Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 13:31
Behavioral task
behavioral1
Sample
JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe
-
Size
1.3MB
-
MD5
d1de6ad6ccf5f66a01311c1618d96666
-
SHA1
b0245f95a7bbfb13c0b8e4f9f9f06d2bbded982e
-
SHA256
b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297
-
SHA512
4f3c3a3df1810f3e1905305828d4758f23d7b7b75fc930705ff2b5fd75029723c883b087c04574e4a1ce60b82247f279cbd03fb82f190e09cd4b9f30fb77c2b7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1204 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 472 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 980 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 948 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 288 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1464 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 572 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 572 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0007000000016fc9-9.dat dcrat behavioral1/memory/2660-13-0x00000000011F0000-0x0000000001300000-memory.dmp dcrat behavioral1/memory/1748-58-0x0000000000BD0000-0x0000000000CE0000-memory.dmp dcrat behavioral1/memory/2100-206-0x00000000013B0000-0x00000000014C0000-memory.dmp dcrat behavioral1/memory/1992-385-0x00000000003B0000-0x00000000004C0000-memory.dmp dcrat behavioral1/memory/2080-445-0x0000000001030000-0x0000000001140000-memory.dmp dcrat behavioral1/memory/1344-625-0x00000000013A0000-0x00000000014B0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2816 powershell.exe 2744 powershell.exe 3020 powershell.exe 2832 powershell.exe 2572 powershell.exe 2340 powershell.exe 2648 powershell.exe 2752 powershell.exe 2912 powershell.exe 2708 powershell.exe 1268 powershell.exe 2848 powershell.exe 2252 powershell.exe 2748 powershell.exe 2656 powershell.exe 2548 powershell.exe 1068 powershell.exe 2876 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2660 DllCommonsvc.exe 1748 csrss.exe 2100 csrss.exe 1972 csrss.exe 2808 csrss.exe 1992 csrss.exe 2080 csrss.exe 2440 csrss.exe 2564 csrss.exe 1344 csrss.exe 1568 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 cmd.exe 2828 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 31 raw.githubusercontent.com 4 raw.githubusercontent.com 19 raw.githubusercontent.com 27 raw.githubusercontent.com 16 raw.githubusercontent.com 23 raw.githubusercontent.com 34 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\it-IT\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files\Common Files\services.exe DllCommonsvc.exe File created C:\Program Files\Common Files\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files\DVD Maker\es-ES\services.exe DllCommonsvc.exe File created C:\Program Files\DVD Maker\es-ES\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\explorer.exe DllCommonsvc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\diagnostics\scheduled\Maintenance\fr-FR\smss.exe DllCommonsvc.exe File created C:\Windows\de-DE\Idle.exe DllCommonsvc.exe File created C:\Windows\de-DE\6ccacd8608530f DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1180 schtasks.exe 624 schtasks.exe 1288 schtasks.exe 1696 schtasks.exe 1920 schtasks.exe 2916 schtasks.exe 1204 schtasks.exe 1148 schtasks.exe 2552 schtasks.exe 2132 schtasks.exe 2508 schtasks.exe 3012 schtasks.exe 760 schtasks.exe 288 schtasks.exe 2056 schtasks.exe 2856 schtasks.exe 2504 schtasks.exe 2036 schtasks.exe 2376 schtasks.exe 2464 schtasks.exe 580 schtasks.exe 1676 schtasks.exe 2344 schtasks.exe 1344 schtasks.exe 1728 schtasks.exe 2576 schtasks.exe 2324 schtasks.exe 2924 schtasks.exe 1616 schtasks.exe 1052 schtasks.exe 1264 schtasks.exe 980 schtasks.exe 1980 schtasks.exe 1388 schtasks.exe 916 schtasks.exe 2696 schtasks.exe 1464 schtasks.exe 1828 schtasks.exe 1460 schtasks.exe 1996 schtasks.exe 472 schtasks.exe 2620 schtasks.exe 3036 schtasks.exe 700 schtasks.exe 2160 schtasks.exe 948 schtasks.exe 2584 schtasks.exe 1716 schtasks.exe 2060 schtasks.exe 2624 schtasks.exe 1580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2660 DllCommonsvc.exe 1748 csrss.exe 1268 powershell.exe 2816 powershell.exe 3020 powershell.exe 2252 powershell.exe 2748 powershell.exe 2848 powershell.exe 2744 powershell.exe 2572 powershell.exe 2876 powershell.exe 2656 powershell.exe 2752 powershell.exe 2340 powershell.exe 2648 powershell.exe 2912 powershell.exe 2708 powershell.exe 2548 powershell.exe 2832 powershell.exe 1068 powershell.exe 2100 csrss.exe 1972 csrss.exe 2808 csrss.exe 1992 csrss.exe 2080 csrss.exe 2440 csrss.exe 2564 csrss.exe 1344 csrss.exe 1568 csrss.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2660 DllCommonsvc.exe Token: SeDebugPrivilege 1748 csrss.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 2100 csrss.exe Token: SeDebugPrivilege 1972 csrss.exe Token: SeDebugPrivilege 2808 csrss.exe Token: SeDebugPrivilege 1992 csrss.exe Token: SeDebugPrivilege 2080 csrss.exe Token: SeDebugPrivilege 2440 csrss.exe Token: SeDebugPrivilege 2564 csrss.exe Token: SeDebugPrivilege 1344 csrss.exe Token: SeDebugPrivilege 1568 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2832 2868 JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe 30 PID 2868 wrote to memory of 2832 2868 JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe 30 PID 2868 wrote to memory of 2832 2868 JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe 30 PID 2868 wrote to memory of 2832 2868 JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe 30 PID 2832 wrote to memory of 2828 2832 WScript.exe 31 PID 2832 wrote to memory of 2828 2832 WScript.exe 31 PID 2832 wrote to memory of 2828 2832 WScript.exe 31 PID 2832 wrote to memory of 2828 2832 WScript.exe 31 PID 2828 wrote to memory of 2660 2828 cmd.exe 33 PID 2828 wrote to memory of 2660 2828 cmd.exe 33 PID 2828 wrote to memory of 2660 2828 cmd.exe 33 PID 2828 wrote to memory of 2660 2828 cmd.exe 33 PID 2660 wrote to memory of 2744 2660 DllCommonsvc.exe 86 PID 2660 wrote to memory of 2744 2660 DllCommonsvc.exe 86 PID 2660 wrote to memory of 2744 2660 DllCommonsvc.exe 86 PID 2660 wrote to memory of 2848 2660 DllCommonsvc.exe 87 PID 2660 wrote to memory of 2848 2660 DllCommonsvc.exe 87 PID 2660 wrote to memory of 2848 2660 DllCommonsvc.exe 87 PID 2660 wrote to memory of 2816 2660 DllCommonsvc.exe 88 PID 2660 wrote to memory of 2816 2660 DllCommonsvc.exe 88 PID 2660 wrote to memory of 2816 2660 DllCommonsvc.exe 88 PID 2660 wrote to memory of 2876 2660 DllCommonsvc.exe 89 PID 2660 wrote to memory of 2876 2660 DllCommonsvc.exe 89 PID 2660 wrote to memory of 2876 2660 DllCommonsvc.exe 89 PID 2660 wrote to memory of 2752 2660 DllCommonsvc.exe 90 PID 2660 wrote to memory of 2752 2660 DllCommonsvc.exe 90 PID 2660 wrote to memory of 2752 2660 DllCommonsvc.exe 90 PID 2660 wrote to memory of 2912 2660 DllCommonsvc.exe 91 PID 2660 wrote to memory of 2912 2660 DllCommonsvc.exe 91 PID 2660 wrote to memory of 2912 2660 DllCommonsvc.exe 91 PID 2660 wrote to memory of 3020 2660 DllCommonsvc.exe 92 PID 2660 wrote to memory of 3020 2660 DllCommonsvc.exe 92 PID 2660 wrote to memory of 3020 2660 DllCommonsvc.exe 92 PID 2660 wrote to memory of 2832 2660 DllCommonsvc.exe 94 PID 2660 wrote to memory of 2832 2660 DllCommonsvc.exe 94 PID 2660 wrote to memory of 2832 2660 DllCommonsvc.exe 94 PID 2660 wrote to memory of 2252 2660 DllCommonsvc.exe 95 PID 2660 wrote to memory of 2252 2660 DllCommonsvc.exe 95 PID 2660 wrote to memory of 2252 2660 DllCommonsvc.exe 95 PID 2660 wrote to memory of 2572 2660 DllCommonsvc.exe 96 PID 2660 wrote to memory of 2572 2660 DllCommonsvc.exe 96 PID 2660 wrote to memory of 2572 2660 DllCommonsvc.exe 96 PID 2660 wrote to memory of 2748 2660 DllCommonsvc.exe 97 PID 2660 wrote to memory of 2748 2660 DllCommonsvc.exe 97 PID 2660 wrote to memory of 2748 2660 DllCommonsvc.exe 97 PID 2660 wrote to memory of 2656 2660 DllCommonsvc.exe 98 PID 2660 wrote to memory of 2656 2660 DllCommonsvc.exe 98 PID 2660 wrote to memory of 2656 2660 DllCommonsvc.exe 98 PID 2660 wrote to memory of 2708 2660 DllCommonsvc.exe 99 PID 2660 wrote to memory of 2708 2660 DllCommonsvc.exe 99 PID 2660 wrote to memory of 2708 2660 DllCommonsvc.exe 99 PID 2660 wrote to memory of 2340 2660 DllCommonsvc.exe 100 PID 2660 wrote to memory of 2340 2660 DllCommonsvc.exe 100 PID 2660 wrote to memory of 2340 2660 DllCommonsvc.exe 100 PID 2660 wrote to memory of 1268 2660 DllCommonsvc.exe 101 PID 2660 wrote to memory of 1268 2660 DllCommonsvc.exe 101 PID 2660 wrote to memory of 1268 2660 DllCommonsvc.exe 101 PID 2660 wrote to memory of 2648 2660 DllCommonsvc.exe 102 PID 2660 wrote to memory of 2648 2660 DllCommonsvc.exe 102 PID 2660 wrote to memory of 2648 2660 DllCommonsvc.exe 102 PID 2660 wrote to memory of 2548 2660 DllCommonsvc.exe 103 PID 2660 wrote to memory of 2548 2660 DllCommonsvc.exe 103 PID 2660 wrote to memory of 2548 2660 DllCommonsvc.exe 103 PID 2660 wrote to memory of 1068 2660 DllCommonsvc.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b19b19676a1a3820b1cdf40254206a923555e83b52f3bf3b065c35f6d6cda297.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\it-IT\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Links\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Documents\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\DVD Maker\es-ES\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\de-DE\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6uMgbjYtd5.bat"6⤵PID:2400
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1472
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IVqzzTSBcr.bat"8⤵PID:1836
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:3064
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SNhzeWIHcH.bat"10⤵PID:1068
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2916
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\blOcFVMglb.bat"12⤵PID:1580
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1812
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0IgHXqOu0A.bat"14⤵PID:1912
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2764
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LBVLNHYHv1.bat"16⤵PID:2756
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2796
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lHuJ4aKJis.bat"18⤵PID:2004
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:1724
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6VGBOjzZtA.bat"20⤵PID:2448
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:1476
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JCnMdX7E06.bat"22⤵PID:2432
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2944
-
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\providercommon\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\providercommon\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\providercommon\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Links\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Links\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Links\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\providercommon\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Admin\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Documents\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Documents\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Documents\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Common Files\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files\DVD Maker\es-ES\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\es-ES\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\DVD Maker\es-ES\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default User\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Windows\de-DE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\de-DE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Windows\de-DE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd07035cb15675e10e92222d7f9728d3
SHA120ecd256493ca17916964ff81111a9080d1e6040
SHA256b336a9693d5ae4d99494e02639a8b2fb93de39929c0364aca5ea84b65e3f24a6
SHA512cebbb667ae01f9a51d238263f4d9bffea445bc4a31c8083583ff50e56ca72966ba09c3373e9d95a7fb2e65b84354dfaa1df8c74efb13e42d3232eba1d412a97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681893542c0a4bef6ec625b13e9dbc72
SHA1aa66176f7504b14ea2d57d6fd83eb4fe2f118472
SHA25635007baee0dfaa6c045e86e72b94593e1564fc2f02bc3ff48a1de1e2f7295044
SHA5127245e39c6264cb5effb93b3bcdfbc7e3f1f7cca288ff958692e578ef55432708310f857d69e546f66eaabd4fa8053cc7f46ce18b12107e2723e72b036d728844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2de12e87264a5195400079e52b0aa6
SHA159112138a6c6c00d5624015d7d072e4bfe1cbc24
SHA256fe9fcb63c477cf88a8f3e7053192139b6ba273e987f9d800c3c4305575d1f872
SHA512b3f4d27bd1de531d5eab398bc41101be739fa24164d0a4a7e144ed03dc7f33b400c3ac0dda3e2f6726d0407069f744eaec2baeec4ce12a2e8dee82680730b61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ac94e11e909c512c715a9f15d45fe8
SHA17a04f9dc91ee4e8f7aee9e5d40decf63bba87244
SHA25676775af1decf4b3868e4a942f0751acbcd23c87768dce37efa924db68bed6552
SHA5122ca14bafc58653ac5e02f1eded6f50e0b34779c5c2c5dcf1b1849c72268951814631a555a74b2f146a891c45f3a8f00b1fc913f049fc1cf38b3db516fddaf262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687ffa111f7296e986505839ef41bfbc
SHA1c58910253e8ef38f791a01b8b1052961862bbbc2
SHA25671ccc8cc07cc3b638254a3f58d111ebdfc226bf38a3ea6024142e973bd2fb9a4
SHA5124bcb8f32bb8bca41ec1e06b2251bb2d404657b4e5786999736e17dc69da60ce87957a83e7e9f2bd3db7797420d2924b836d181ab2f492c9540dd62d9146ada32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578120db9452837c5e88a9123a7756fb9
SHA1401135d346b7213d2bf43fa613b45489100dc49a
SHA2561eef2afcd1609eb8aeeeb44904801593aa005eb2c706cd7ab7e6090952da3cbb
SHA5126ff701a1ea890b6021c927fb54d05c800cee78deb370bc9239113b5d4ff41df5ddff475958f1aec7fdeb06175de5a5e4e56ddb87ba92bd0a423fad1194d91909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56730dbf1ebf7a79cd1e313ecae342f56
SHA1f84a74548ba1c2f80701bf26d0817d8399ab8ac9
SHA2567c14abc1562daf48b7369f780c13084c61f1cf7edfe91608a381196d57724bc0
SHA512afd0d06c25ee1628a6b12987a6f3ec72ecb4f5221fd1456d0941aaa8d32416beaee3dccbf2b0c2c7dd4edb62b31161ce74c5a429916e4ee1f61f87e9c6a24731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7a294e6ee66b3074e00914883084fc5
SHA14aa9f0fd7ae7cc876d5c5e835089e77ea10a9c15
SHA25650e592f4af6764ff349bfb2b422b9e7f7b56bf635eb142c8e338922fd2ab93a9
SHA512389be6eb8e6b33f4fba4bac8efadce70ceb10d096555efb1422374c96b1fdee8fdb3b09e1e2988ec053b93324222a56acc5516a8bd564507f9d3594402a94b96
-
Filesize
237B
MD5006e62c7e26d114a3c8db702242ef2ec
SHA13439f77cac1f613cddf815c5b0078cf539fd4aee
SHA256e43dd383bff125249edc6cece6b60a2b77de1d89d727be07bc8c2ca631991456
SHA512ed7a77fcef4443483bbba9040b6ff55126bca10840951efbde13c748d3cf4cf0f4dc75df658aa19c8790c79d594c65286facb43d8d9cfbed7906130d80e59086
-
Filesize
237B
MD59b3e0bd8925c656b16e66768d294b782
SHA12f06c014d442f1d056329062adc94674daf39ece
SHA256fc99e9de36b5257e2b30db4196923414ee49642e5044d047bcaef1fd1d6439ba
SHA512d4c9a6c9c4f961930a47f40fbfae437e8adee9336e323a18e9940e1e1d97ea0a99348db6566e9ad2f03691ceb7e9d4307cf095fceecc9fb0d7b79ba8adbde036
-
Filesize
237B
MD54338e13cbac78be36027938306a69955
SHA131c7c76766f8c31b42542c0f7ee01d244d8ce816
SHA25619b76b25a55c5a6e222559d2c691ac254adfde9cb04caee6f51a257dcca1d7ee
SHA512048e46af3ea2fa84a6056502c849b128d3b9c155f950206423959d8cfe7be8a5d180b5392414a471fc85857c353148d15e1be56e4b57a3ee8d984dd513f507b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
237B
MD55985e41c752947d195edc130cbcb5c7f
SHA1329c6980b0431b1d95d30fa442d60f9fd087f771
SHA256510cf591c71e23eb042a2133f752812f1a386710867adfea9c975817c62a1eb2
SHA5120ebc3e30526b9cf4cb8cfad981a3e11bb76ad5b53f058da956dcd0c32838eea709465ddee3544224eccb80d8e671320e0b833cac996ddd0edfaa8ccd3350cdef
-
Filesize
237B
MD5234016625c2393e0aab554132af5f425
SHA143900f8ca5a89e901927f885f4b38e8c1eefdfe5
SHA256ffb69475ef3f5d658db5eddfb79810a610bb31030e3df0c8223c69d0ea02211b
SHA512793c7475ffceddfa5d9e172838655851e6a34727ed010b36be5c5cdec57fb2cba0acb13840f21b24643cc804e736ff6af032af61747a4bcde5dd1eaa3f02f6de
-
Filesize
237B
MD5ad5412fc33ea1c7cd90635b9d957cc5c
SHA1cd93f7875194e7ff518d1c915a34b2fafc1ab142
SHA25607fd91a9bd4993fe15a6c694ecde576db31812e7fce315ba70c4bc25a47951dd
SHA5123bff07c03299c4c4eac2f47c6852154e462487cfa81cdfbfecc96c306c19903975f6bea81c35f215c8c9b1278b809e7a9d5e5b553bc663111deb93c253f56153
-
Filesize
237B
MD56c0611f589e3905f963fe055ccf349e1
SHA183d7bb19644af813c4646873374d166e8cef761f
SHA2562f10900e96980dcc244893fc47d4f4d85b115f231df1b41a1cc760563fa80562
SHA51291aff2d8096f64a020d3a65b53cc76e12b0031627de13f0c19c50ff6154e898b74b6698eef3fe58364d3eb80c4f3090d7964070d67bce6a90f2dfa8e52aa224d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
237B
MD585a109fa5494450baa63cdf29abe69ff
SHA1e84f62192ee76104209712278647ff632fe89f20
SHA256b1355a5eb2c40a5ebd8f8783954a63ecc848058a3629d2b506fd6b4e5a02ba2f
SHA512afd0a273470cc7d58d4f0a50f0b2f9e3098ea5e47993a6bf0735dcf29880eecaca9389f4c073b5127923b47671dc99b8cac3d4fd6e32df33dc521cbe031978ef
-
Filesize
237B
MD5d0e87101d00e12739801d565429ffeec
SHA1b6ce77c8a2a8f7514c7ee56e9ba37f32d919e88e
SHA2564c70fe91c5720f640af328a543255e5b90f604d2a5e44980d168b1f07cada7aa
SHA512e75949710a53fa7cb0fb51daebfa6ae32541be59c8cf1af16367889038c6f40b9b2cb022aed6af1a94d17de57086b024e7ffed588a5142f9d55fd2d020fdbd52
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4MDN5X8712QGZMKL71UE.temp
Filesize7KB
MD552ef85b8c9cbf1aba256f0f63b016f6f
SHA190b6bb9f23ca5131a8e0f5d0b5370ec75888d545
SHA256717506d742051aa88398678567c4b0acf543ef3ebf2fae73c7a02999a9c905f8
SHA5128fbad74bbaecc2d036fa22b492ed6f97b559ff17278bdc1fe63d85544a3ffefad14fed33a5a4e9815c97158a963e723ac93b5da82389beb965d6618c745fefe9
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394