Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 12:29
Behavioral task
behavioral1
Sample
JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe
-
Size
1.3MB
-
MD5
7f13cfd9d82c2bfd9a622220f4f0dfde
-
SHA1
476d6bccf9b871a3f74d5b7e39ed63b3c279df63
-
SHA256
cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a
-
SHA512
221dfa6358578757f629d3cfee5b927f6ba4679f6f8f53d238c5bd035cee561e836007b92356db06d0f98b2b9cde8f9fbe0059a8f0da2ca62fefeee567b9ba7b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2876 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4452 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4992 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3892 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3896 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4612 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3448 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4256 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4596 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4860 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3584 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4528 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4244 8 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 8 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x0008000000023bb9-10.dat dcrat behavioral2/memory/412-13-0x0000000000DF0000-0x0000000000F00000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2316 powershell.exe 3704 powershell.exe 3096 powershell.exe 1432 powershell.exe 1332 powershell.exe 2152 powershell.exe 4980 powershell.exe 392 powershell.exe 2260 powershell.exe 4448 powershell.exe 2816 powershell.exe 1608 powershell.exe 3972 powershell.exe 1712 powershell.exe 5084 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 14 IoCs
pid Process 412 DllCommonsvc.exe 1164 lsass.exe 4516 lsass.exe 4464 lsass.exe 412 lsass.exe 5036 lsass.exe 1284 lsass.exe 2316 lsass.exe 1728 lsass.exe 3808 lsass.exe 2892 lsass.exe 3028 lsass.exe 1412 lsass.exe 3528 lsass.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 54 raw.githubusercontent.com 15 raw.githubusercontent.com 35 raw.githubusercontent.com 42 raw.githubusercontent.com 52 raw.githubusercontent.com 43 raw.githubusercontent.com 50 raw.githubusercontent.com 51 raw.githubusercontent.com 53 raw.githubusercontent.com 16 raw.githubusercontent.com 36 raw.githubusercontent.com 37 raw.githubusercontent.com 41 raw.githubusercontent.com -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files\Windows Multimedia Platform\e6c9b481da804f DllCommonsvc.exe File created C:\Program Files\WindowsApps\csrss.exe DllCommonsvc.exe File created C:\Program Files\dotnet\swidtag\explorer.exe DllCommonsvc.exe File created C:\Program Files\dotnet\swidtag\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\6203df4a6bafc7 DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\csrss.exe DllCommonsvc.exe File opened for modification C:\Program Files\Windows Portable Devices\csrss.exe DllCommonsvc.exe File created C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\spoolsv.exe DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\f3b6ecef712a24 DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe DllCommonsvc.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\5b884080fd4f94 DllCommonsvc.exe File created C:\Windows\fr-FR\taskhostw.exe DllCommonsvc.exe File created C:\Windows\fr-FR\ea9f0e6c9e2dcd DllCommonsvc.exe File created C:\Windows\PrintDialog\sihost.exe DllCommonsvc.exe File created C:\Windows\PrintDialog\66fc9ff0ee96c2 DllCommonsvc.exe File created C:\Windows\CSC\OfficeClickToRun.exe DllCommonsvc.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings lsass.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 216 schtasks.exe 3892 schtasks.exe 1880 schtasks.exe 4612 schtasks.exe 4528 schtasks.exe 1852 schtasks.exe 4808 schtasks.exe 1888 schtasks.exe 3896 schtasks.exe 2940 schtasks.exe 1760 schtasks.exe 4256 schtasks.exe 4596 schtasks.exe 4752 schtasks.exe 4512 schtasks.exe 1460 schtasks.exe 4468 schtasks.exe 4524 schtasks.exe 2908 schtasks.exe 2772 schtasks.exe 1336 schtasks.exe 1784 schtasks.exe 1300 schtasks.exe 2876 schtasks.exe 4452 schtasks.exe 1632 schtasks.exe 2492 schtasks.exe 2116 schtasks.exe 1800 schtasks.exe 4464 schtasks.exe 2392 schtasks.exe 2672 schtasks.exe 4992 schtasks.exe 1064 schtasks.exe 3448 schtasks.exe 1656 schtasks.exe 2956 schtasks.exe 4400 schtasks.exe 1172 schtasks.exe 4860 schtasks.exe 3584 schtasks.exe 4244 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 412 DllCommonsvc.exe 412 DllCommonsvc.exe 412 DllCommonsvc.exe 412 DllCommonsvc.exe 412 DllCommonsvc.exe 3972 powershell.exe 3972 powershell.exe 1712 powershell.exe 1712 powershell.exe 4980 powershell.exe 4980 powershell.exe 2152 powershell.exe 2152 powershell.exe 3096 powershell.exe 3096 powershell.exe 3704 powershell.exe 3704 powershell.exe 5084 powershell.exe 5084 powershell.exe 2816 powershell.exe 2816 powershell.exe 1608 powershell.exe 1608 powershell.exe 1432 powershell.exe 1432 powershell.exe 3704 powershell.exe 2152 powershell.exe 4448 powershell.exe 4448 powershell.exe 2260 powershell.exe 2260 powershell.exe 1332 powershell.exe 1332 powershell.exe 2316 powershell.exe 2316 powershell.exe 392 powershell.exe 392 powershell.exe 4980 powershell.exe 4980 powershell.exe 2816 powershell.exe 3972 powershell.exe 3972 powershell.exe 1712 powershell.exe 1712 powershell.exe 5084 powershell.exe 3096 powershell.exe 392 powershell.exe 2316 powershell.exe 4448 powershell.exe 1432 powershell.exe 2260 powershell.exe 1608 powershell.exe 1332 powershell.exe 1164 lsass.exe 4516 lsass.exe 4464 lsass.exe 412 lsass.exe 5036 lsass.exe 1284 lsass.exe 2316 lsass.exe 1728 lsass.exe 3808 lsass.exe 2892 lsass.exe 3028 lsass.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 412 DllCommonsvc.exe Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 3704 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 3096 powershell.exe Token: SeDebugPrivilege 5084 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeDebugPrivilege 4448 powershell.exe Token: SeDebugPrivilege 392 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 1164 lsass.exe Token: SeDebugPrivilege 4516 lsass.exe Token: SeDebugPrivilege 4464 lsass.exe Token: SeDebugPrivilege 412 lsass.exe Token: SeDebugPrivilege 5036 lsass.exe Token: SeDebugPrivilege 1284 lsass.exe Token: SeDebugPrivilege 2316 lsass.exe Token: SeDebugPrivilege 1728 lsass.exe Token: SeDebugPrivilege 3808 lsass.exe Token: SeDebugPrivilege 2892 lsass.exe Token: SeDebugPrivilege 3028 lsass.exe Token: SeDebugPrivilege 1412 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 4624 552 JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe 83 PID 552 wrote to memory of 4624 552 JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe 83 PID 552 wrote to memory of 4624 552 JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe 83 PID 4624 wrote to memory of 1292 4624 WScript.exe 85 PID 4624 wrote to memory of 1292 4624 WScript.exe 85 PID 4624 wrote to memory of 1292 4624 WScript.exe 85 PID 1292 wrote to memory of 412 1292 cmd.exe 87 PID 1292 wrote to memory of 412 1292 cmd.exe 87 PID 412 wrote to memory of 1608 412 DllCommonsvc.exe 132 PID 412 wrote to memory of 1608 412 DllCommonsvc.exe 132 PID 412 wrote to memory of 3972 412 DllCommonsvc.exe 133 PID 412 wrote to memory of 3972 412 DllCommonsvc.exe 133 PID 412 wrote to memory of 1712 412 DllCommonsvc.exe 134 PID 412 wrote to memory of 1712 412 DllCommonsvc.exe 134 PID 412 wrote to memory of 3096 412 DllCommonsvc.exe 136 PID 412 wrote to memory of 3096 412 DllCommonsvc.exe 136 PID 412 wrote to memory of 5084 412 DllCommonsvc.exe 138 PID 412 wrote to memory of 5084 412 DllCommonsvc.exe 138 PID 412 wrote to memory of 4980 412 DllCommonsvc.exe 140 PID 412 wrote to memory of 4980 412 DllCommonsvc.exe 140 PID 412 wrote to memory of 1432 412 DllCommonsvc.exe 141 PID 412 wrote to memory of 1432 412 DllCommonsvc.exe 141 PID 412 wrote to memory of 1332 412 DllCommonsvc.exe 144 PID 412 wrote to memory of 1332 412 DllCommonsvc.exe 144 PID 412 wrote to memory of 2152 412 DllCommonsvc.exe 145 PID 412 wrote to memory of 2152 412 DllCommonsvc.exe 145 PID 412 wrote to memory of 2260 412 DllCommonsvc.exe 147 PID 412 wrote to memory of 2260 412 DllCommonsvc.exe 147 PID 412 wrote to memory of 3704 412 DllCommonsvc.exe 148 PID 412 wrote to memory of 3704 412 DllCommonsvc.exe 148 PID 412 wrote to memory of 2816 412 DllCommonsvc.exe 149 PID 412 wrote to memory of 2816 412 DllCommonsvc.exe 149 PID 412 wrote to memory of 2316 412 DllCommonsvc.exe 150 PID 412 wrote to memory of 2316 412 DllCommonsvc.exe 150 PID 412 wrote to memory of 392 412 DllCommonsvc.exe 151 PID 412 wrote to memory of 392 412 DllCommonsvc.exe 151 PID 412 wrote to memory of 4448 412 DllCommonsvc.exe 152 PID 412 wrote to memory of 4448 412 DllCommonsvc.exe 152 PID 412 wrote to memory of 3152 412 DllCommonsvc.exe 162 PID 412 wrote to memory of 3152 412 DllCommonsvc.exe 162 PID 3152 wrote to memory of 4440 3152 cmd.exe 164 PID 3152 wrote to memory of 4440 3152 cmd.exe 164 PID 3152 wrote to memory of 1164 3152 cmd.exe 166 PID 3152 wrote to memory of 1164 3152 cmd.exe 166 PID 1164 wrote to memory of 2272 1164 lsass.exe 175 PID 1164 wrote to memory of 2272 1164 lsass.exe 175 PID 2272 wrote to memory of 4904 2272 cmd.exe 177 PID 2272 wrote to memory of 4904 2272 cmd.exe 177 PID 2272 wrote to memory of 4516 2272 cmd.exe 183 PID 2272 wrote to memory of 4516 2272 cmd.exe 183 PID 4516 wrote to memory of 4940 4516 lsass.exe 188 PID 4516 wrote to memory of 4940 4516 lsass.exe 188 PID 4940 wrote to memory of 1148 4940 cmd.exe 190 PID 4940 wrote to memory of 1148 4940 cmd.exe 190 PID 4940 wrote to memory of 4464 4940 cmd.exe 192 PID 4940 wrote to memory of 4464 4940 cmd.exe 192 PID 4464 wrote to memory of 2716 4464 lsass.exe 194 PID 4464 wrote to memory of 2716 4464 lsass.exe 194 PID 2716 wrote to memory of 316 2716 cmd.exe 196 PID 2716 wrote to memory of 316 2716 cmd.exe 196 PID 2716 wrote to memory of 412 2716 cmd.exe 198 PID 2716 wrote to memory of 412 2716 cmd.exe 198 PID 412 wrote to memory of 3688 412 lsass.exe 200 PID 412 wrote to memory of 3688 412 lsass.exe 200 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cbd0f489897aac2dbe22ff4ec215983f3c7741183eaf860a5a876faae62c1a7a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\fr-FR\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PrintDialog\sihost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\Lang\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\dotnet\swidtag\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\StartMenuExperienceHost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Videos\OfficeClickToRun.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xghQOTFPMO.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4440
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Nc51i3GWIc.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:4904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Gozseo6rLH.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Gozseo6rLH.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:316
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eQ9EwglUAP.bat"13⤵PID:3688
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:3132
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WRY5ahHPmz.bat"15⤵PID:3960
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1832
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Jk1vLt9ke4.bat"17⤵PID:1092
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:4792
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Gozseo6rLH.bat"19⤵PID:1444
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:112
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YNa8GmLI5m.bat"21⤵PID:4304
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:4252
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XC59y11ueh.bat"23⤵PID:2924
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:4176
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lEFN0vw97k.bat"25⤵PID:3328
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:3404
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\00vfQAbtTV.bat"27⤵PID:1916
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:4600
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QOz0umrEhM.bat"29⤵PID:3540
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:230⤵PID:2784
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe"30⤵
- Executes dropped EXE
PID:3528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Windows\fr-FR\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\fr-FR\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Windows\fr-FR\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Windows\PrintDialog\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\PrintDialog\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Windows\PrintDialog\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Multimedia Platform\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\Lang\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\Lang\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files\dotnet\swidtag\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\dotnet\swidtag\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files\dotnet\swidtag\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Videos\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Default\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5f8f4fa5e8b5e06f504a02a2e18147552
SHA1d2ca5f3d769f8b58c8f6e1bedec6b0a85368514b
SHA256e342b984b36c7731a8192b854b80dde7cdfd684feeb8b064b6f70cd803d3d6f4
SHA51219d975e33ceaab720f7874bc9faa708434f714c431cf2bb2b805e23a77d22684f110ca36d2002d700027219460d3c91fcd43fac55d38136c4df9be55633ca4a1
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
237B
MD5fa16682ea82f1455ec1aa572cce845fb
SHA1644837c0574fae2d4ace6ba24dac0b3fd0b0e430
SHA256e2929c833ecf3e4349404f2d928b963e39edba5ab0573e58acf46223c8275259
SHA512354fefcef8a8b0e69d247bf46f0227df878986ca872b398eecfc7b01907f42f026552935f0bf75a44669adc2757fa1ccbfbe5de2e728cf255d2df6427ebb09b7
-
Filesize
237B
MD5b5521f5c5ec6d4da1f63d416a678ebe6
SHA164308c82018b762f9b413fc0fef156dcf35f2a42
SHA25611dc08631f10101ce24601eb9c57a1afd6484dcaabb112d4b4589ecc3d80f0ee
SHA512a0788e92f477d5df57a73840646afafc4bdf6594430a8272f8cd81dd5264076fe01ad9863ab9700920c5add0f293be6be2000677ba85a138c602a9183e34f026
-
Filesize
237B
MD52a8e8bd91b31c94ba55dbbb1ec9cc4e6
SHA1b30c80a4cd46e7c1150437383edde4889611a23a
SHA2560fe7915e4350664016c32bc1c907028a8da653f33450b86174a4b4d75fcf4e52
SHA51268a30e725bcc6590ddbd0ccdfdd0777cc8e4aa210c13f6b8858c1d1ff191768cccf08141e9d01e4f34f3b7caa3532e9b54dc64a75c4d496e1c1d168ff1b79cec
-
Filesize
237B
MD5b451e7c18b6b771f5a97221f7a304922
SHA160b8c1f94efa3402c7626631a254a7f6f6b6c470
SHA2566dc235ec4156c7dee4e4aa32ae12c2132548fbb2a12588dee140e318697a9325
SHA51243598eed0c0f9eb095d0200e184965620c755333579b7521eed180e35de08788a19d716c4a09ac5fc8a62dcbff1777693552f0ce3165b55fee11238316d61327
-
Filesize
237B
MD5d5348d920e6a910368d9b825ef275dd6
SHA15a5abcab1f492b3bb9559d9ebc5e44fef2b7377e
SHA2567c121e4724fa0d7dbb2ac105b68ec45d542200329547e0c88fc197be8079b58f
SHA512e43b3d8715faf8df06e1f0d3e2bcbd1da48cf69555ea334d1f4895af6683c3c6e301221a517a8cb54d7f5fccbf0cb284b669fdf5558a63730c2df8ab35805bec
-
Filesize
237B
MD54ffb71876b1d66f64b2b1f62c9537cf7
SHA1eb97bdc2aaa179189a9a5b33444a6549f621abe2
SHA2568164df7e631bcec6e3c49573d830ea3119c5a44690f0ca5e735854d0451687cf
SHA512a5a0b9213702ecf3e22f2dc3fb34685fb65a2cee53a0c3e2169e9e85a7d4b253cda283cc00fd5c8a252639332457bb9bd8dc13d92e5494fe9e2f5d9c5ca61860
-
Filesize
237B
MD55a5fd3ba6c84285cbcc1cd2d0d64ed2f
SHA1fc5c0bb58b67b2771e3bf86c4670e9b639192bdc
SHA256f61528700ed4ac482bcf98b418ee0ba40a328ad47085e293d29b17a1545e4dc8
SHA512b09b1654dc39ffc825b059b4e13c1fb624669091349faab786a28ddbdba45ad7385a4f53aa7460faba139b1ffdcde764043be3c3ea8ca0b056eeb2ce6377ebfc
-
Filesize
237B
MD51ee9120fb6f59eae6a3f695989cfa3e2
SHA131953ec9fdb080a67b85d489e744f929e7a561c4
SHA256af1f8f11d1a0ade8a52db9cfb174c3299c4c91ae94d4361ccbaa1ba60b6dda20
SHA5128ad3675419f9af8179d3c03e8a8c59edc39cda8bb74b384b132f76ee91be53722303711721b1c67d5a29ce38bfb4e729f3053fee357444faacd65dec4ec5d41e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
237B
MD577a65850f39a18624bd4970006652857
SHA1032222ab50e8d4c9526ad5afd95b85fbe630977b
SHA2560e56b47539704ad4577355a7c22123071a9a4731b1b7d125dede540de1f0416f
SHA51244ee158eee88dadda380e5d88f7e04b77ba8bcdee60118bda760ddf993161b331186042c3bc79ed944efb769c2c28963fe22131808996ae382edaed27f739792
-
Filesize
237B
MD52d4840839750880f3a555bff18a30c2c
SHA15f078fbfbc481b89c86274203cad0f5cd5a91c1b
SHA256e90ef193b45508627f0eaaf7d25081b1acd99e495ab485051ecc49998a96751f
SHA51229fb3a0328e9276d42627944ee99b5965ac121724d6a33a3dd76070cd6afaf13683d1e88c7e8bf849451eddd4926b4809a201825a6de061c5c23f7a29dcd1cf7
-
Filesize
237B
MD5c19febfb2fce8b8de84efc1f33167dcd
SHA18c8e90e49b009c9e19917c3a991ccdcb94324ed2
SHA25665435f204993952b04d3a60a21e317b213651b7f780b550a176105a6a22d966f
SHA512aea38caae125164228020ec9616d24fbe841a3bd17952164ba01ed3b59c7cb039723d5c4f971ae5db0bc4dda2206376a672ce38e4cb0437680a3b951fc94e44f
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478