396 cmd.exe 178 PID 4396 wrote to memory of 5024 4396 cmd.exe 178 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e9ee8f260cc7d98f9dc98ddd0d0d58dd698822f09015beecc58aa2fbc1efd7e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\TextInputHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Security\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\regid.1991-06.com.microsoft\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Mail\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Videos\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Microsoft OneDrive\setup\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kRiLYpCcAy.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2776
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gPrDhQDX5J.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1932
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SNhzeWIHcH.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:3296
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\z9xTb8lNHs.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:3288
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x7ZYnkvAkq.bat"13⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:4108
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UQ4uSu8U9J.bat"15⤵PID:4844
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:4360
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LabqbH8bfv.bat"17⤵PID:3664
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:4240
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GrfoiSU1wP.bat"19⤵PID:460
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:2420
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\410ZzJtAuR.bat"21⤵PID:4744
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2608
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SNhzeWIHcH.bat"23⤵PID:4516
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:3916
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8t4fMT0wY0.bat"25⤵PID:4496
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:4384
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4stVUxPy0P.bat"27⤵PID:2108
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:4988
-
-
C:\providercommon\spoolsv.exe"C:\providercommon\spoolsv.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yyRUJOSyqo.bat"29⤵PID:3588
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:230⤵PID:3992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Security\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\Windows Security\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Security\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\regid.1991-06.com.microsoft\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\regid.1991-06.com.microsoft\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\regid.1991-06.com.microsoft\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\providercommon\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\providercommon\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\setup\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Program Files\MSBuild\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files\MSBuild\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 7 /tr "'C:\Program Files\MSBuild\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
194B
MD5bcaf4e2164c1522c19f02cf1aca5fe68
SHA1ee1933f6cb60f0b463517097769369ab6b885729
SHA25648512aab2b042b5bc8d4fdea55a273b135eb10addba01b95d96315904ecf5950
SHA5124352e7ef98ad6acfd8f55299406ace7c118777d390d7ec4e1a91f45b7444dcfbb45414f8d1bc4a26764ff824f9d2ae109ded0f04de42b750e05283e649ec1dd6
-
Filesize
194B
MD551c3a0b01141b9c27e6e8284518e4fbf
SHA1297337acde382b096852cfe7164f49433041fc68
SHA25607ac5be8e65cf1c8fa868802568cf3534d69cb9ada008f4cfcd053e00959aec4
SHA512e9e2aeb769f8d0fc8be2cd6ad8e9c56b594ebab24fc109421ee74e5ef4ff7f3685afd06311302da27036a56f85ea3083f94e036c5f1af3d0a39bf26fdd8eeb75
-
Filesize
194B
MD5c8284516a29687478c047f7d08cd1e35
SHA1fc835a2794cda854c941f015273eadc0409840c5
SHA256d9dcb13517cd16c9abc21ee546179727669c5c0c113efa83ae8067d5d35b9574
SHA512b1a52c198f5a5fe8915a53b219918cb857f68ec4e722039acdcf472098ed0a5e3446477aa5008c68cbd9dfb4c986d86886ae12e072a0393c2988e96d542b138b
-
Filesize
194B
MD59db47dc3d8383d0b2af1dea300b0a6bb
SHA1481ff6f6ae8d2056071c44d96fa709446f0ba52a
SHA256b2e8e828eb60a089bc3eacc203ce2c6a86e6d343d2b9ab140d89de8f440fe7fc
SHA5120ff63550e1cbbb74f508749a35073a9a66d0ba7170874f8b2f13b97d4a314d96f203d0d7717f66867b18b01cb0ccca09450cde28e1232f52e1b08d06038e3c54
-
Filesize
194B
MD53bd3d56a6c7f6e16379be4e8a849f03e
SHA129d86f842fb94754418e5cbc6f8981426a8d4e30
SHA256c05a2a5bca68cbd43c53960f8b3657aa5aca1aa4af5e2581a8a1ce5a4b34a2cd
SHA5125960f6a19a39c36b40adb189d15e0ce7ca279b0a537ae0977902a4d5c6011cfc4112e0df1f8060ec9efdb371cb991ed9c65838dee07de987690d5b037046587f
-
Filesize
194B
MD5d8c3aa4919d6db41bdbdfcbb64b9bc2d
SHA1fa8c9683e3ad3c65301deae16e9340903a331b82
SHA2560c71f594032b1a5e4b4dbf89f8713cb96851224a4687d940990f87e344330125
SHA512b3ee234e40828c5fc79d1a10d2b5f6aa7da33a0275c9fac1af9aa27db22d3dd22a3dd88512b1fbb9f3fd9ffb198929d4ed02c2e64a0879446353459c6d241776
-
Filesize
194B
MD5408ed20dd0887a1485ae6cc50ce9f236
SHA16be1fb618905b6a58deb155ff2386693707975b4
SHA256a05bf2e9bcf627019378aa18c199f62e7f6f9209c877a1a20c3c8b24487036c5
SHA512e141b914e72b871581d2b6723a7304015156a27cf0498cda8132011cf08bcd6c8fb2446ba264a3ecc91ecbb1813543f5332e63a9a1cbe5e98d960cf224a23f00
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
194B
MD5c0f5fbc6db2e5fe45d4a5b0bbe8dfc46
SHA1dd44489ac8fe84499092b4a2be8c713b0e56412f
SHA25641e5e22f30aa1c44e9c78ab9e923b85e3698e4f157c1fd62b15d23b28a4799df
SHA512348fa340c6c4f66eb83f3229ce1e88186b675e3340d53cb49406c045b4f0236620b1283ceac882347211b19d60af0abefdda285cb8840f9c267465f207bd40fc
-
Filesize
194B
MD5c3080c0c56a7d80fcc31cea9357cf51c
SHA1dc32dc4c3ba04fc765d76605956567c2a90391a3
SHA256b392c4d1f650e004841d55f53fff578b8f5e65512c1360befa0ce0738a792661
SHA512e366b5ad7cd4ec000802d67882678617b9e3cc9665785439c1b077dadd58e7f88216531088db26c3300caa2f491a07c97bed558eb9d5f87dc9a9f15e74bc3894
-
Filesize
194B
MD57f0cfcf418e063b7ad0cda548e74dd67
SHA147f3f12f46b4460b497862f74ff4057cdf3d1f55
SHA2569fac1a44d8cb2be0ebb96a499cbe8c2f6024b932e159b18e5e43a3d14fc9fe6f
SHA512238b18864fde5943b7eb6d383b149916eef2c167af6419aa716dc0939d41116779a69f478036a42bf6d71934cd2bc6c360a9849dccd24f1d9b6140f2efed036f
-
Filesize
194B
MD50ef70d08fd85cbd0f76519bd6fe301e1
SHA19b7c1976c9011e4970d9413a2ff2a1927f7dd943
SHA256048213fd22fea0eb82924906752459cf67b3e09886e0b1fb336c785408c5d12c
SHA5128bece21f84c2f83061ddf1f3f5b6e3fd9ccb911868c4c52c0d885ecc0fc114905b5240d9b255d35519b12a10c4889a666f5838a2e2cc18584499eedcd8ac5039
-
Filesize
194B
MD55b29e85b2bb08a21af101bcb16749b25
SHA171d16316f51722bf20023d0277d3f2b16d4d31bf
SHA256a20c88c07d0e8c2509e1f13cfe3f511f575ef0e6de3de8fcd3f237386dda3f04
SHA51206bd633fcda4d3fd2111a1d6a1d9c42d74b67aac0da099159deb1c5ddc32ecbf2864c4a89e8ffe765d3cee78523233be7840b98450cebdcbf41c5361a03244c9
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478