Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 19:22
Behavioral task
behavioral1
Sample
JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe
-
Size
1.3MB
-
MD5
929a44bdac708fcdeba341d2b0ae8574
-
SHA1
7ce5208efbe594b8a07704e31851f88f851e8627
-
SHA256
981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2
-
SHA512
4ddd9c58636418a6be4e2a4436bd539ebfe50d688ca7c4ad5653b08003787e8fd18ac697323caad6aab74ec897550c6bc2bf566391a9c6f3b694d5fb99cf837d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4740 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3700 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4112 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 264 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 4228 schtasks.exe 86 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 4228 schtasks.exe 86 -
resource yara_rule behavioral2/files/0x000a000000023b96-10.dat dcrat behavioral2/memory/4660-13-0x0000000000570000-0x0000000000680000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2176 powershell.exe 4344 powershell.exe 4324 powershell.exe 212 powershell.exe 2992 powershell.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation spoolsv.exe -
Executes dropped EXE 15 IoCs
pid Process 4660 DllCommonsvc.exe 244 spoolsv.exe 2188 spoolsv.exe 3204 spoolsv.exe 944 spoolsv.exe 692 spoolsv.exe 384 spoolsv.exe 1688 spoolsv.exe 3808 spoolsv.exe 4288 spoolsv.exe 3576 spoolsv.exe 3312 spoolsv.exe 2536 spoolsv.exe 4008 spoolsv.exe 2844 spoolsv.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 15 raw.githubusercontent.com 17 raw.githubusercontent.com 18 raw.githubusercontent.com 41 raw.githubusercontent.com 47 raw.githubusercontent.com 51 raw.githubusercontent.com 55 raw.githubusercontent.com 14 raw.githubusercontent.com 53 raw.githubusercontent.com 38 raw.githubusercontent.com 44 raw.githubusercontent.com 46 raw.githubusercontent.com 54 raw.githubusercontent.com 56 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4752 schtasks.exe 2008 schtasks.exe 2544 schtasks.exe 4896 schtasks.exe 3700 schtasks.exe 1792 schtasks.exe 4112 schtasks.exe 1324 schtasks.exe 4740 schtasks.exe 3552 schtasks.exe 2764 schtasks.exe 264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4660 DllCommonsvc.exe 4660 DllCommonsvc.exe 4660 DllCommonsvc.exe 2992 powershell.exe 4344 powershell.exe 212 powershell.exe 2176 powershell.exe 4324 powershell.exe 212 powershell.exe 2992 powershell.exe 2176 powershell.exe 4344 powershell.exe 244 spoolsv.exe 4324 powershell.exe 2188 spoolsv.exe 3204 spoolsv.exe 944 spoolsv.exe 692 spoolsv.exe 384 spoolsv.exe 1688 spoolsv.exe 3808 spoolsv.exe 4288 spoolsv.exe 3576 spoolsv.exe 3312 spoolsv.exe 2536 spoolsv.exe 4008 spoolsv.exe 2844 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 4660 DllCommonsvc.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeDebugPrivilege 4344 powershell.exe Token: SeDebugPrivilege 212 powershell.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 244 spoolsv.exe Token: SeDebugPrivilege 4324 powershell.exe Token: SeDebugPrivilege 2188 spoolsv.exe Token: SeDebugPrivilege 3204 spoolsv.exe Token: SeDebugPrivilege 944 spoolsv.exe Token: SeDebugPrivilege 692 spoolsv.exe Token: SeDebugPrivilege 384 spoolsv.exe Token: SeDebugPrivilege 1688 spoolsv.exe Token: SeDebugPrivilege 3808 spoolsv.exe Token: SeDebugPrivilege 4288 spoolsv.exe Token: SeDebugPrivilege 3576 spoolsv.exe Token: SeDebugPrivilege 3312 spoolsv.exe Token: SeDebugPrivilege 2536 spoolsv.exe Token: SeDebugPrivilege 4008 spoolsv.exe Token: SeDebugPrivilege 2844 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 2608 792 JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe 82 PID 792 wrote to memory of 2608 792 JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe 82 PID 792 wrote to memory of 2608 792 JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe 82 PID 2608 wrote to memory of 3756 2608 WScript.exe 83 PID 2608 wrote to memory of 3756 2608 WScript.exe 83 PID 2608 wrote to memory of 3756 2608 WScript.exe 83 PID 3756 wrote to memory of 4660 3756 cmd.exe 85 PID 3756 wrote to memory of 4660 3756 cmd.exe 85 PID 4660 wrote to memory of 4324 4660 DllCommonsvc.exe 99 PID 4660 wrote to memory of 4324 4660 DllCommonsvc.exe 99 PID 4660 wrote to memory of 212 4660 DllCommonsvc.exe 100 PID 4660 wrote to memory of 212 4660 DllCommonsvc.exe 100 PID 4660 wrote to memory of 4344 4660 DllCommonsvc.exe 101 PID 4660 wrote to memory of 4344 4660 DllCommonsvc.exe 101 PID 4660 wrote to memory of 2176 4660 DllCommonsvc.exe 102 PID 4660 wrote to memory of 2176 4660 DllCommonsvc.exe 102 PID 4660 wrote to memory of 2992 4660 DllCommonsvc.exe 103 PID 4660 wrote to memory of 2992 4660 DllCommonsvc.exe 103 PID 4660 wrote to memory of 244 4660 DllCommonsvc.exe 108 PID 4660 wrote to memory of 244 4660 DllCommonsvc.exe 108 PID 244 wrote to memory of 3296 244 spoolsv.exe 110 PID 244 wrote to memory of 3296 244 spoolsv.exe 110 PID 3296 wrote to memory of 3416 3296 cmd.exe 112 PID 3296 wrote to memory of 3416 3296 cmd.exe 112 PID 3296 wrote to memory of 2188 3296 cmd.exe 113 PID 3296 wrote to memory of 2188 3296 cmd.exe 113 PID 2188 wrote to memory of 1540 2188 spoolsv.exe 114 PID 2188 wrote to memory of 1540 2188 spoolsv.exe 114 PID 1540 wrote to memory of 1212 1540 cmd.exe 116 PID 1540 wrote to memory of 1212 1540 cmd.exe 116 PID 1540 wrote to memory of 3204 1540 cmd.exe 117 PID 1540 wrote to memory of 3204 1540 cmd.exe 117 PID 3204 wrote to memory of 4308 3204 spoolsv.exe 118 PID 3204 wrote to memory of 4308 3204 spoolsv.exe 118 PID 4308 wrote to memory of 2988 4308 cmd.exe 120 PID 4308 wrote to memory of 2988 4308 cmd.exe 120 PID 4308 wrote to memory of 944 4308 cmd.exe 125 PID 4308 wrote to memory of 944 4308 cmd.exe 125 PID 944 wrote to memory of 348 944 spoolsv.exe 129 PID 944 wrote to memory of 348 944 spoolsv.exe 129 PID 348 wrote to memory of 1784 348 cmd.exe 131 PID 348 wrote to memory of 1784 348 cmd.exe 131 PID 348 wrote to memory of 692 348 cmd.exe 132 PID 348 wrote to memory of 692 348 cmd.exe 132 PID 692 wrote to memory of 2352 692 spoolsv.exe 133 PID 692 wrote to memory of 2352 692 spoolsv.exe 133 PID 2352 wrote to memory of 2884 2352 cmd.exe 135 PID 2352 wrote to memory of 2884 2352 cmd.exe 135 PID 2352 wrote to memory of 384 2352 cmd.exe 136 PID 2352 wrote to memory of 384 2352 cmd.exe 136 PID 384 wrote to memory of 1156 384 spoolsv.exe 137 PID 384 wrote to memory of 1156 384 spoolsv.exe 137 PID 1156 wrote to memory of 4324 1156 cmd.exe 139 PID 1156 wrote to memory of 4324 1156 cmd.exe 139 PID 1156 wrote to memory of 1688 1156 cmd.exe 140 PID 1156 wrote to memory of 1688 1156 cmd.exe 140 PID 1688 wrote to memory of 3652 1688 spoolsv.exe 141 PID 1688 wrote to memory of 3652 1688 spoolsv.exe 141 PID 3652 wrote to memory of 3616 3652 cmd.exe 143 PID 3652 wrote to memory of 3616 3652 cmd.exe 143 PID 3652 wrote to memory of 3808 3652 cmd.exe 144 PID 3652 wrote to memory of 3808 3652 cmd.exe 144 PID 3808 wrote to memory of 2272 3808 spoolsv.exe 145 PID 3808 wrote to memory of 2272 3808 spoolsv.exe 145 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9gHfnS8a2p.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3416
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1212
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\00vfQAbtTV.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2988
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FdUsM3mSuD.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1784
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QOz0umrEhM.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2884
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VG36Hwy0Lv.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:4324
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZES4mQr7Bk.bat"18⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:3616
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2wxi7FenmH.bat"20⤵PID:2272
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:4056
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aJcBxrOCPY.bat"22⤵PID:2968
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:556
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iIDKKqsGny.bat"24⤵PID:2604
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:944
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x4tck5X09i.bat"26⤵PID:2504
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:408
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cU7BGbiaqd.bat"28⤵PID:2496
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:2036
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dFeEewS5jL.bat"30⤵PID:4828
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:3592
-
-
C:\Recovery\WindowsRE\spoolsv.exe"C:\Recovery\WindowsRE\spoolsv.exe"31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\providercommon\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\providercommon\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\providercommon\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
198B
MD52a253cc77f70b42be9d69ea89c470071
SHA137f94764248f3899aa53e450c064c02a1070586f
SHA2568d811a269590675b86ebab2c7e5b00f76216934a9c4061b199f2a6eec1155be1
SHA512ce3ff9fc6fd377ef301185fed64e72c5371131ee2d0fd1d3fa80b5e980a9540fc0f95b7ac6112ca49e3b7f29d75dbda08aa8c6c66293c8beadad02c626e9b955
-
Filesize
198B
MD58889b96c79e07ae5a582268f82e7f136
SHA1644b14123f0a15253b93e49b893fc3e76e991330
SHA256f12060839243c9d7ac139027c1c5a7bfc86a14475442ed91e2947b2c0c32e6a7
SHA51227e226c5a59161aa86bb14f7003600d76717855e481954da219f977b62aa5917d8d7bf2d9f8653f2cfadf199e43fdabaf35922aada2e5d0bc74b6e3d4558c3fa
-
Filesize
198B
MD5325a795191daf24c6df63e95c7ceab19
SHA16a050fdfec2223910a8ef9a5082cdda998c61e6b
SHA256c67d04ed80a9b9a58515aa3c375ae2a34d95696dec2e693d86aa422508f4bd9c
SHA5127032ff62632bb08f9a35e554a4c3cd584d6534b137a21d68031ad9057288582b65773bc50e16788cca390dab2f99e6353cf0010cd864a34c907390a0216387b1
-
Filesize
198B
MD50a06d3a15c70e6aa068b4b3d4af6e40e
SHA10856ca80054d098da285aca2070b28fa420a3437
SHA256c810665704d3757be003b94407651eb654c821404a88b09957e10e5040c9bdd3
SHA512f06cec105261d388373f1e4a6529a627b9fd0d5281158c2d345f584498192da5641345892ff8cc2203092f3c14c3420d6381674ef2c6eb14f2bfa719dec3ef1a
-
Filesize
198B
MD5f2d0188db1fda5d7a058a4f81270a5d8
SHA1bd22e53dd78da175f3a22064ec27ec4f43b99c3e
SHA25650279b441bdaf2f88209a2f21d5c8d458d9e62859bcd69a6a8fe56634cfd7757
SHA512349269dc0747a6161820e4a862cd39e1e27d25ed76f17dbd2677b7ba4f1814759b17583aca3f5f5386b4b901274387b37f7a6d10c3476662c05779a560bccace
-
Filesize
198B
MD5fd6475db6be06435b5741cca3d5b1208
SHA1b8d2ee6d60b0ffca3d86458be6df6f0eb83dfa06
SHA2564dc732ef43433368297b936c3090aeb6891e4eaf277c7fe83f968cb1fd168b3c
SHA5129e8e438bc0116e1d383e335540406c30b2163306381a34db4bc092ea5d0fbe86bbc8f627f370c96335ebb9bc0252411c2c16a1a702fce02f450ba0ca47431955
-
Filesize
198B
MD50032b4c020488674b51853eb9a1368cb
SHA17b8a09c89731c98476d480671517e1496d57cc0f
SHA2566f82aa29c3bfc71a8ce6d6268a6cbe90b7030948b18dabb45c1d06f939cd1162
SHA5121ba67d7e686fa412ad81dea0353160ea7a55ba4c1449ad79f8e3612dc1659ca5fb589679a05434eb6a7bc969924e14848d198dea9bfd702918410bf1870dd9c9
-
Filesize
198B
MD55d5fa734f2fb10eade44bbb0877794ba
SHA16c2fd10ef9530061741b7ce4ecc0433035ed4510
SHA2566248e7d570c448b9ce7db6b28b6e7cf90502e27040d15f14ad3a575f0f316fbb
SHA5124fc5a1d27eb987ed60afe8fad0e61e7e079f1a6c1fdc0ead2d36aea3591b8e91257a9cd06fa0a46839da86425616dfbb8f859ad5565d60b9299271e776dc1a80
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
198B
MD52d3b82ca4affbe659af64b1aaa644260
SHA1f7c2dcce31a7608ee5573577c6f585a224814acc
SHA256866111ecbcd2f01a7840e5c682d3337f8ec474b9b31af5bc33332a7e3e61e81d
SHA51296073e0dfefa457a66af9091de4ed46b1908d8c0e0d113fe232ab0b1c41698810d5a31a22c0c48a339b92a97d30976d827d23ccc16fba6177101eaaf2d2cc875
-
Filesize
198B
MD5bf10f2a79650d9e6bac9c537a36047d4
SHA1ee116b7f3b3a6474851b4ddd0ab8dd508718846d
SHA256d60cbc1d05d6fc6d0acd916579938ee0af942151f6fcb88b8c04e17a3243538b
SHA51218480830533ec7d466f6feb990fb922565832a597428b365516ec53152d35e704d432955d0daa76e6f22e7daa66bf40227a42ede2ccec07bc3fc6e34cb40f402
-
Filesize
198B
MD5cd49efca3d474d454852df784a7845bd
SHA1d0876efce10f4e798cdc9dbdf17fe9dcf8900692
SHA2566281c5d77f89a522162468ca197290621a3c580d4a4397c50b9709896b9ba087
SHA5128ef3171cd727dfa7bf3625a63429637f3bf993b57e716144d09e3acae00e6205e5a7179e918e1b351df2f8689799d9d09c29d26d49832f458449de8394b0c350
-
Filesize
198B
MD50ac550ba68ab5d5d23b4316effd11529
SHA11e41b2d5c4c269eb1cf27be792035fbcb59b1769
SHA2561ae05131a743a6317d17a6f5cef37af5dda563ebd668aa3c1b44cbe1029abe52
SHA512d74a09792ccde251866df36f2f42ebc6e8adac52015c7f3827d26ffa44cbde28381bd33d4360cc4c10c2127d7945cf29ffc3a1648c369510b4e244cc60dc7d5e
-
Filesize
198B
MD5332e49de83ed936cbae9511ecf2809b0
SHA1dc230979d3f348eb27ec6a958b66604a06e053c4
SHA2566cdcba6c8ca7a763c60c0e6ba9f0af4ca5a1ea56c8844692ddfa36f189d1a6ba
SHA512aaa9fef2105920e1e33ca1a9e4c672e8e301582828bac0a8a320262264e602c5500b4d28fdbd7056bb3a0b961c354e96d6014eb738a236662b5a6cbef7fa8d16
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478