Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 18:11
Behavioral task
behavioral1
Sample
JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe
-
Size
1.3MB
-
MD5
1a2c2502e3baf31e4ea3ac3d86d48827
-
SHA1
f7ac0bc3d7e6e27349adf8079805d621248ec6ad
-
SHA256
b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f
-
SHA512
920956a8bc102e81b6df2492526f36a39bb9b058b9dcfd6a743cb0c69e1286f3297c8ecc7e49a1d4185ac2ae510dc649a963c125ef87272d3387c9b0c291928d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3644 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4780 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4796 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3356 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5040 2552 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 400 2552 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000a000000023b89-10.dat dcrat behavioral2/memory/4860-13-0x0000000000660000-0x0000000000770000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2260 powershell.exe 440 powershell.exe 1560 powershell.exe 540 powershell.exe 2400 powershell.exe -
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SppExtComObj.exe -
Executes dropped EXE 16 IoCs
pid Process 4860 DllCommonsvc.exe 1348 SppExtComObj.exe 5000 SppExtComObj.exe 5016 SppExtComObj.exe 3864 SppExtComObj.exe 2096 SppExtComObj.exe 1600 SppExtComObj.exe 5092 SppExtComObj.exe 5104 SppExtComObj.exe 1548 SppExtComObj.exe 528 SppExtComObj.exe 5004 SppExtComObj.exe 2472 SppExtComObj.exe 4756 SppExtComObj.exe 3792 SppExtComObj.exe 620 SppExtComObj.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
flow ioc 47 raw.githubusercontent.com 57 raw.githubusercontent.com 59 raw.githubusercontent.com 17 raw.githubusercontent.com 43 raw.githubusercontent.com 58 raw.githubusercontent.com 18 raw.githubusercontent.com 40 raw.githubusercontent.com 42 raw.githubusercontent.com 55 raw.githubusercontent.com 56 raw.githubusercontent.com 26 raw.githubusercontent.com 48 raw.githubusercontent.com 49 raw.githubusercontent.com 60 raw.githubusercontent.com 41 raw.githubusercontent.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\bcastdvr\winlogon.exe DllCommonsvc.exe File created C:\Windows\bcastdvr\cc11b995f2a76d DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings SppExtComObj.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1276 schtasks.exe 3356 schtasks.exe 2944 schtasks.exe 2524 schtasks.exe 1436 schtasks.exe 4796 schtasks.exe 5000 schtasks.exe 5040 schtasks.exe 400 schtasks.exe 3644 schtasks.exe 4780 schtasks.exe 2416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4860 DllCommonsvc.exe 4860 DllCommonsvc.exe 4860 DllCommonsvc.exe 4860 DllCommonsvc.exe 4860 DllCommonsvc.exe 4860 DllCommonsvc.exe 4860 DllCommonsvc.exe 2260 powershell.exe 2400 powershell.exe 540 powershell.exe 440 powershell.exe 1560 powershell.exe 1348 SppExtComObj.exe 2260 powershell.exe 2400 powershell.exe 540 powershell.exe 440 powershell.exe 1560 powershell.exe 5000 SppExtComObj.exe 5016 SppExtComObj.exe 3864 SppExtComObj.exe 2096 SppExtComObj.exe 1600 SppExtComObj.exe 5092 SppExtComObj.exe 5104 SppExtComObj.exe 1548 SppExtComObj.exe 528 SppExtComObj.exe 5004 SppExtComObj.exe 2472 SppExtComObj.exe 4756 SppExtComObj.exe 3792 SppExtComObj.exe 620 SppExtComObj.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 4860 DllCommonsvc.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeDebugPrivilege 540 powershell.exe Token: SeDebugPrivilege 1560 powershell.exe Token: SeDebugPrivilege 1348 SppExtComObj.exe Token: SeDebugPrivilege 5000 SppExtComObj.exe Token: SeDebugPrivilege 5016 SppExtComObj.exe Token: SeDebugPrivilege 3864 SppExtComObj.exe Token: SeDebugPrivilege 2096 SppExtComObj.exe Token: SeDebugPrivilege 1600 SppExtComObj.exe Token: SeDebugPrivilege 5092 SppExtComObj.exe Token: SeDebugPrivilege 5104 SppExtComObj.exe Token: SeDebugPrivilege 1548 SppExtComObj.exe Token: SeDebugPrivilege 528 SppExtComObj.exe Token: SeDebugPrivilege 5004 SppExtComObj.exe Token: SeDebugPrivilege 2472 SppExtComObj.exe Token: SeDebugPrivilege 4756 SppExtComObj.exe Token: SeDebugPrivilege 3792 SppExtComObj.exe Token: SeDebugPrivilege 620 SppExtComObj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1888 1940 JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe 83 PID 1940 wrote to memory of 1888 1940 JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe 83 PID 1940 wrote to memory of 1888 1940 JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe 83 PID 1888 wrote to memory of 4584 1888 WScript.exe 85 PID 1888 wrote to memory of 4584 1888 WScript.exe 85 PID 1888 wrote to memory of 4584 1888 WScript.exe 85 PID 4584 wrote to memory of 4860 4584 cmd.exe 87 PID 4584 wrote to memory of 4860 4584 cmd.exe 87 PID 4860 wrote to memory of 1560 4860 DllCommonsvc.exe 102 PID 4860 wrote to memory of 1560 4860 DllCommonsvc.exe 102 PID 4860 wrote to memory of 440 4860 DllCommonsvc.exe 103 PID 4860 wrote to memory of 440 4860 DllCommonsvc.exe 103 PID 4860 wrote to memory of 540 4860 DllCommonsvc.exe 104 PID 4860 wrote to memory of 540 4860 DllCommonsvc.exe 104 PID 4860 wrote to memory of 2260 4860 DllCommonsvc.exe 105 PID 4860 wrote to memory of 2260 4860 DllCommonsvc.exe 105 PID 4860 wrote to memory of 2400 4860 DllCommonsvc.exe 106 PID 4860 wrote to memory of 2400 4860 DllCommonsvc.exe 106 PID 4860 wrote to memory of 1348 4860 DllCommonsvc.exe 112 PID 4860 wrote to memory of 1348 4860 DllCommonsvc.exe 112 PID 1348 wrote to memory of 3964 1348 SppExtComObj.exe 117 PID 1348 wrote to memory of 3964 1348 SppExtComObj.exe 117 PID 3964 wrote to memory of 2940 3964 cmd.exe 120 PID 3964 wrote to memory of 2940 3964 cmd.exe 120 PID 3964 wrote to memory of 5000 3964 cmd.exe 123 PID 3964 wrote to memory of 5000 3964 cmd.exe 123 PID 5000 wrote to memory of 1144 5000 SppExtComObj.exe 129 PID 5000 wrote to memory of 1144 5000 SppExtComObj.exe 129 PID 1144 wrote to memory of 1804 1144 cmd.exe 131 PID 1144 wrote to memory of 1804 1144 cmd.exe 131 PID 1144 wrote to memory of 5016 1144 cmd.exe 133 PID 1144 wrote to memory of 5016 1144 cmd.exe 133 PID 5016 wrote to memory of 1676 5016 SppExtComObj.exe 138 PID 5016 wrote to memory of 1676 5016 SppExtComObj.exe 138 PID 1676 wrote to memory of 5064 1676 cmd.exe 140 PID 1676 wrote to memory of 5064 1676 cmd.exe 140 PID 1676 wrote to memory of 3864 1676 cmd.exe 142 PID 1676 wrote to memory of 3864 1676 cmd.exe 142 PID 3864 wrote to memory of 5052 3864 SppExtComObj.exe 144 PID 3864 wrote to memory of 5052 3864 SppExtComObj.exe 144 PID 5052 wrote to memory of 4076 5052 cmd.exe 146 PID 5052 wrote to memory of 4076 5052 cmd.exe 146 PID 5052 wrote to memory of 2096 5052 cmd.exe 148 PID 5052 wrote to memory of 2096 5052 cmd.exe 148 PID 2096 wrote to memory of 3184 2096 SppExtComObj.exe 150 PID 2096 wrote to memory of 3184 2096 SppExtComObj.exe 150 PID 3184 wrote to memory of 3964 3184 cmd.exe 152 PID 3184 wrote to memory of 3964 3184 cmd.exe 152 PID 3184 wrote to memory of 1600 3184 cmd.exe 154 PID 3184 wrote to memory of 1600 3184 cmd.exe 154 PID 1600 wrote to memory of 2248 1600 SppExtComObj.exe 156 PID 1600 wrote to memory of 2248 1600 SppExtComObj.exe 156 PID 2248 wrote to memory of 860 2248 cmd.exe 158 PID 2248 wrote to memory of 860 2248 cmd.exe 158 PID 2248 wrote to memory of 5092 2248 cmd.exe 160 PID 2248 wrote to memory of 5092 2248 cmd.exe 160 PID 5092 wrote to memory of 1272 5092 SppExtComObj.exe 162 PID 5092 wrote to memory of 1272 5092 SppExtComObj.exe 162 PID 1272 wrote to memory of 2440 1272 cmd.exe 164 PID 1272 wrote to memory of 2440 1272 cmd.exe 164 PID 1272 wrote to memory of 5104 1272 cmd.exe 166 PID 1272 wrote to memory of 5104 1272 cmd.exe 166 PID 5104 wrote to memory of 2260 5104 SppExtComObj.exe 168 PID 5104 wrote to memory of 2260 5104 SppExtComObj.exe 168 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b03e6a554c1ec7865ce9ac4792730dabd8693e88aa39fbe0932baab5ab59d79f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\bcastdvr\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Pictures\SppExtComObj.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OPOGTQits7.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2940
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JDh6J9oWuS.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1804
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rjTee716Rl.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:5064
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MTMDnLe0ZL.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:4076
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pnRbx2xD7z.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:3964
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0ZxjVk2zv8.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:860
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b6uRiEqY03.bat"18⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2440
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\L9j9zErPDE.bat"20⤵PID:2260
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:5064
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\i0MStmnXAe.bat"22⤵PID:3704
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:4780
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5cWoBfSAzl.bat"24⤵PID:2700
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:3640
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\T7KIMELUbd.bat"26⤵PID:4112
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:4704
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pnRbx2xD7z.bat"28⤵PID:4904
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:5092
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9dhy3B39XM.bat"30⤵PID:1744
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:2328
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UJpHfzfs2i.bat"32⤵PID:3016
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:233⤵PID:3028
-
-
C:\Users\Public\Pictures\SppExtComObj.exe"C:\Users\Public\Pictures\SppExtComObj.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GW80Ek08hx.bat"34⤵PID:3676
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:235⤵PID:3116
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\providercommon\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\bcastdvr\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\bcastdvr\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Windows\bcastdvr\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\providercommon\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Pictures\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Public\Pictures\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Pictures\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
206B
MD574c42c3779a80d7fff8097dbc17d0392
SHA1979caf0ad5999f334a4e6b64f201741a70a33a56
SHA256a7bd7857436e09ba76311e15ce0e4231454a9538e80232d63b79078096ab55d4
SHA51245583f073653d01bbf4578861c36d5c4fb257aaa3cfe399edcda0bdede888cfece833d3366805d981ac261f2b9559bc5f377ff3d5c46967ff89bc10779c98119
-
Filesize
206B
MD5e74d2f137b88510c88b6f11e1786b44b
SHA1c08a17875e849a41c3861fa45e2f73a1f8645e6c
SHA256a90fffd97525bd1aaad1c17d745c037d8c51b2d657a32138dd236de4cd671de1
SHA512af2fb6e60d8cf4f89bebf0887283511dcf03535a28868ebcf7f6089869fc093bfedf2f682f4c84c51a60610f2b31e72d9d5c2c7e357ecc47bccbe7826c454b7f
-
Filesize
206B
MD5451368b8ac760ba7148559ec6dcdc594
SHA16966bd721b1c90726f3f7910f74daa00d28edc60
SHA2569659c3e78193740f14a794f146465af6d0c3791c24709138e7ccc1479835e580
SHA512627131737d5b1ad7259bd97ca9abb68864c0e2124e2e432874ed998620f70be5f6629eda56209613280d839df0d4ace4701473dbdeb40f28dc312442d336b225
-
Filesize
206B
MD534dde147f28ad485234c007cf8e16da2
SHA13e8e649454d7c8fed5a314d39cc1a20faaf61e95
SHA25698626327f32935f8fe08ba28cc571fdf03f561f3dcc6c9d596e2e763ac8c99f3
SHA51285e37fe6430b5c9ada0d8864a7e36e09aabb1ccbdfc6ab20dc17dc05afdad3eab74c15af33530b105cd0ba3491afaff19f51072365a8e17b95fa369edcbe69f9
-
Filesize
206B
MD5090191a52700de993df2799d702f834a
SHA1076bb4780873ccb56c967563f3fead23dc381771
SHA256beb8a495341e5b5707d598ca2ba11de718548a60724769f972fc24281c7c5dc3
SHA5124b0cb84ddc029fa97e6a4afd7f72b6ecd2f898f449e038d26f55054129cbd0f129411bedbd149b821e581144db319fe822fc46567a3c3e5ffc9b9d72fb1fefdc
-
Filesize
206B
MD595bb4e385657361aeb561db134892c89
SHA1bf7b33537406be5a3561a5e5ff1cc214768677a6
SHA2563ec57d5f04adf1c9bf60e7f931ce62862f2ddc210b7ce452d3b3e2374cce2024
SHA51237404351f8a7722b59c7d87114a6973df4b34a1afcd1d75b1f0737ce2087f791f9e66df03d829ce6748c94f93a346f6c38a30235b2d7fe5d0e2e806ce7574071
-
Filesize
206B
MD501949582559721dbe09a3f3a2db59464
SHA1b571d523da55dcb5418a46e5affe84c1aa840bf3
SHA256e1284c9571ec1b22a6da7a9601ddb4ba16e461a1063de8759715f5cf4293d4b7
SHA512775b5f5446c77965017a3f1ca420a2ad8aa447f7dc782e2d9a4f9af1809be5e46c05168e10a77dbafcf49aa3adf0e3922e4903059e005d9c18ce5ce57e365a87
-
Filesize
206B
MD5a470e852df3d316e4f7784c41365e9b6
SHA11d51f42956ba2dfaecfc8a8402585ca4870f908b
SHA2561ab8bb291d08dd6dd42306d21ec11c282b52dbf4613a308285791b544cdd6f7b
SHA512295373e66f084e7c10d324f0a04047e98164cab54771b66af6e8bc5fccf4267b2bfba8069d4b373c09a6ff18de5f02f775af916fde6c7d17429a0704273f2d5b
-
Filesize
206B
MD5ace7ceaa61dcbad0ef58d16d80d41076
SHA1f1674e6db60e282852f32e3c657c3eae21dba70c
SHA256432ff09d3685e6ad2ab54a831ab2b91e99d3efe1aeba10820b730f439ddcada8
SHA512c7a74b6df446a4c26ed12690468eac52647a69f188c38c7f7c103904e16dc1688fe8953e2b58487970ca3d86cd2867171ffefc0ecf6e850519faa5f7eebff160
-
Filesize
206B
MD53b0d48b8bb4ec9638c171508249f1e42
SHA1c4edd8cfb88e7a9c56ca74643365f819048e6b7c
SHA25620db3c4f85db6c03dcedb726cd8cf8eddb577578334d2d9d41c4f7e564595463
SHA512bbd10d1f952e394494aff32cbd4cfb7e074756c664f2839133c9eb65c2cca8ff9f1000318016316c52b586a0f871ca591654dde63842300dc9ad77dd48043071
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
206B
MD5f25d69e2cef1be6e55853a669069c77e
SHA1ab17f49e063fcda127757a140627209e0f6f5879
SHA2569a49579029ee286f3f72603db6f9e752a91833af044693dc0e219afbf41c4b7b
SHA512680a9b29c78a070c25697b1d23dfde09d391d6aaef34471b5dfe97c3112897e58bdcfb88bbd75259e11fd48fd4e75cd3936e79bff8904acefad4bc401a853f24
-
Filesize
206B
MD5368e17b9396000fd18c509433ec84242
SHA16cf3950acf422449cff7c3fe4f84cace67fa84d4
SHA25673f8e7f698ca90058946b37863fc2ff275ffe2be67d8e754e413839dd625653d
SHA51254d738ef19795f95dd35af21104dbc64634af9d73be2b40e9ec065a77d5738ccc5d2602502529158132e2637ee3015b4a6443ac250abbbffbf7c4c021004d3f2
-
Filesize
206B
MD507f5e4ed2eb9f83ace57517e67301160
SHA11dcd139e3bdd75e0cba3eb10a5af5cd7484cab45
SHA256690d758cee47ae5716b217b4b4dbba38866433d25aa5c6655e4679debc4c71cd
SHA51270c4bb636c3d42381211ddb7f88d2df31c13491623710a8bf90043a2d907e5b5964602643231c948cecdcf86ae1a140ff8bee3843f95fbcb72ef89815ddcef85
-
Filesize
206B
MD543f8ae902d2047259a9e81625e67f8e6
SHA133232298995dacd1a76c4385ce86f2c0ed7d1f45
SHA256f93123c75eb17cfacaec455bb5dbc60b90fb6b6953841750fa25405db3d86dc9
SHA512d3ab01d3ca5efd0726d12fafeab6afd7a66034d77bdeee99e0dac0136325d9c232f7aa6c25aca2d2b099b719ed024d72369134b605c883716a6288d43b3e2e6e
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478