Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 13:04
Behavioral task
behavioral1
Sample
JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe
-
Size
1.3MB
-
MD5
7118285af78dee239d39bc84ada97740
-
SHA1
df7c25ec4e9dd2b9dc97ddd0a4c35b586a4eb0b1
-
SHA256
aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36
-
SHA512
f8f4b5cdf3d98412e2074764bd003f09c30cdac2da733cf223c76317903df6c0c72dac0b79287cd64959773b77b535ccfb0ac3e977f32d7fdcc024f7c48ee119
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1128 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 592 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2032 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 2712 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2712 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000016dc0-9.dat dcrat behavioral1/memory/2908-13-0x0000000000D80000-0x0000000000E90000-memory.dmp dcrat behavioral1/memory/2628-73-0x0000000000300000-0x0000000000410000-memory.dmp dcrat behavioral1/memory/2372-132-0x0000000000E70000-0x0000000000F80000-memory.dmp dcrat behavioral1/memory/2124-192-0x0000000000290000-0x00000000003A0000-memory.dmp dcrat behavioral1/memory/324-252-0x0000000001080000-0x0000000001190000-memory.dmp dcrat behavioral1/memory/2988-312-0x0000000001100000-0x0000000001210000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1912 powershell.exe 2440 powershell.exe 1808 powershell.exe 2012 powershell.exe 1904 powershell.exe 832 powershell.exe 1632 powershell.exe -
Executes dropped EXE 10 IoCs
pid Process 2908 DllCommonsvc.exe 2628 conhost.exe 2372 conhost.exe 2124 conhost.exe 324 conhost.exe 2988 conhost.exe 2344 conhost.exe 1272 conhost.exe 2972 conhost.exe 3048 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2936 cmd.exe 2936 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 5 raw.githubusercontent.com 17 raw.githubusercontent.com 26 raw.githubusercontent.com 30 raw.githubusercontent.com 33 raw.githubusercontent.com 4 raw.githubusercontent.com 9 raw.githubusercontent.com 13 raw.githubusercontent.com 20 raw.githubusercontent.com 23 raw.githubusercontent.com -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe DllCommonsvc.exe File created C:\Program Files\Windows NT\TableTextService\ja-JP\69ddcba757bf72 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\101b941d020240 DllCommonsvc.exe File created C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\winlogon.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\cc11b995f2a76d DllCommonsvc.exe File created C:\Program Files\Windows Defender\ja-JP\cmd.exe DllCommonsvc.exe File created C:\Program Files\Windows Defender\ja-JP\ebf1f9fa8afd6d DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2200 schtasks.exe 2328 schtasks.exe 2620 schtasks.exe 1996 schtasks.exe 1740 schtasks.exe 2352 schtasks.exe 1888 schtasks.exe 592 schtasks.exe 2992 schtasks.exe 2032 schtasks.exe 3012 schtasks.exe 1612 schtasks.exe 316 schtasks.exe 2220 schtasks.exe 1128 schtasks.exe 2016 schtasks.exe 3028 schtasks.exe 1932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2908 DllCommonsvc.exe 2908 DllCommonsvc.exe 2908 DllCommonsvc.exe 1912 powershell.exe 1808 powershell.exe 2440 powershell.exe 832 powershell.exe 1632 powershell.exe 1904 powershell.exe 2012 powershell.exe 2628 conhost.exe 2372 conhost.exe 2124 conhost.exe 324 conhost.exe 2988 conhost.exe 2344 conhost.exe 1272 conhost.exe 2972 conhost.exe 3048 conhost.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2908 DllCommonsvc.exe Token: SeDebugPrivilege 1912 powershell.exe Token: SeDebugPrivilege 1808 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 832 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 2628 conhost.exe Token: SeDebugPrivilege 2372 conhost.exe Token: SeDebugPrivilege 2124 conhost.exe Token: SeDebugPrivilege 324 conhost.exe Token: SeDebugPrivilege 2988 conhost.exe Token: SeDebugPrivilege 2344 conhost.exe Token: SeDebugPrivilege 1272 conhost.exe Token: SeDebugPrivilege 2972 conhost.exe Token: SeDebugPrivilege 3048 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2800 2932 JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe 30 PID 2932 wrote to memory of 2800 2932 JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe 30 PID 2932 wrote to memory of 2800 2932 JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe 30 PID 2932 wrote to memory of 2800 2932 JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe 30 PID 2800 wrote to memory of 2936 2800 WScript.exe 31 PID 2800 wrote to memory of 2936 2800 WScript.exe 31 PID 2800 wrote to memory of 2936 2800 WScript.exe 31 PID 2800 wrote to memory of 2936 2800 WScript.exe 31 PID 2936 wrote to memory of 2908 2936 cmd.exe 33 PID 2936 wrote to memory of 2908 2936 cmd.exe 33 PID 2936 wrote to memory of 2908 2936 cmd.exe 33 PID 2936 wrote to memory of 2908 2936 cmd.exe 33 PID 2908 wrote to memory of 2012 2908 DllCommonsvc.exe 53 PID 2908 wrote to memory of 2012 2908 DllCommonsvc.exe 53 PID 2908 wrote to memory of 2012 2908 DllCommonsvc.exe 53 PID 2908 wrote to memory of 2440 2908 DllCommonsvc.exe 54 PID 2908 wrote to memory of 2440 2908 DllCommonsvc.exe 54 PID 2908 wrote to memory of 2440 2908 DllCommonsvc.exe 54 PID 2908 wrote to memory of 832 2908 DllCommonsvc.exe 55 PID 2908 wrote to memory of 832 2908 DllCommonsvc.exe 55 PID 2908 wrote to memory of 832 2908 DllCommonsvc.exe 55 PID 2908 wrote to memory of 1904 2908 DllCommonsvc.exe 56 PID 2908 wrote to memory of 1904 2908 DllCommonsvc.exe 56 PID 2908 wrote to memory of 1904 2908 DllCommonsvc.exe 56 PID 2908 wrote to memory of 1632 2908 DllCommonsvc.exe 59 PID 2908 wrote to memory of 1632 2908 DllCommonsvc.exe 59 PID 2908 wrote to memory of 1632 2908 DllCommonsvc.exe 59 PID 2908 wrote to memory of 1912 2908 DllCommonsvc.exe 60 PID 2908 wrote to memory of 1912 2908 DllCommonsvc.exe 60 PID 2908 wrote to memory of 1912 2908 DllCommonsvc.exe 60 PID 2908 wrote to memory of 1808 2908 DllCommonsvc.exe 61 PID 2908 wrote to memory of 1808 2908 DllCommonsvc.exe 61 PID 2908 wrote to memory of 1808 2908 DllCommonsvc.exe 61 PID 2908 wrote to memory of 2272 2908 DllCommonsvc.exe 67 PID 2908 wrote to memory of 2272 2908 DllCommonsvc.exe 67 PID 2908 wrote to memory of 2272 2908 DllCommonsvc.exe 67 PID 2272 wrote to memory of 924 2272 cmd.exe 69 PID 2272 wrote to memory of 924 2272 cmd.exe 69 PID 2272 wrote to memory of 924 2272 cmd.exe 69 PID 2272 wrote to memory of 2628 2272 cmd.exe 70 PID 2272 wrote to memory of 2628 2272 cmd.exe 70 PID 2272 wrote to memory of 2628 2272 cmd.exe 70 PID 2628 wrote to memory of 2000 2628 conhost.exe 72 PID 2628 wrote to memory of 2000 2628 conhost.exe 72 PID 2628 wrote to memory of 2000 2628 conhost.exe 72 PID 2000 wrote to memory of 2200 2000 cmd.exe 74 PID 2000 wrote to memory of 2200 2000 cmd.exe 74 PID 2000 wrote to memory of 2200 2000 cmd.exe 74 PID 2000 wrote to memory of 2372 2000 cmd.exe 75 PID 2000 wrote to memory of 2372 2000 cmd.exe 75 PID 2000 wrote to memory of 2372 2000 cmd.exe 75 PID 2372 wrote to memory of 580 2372 conhost.exe 76 PID 2372 wrote to memory of 580 2372 conhost.exe 76 PID 2372 wrote to memory of 580 2372 conhost.exe 76 PID 580 wrote to memory of 396 580 cmd.exe 78 PID 580 wrote to memory of 396 580 cmd.exe 78 PID 580 wrote to memory of 396 580 cmd.exe 78 PID 580 wrote to memory of 2124 580 cmd.exe 79 PID 580 wrote to memory of 2124 580 cmd.exe 79 PID 580 wrote to memory of 2124 580 cmd.exe 79 PID 2124 wrote to memory of 2428 2124 conhost.exe 80 PID 2124 wrote to memory of 2428 2124 conhost.exe 80 PID 2124 wrote to memory of 2428 2124 conhost.exe 80 PID 2428 wrote to memory of 1028 2428 cmd.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender\ja-JP\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Sdsu350QiF.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:924
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hfpeQ4JfvC.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2200
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VeFqpJq3BV.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:396
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TK13bru719.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:1028
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\syea0WjfTx.bat"13⤵PID:604
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2364
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x4tck5X09i.bat"15⤵PID:2784
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2288
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3Lxx1rvPQX.bat"17⤵PID:1312
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2284
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5cWoBfSAzl.bat"19⤵PID:1896
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:1992
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bbMo3XBCxD.bat"21⤵PID:1860
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2228
-
-
C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NiQtqM3qVs.bat"23⤵PID:2256
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\providercommon\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\ja-JP\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\ja-JP\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\ja-JP\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219f2a9fe8afcc1d31631b68a8066bf2
SHA1b4f047e0cfddcf000be79ecbf49c034493ad52f6
SHA256dbd4f90cf684a4b39e45e3d64d283ec91b88f696c59beca5e895552e782ca881
SHA5124cee674f8b7a3b0b9d6633f5782542a2a74bc02baad6b160ac941710491f83609c5a64bcd4e23b04af7c64fcb62b464a47d8bf6d983b2574ac4bdd2660c7c98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e216330793d0d44ed8cc91cef59a155d
SHA193c670288ad03ec48273500d2e48b01ca0c2db60
SHA2560d9d3789e7928dc8bb7c158a74c459dc0a2287342f2a74d65c29ed5c85668e6d
SHA5126414466d3076e914eca6f7a7679ed8370be00ff106aeaf26aa32ba27f357cf7104bf1325d86e601340dbbf7567bdd37c49acf5138d9588ec245a991d0266928b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d688ac632fe8c359dcc9ff98daa92990
SHA1fc0cc3510326131606519b126183633dea8f2af0
SHA2561e45ed38110382220cbeab5c95f63a227a125dbceefa54bb4922fb1af96569b5
SHA512e4b9624644e0f177f888bef4e8cfceee7f0886b45fcef0c273781d2f4cdcc3566f5aa2e99c7435c4ba02b23c18d543a6a0907f0956ad87be56eb25ae8a087e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91d006b0c503f43d7b0a42cac0cb7ac
SHA160f2cdb623a5f08cb555ffbb3d44a59333cc603b
SHA25688e91dbee7b0fe5c47150cc52bca382008fff0c0a26f2d65a9ad3f5e89b00151
SHA5128e0d6926db6d8efd5f350117c8a6498973560043e4ed1c66fd73ea711e0818c000bab866df9c38c7dd55ffd7c1136010c5a4e0d5d25c4936612e6842a14e7048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70359008519df18c6af798b6b8fb4a8
SHA11384105bd5e892bb0b05c8e062ebefeb22888002
SHA2565e0b3b7acca64adcfdb8bf729908f43dd4b48253a33256b18febb3057ff9917f
SHA512545284d192d7461ed113291411129be990289a34333f5769e88ebaf1f8756171be325bc81e178b34c649e4a19bd3e49125d50dc5896515896796f2acc741558b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535928963ce46f5d33d7f2ea72c22bc80
SHA1b0c7d106ae53f325f14fdddae20ba342bf1ba832
SHA2561d210d1a5978646ec5713a796176dff655bf270c38c315926d9f03940073c409
SHA5128a58ced7c4de0fecfeb3649b62a5f5d9a082ed6c21fdd398ba637f00a5db001e46c91198b97ee97e182b99f5992ad9360b15e7da2d66586244390d7fb32b86b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4676353dc76dd74fa050e9875aa51b1
SHA196d94f51423b7316429f85c2267d038878e5663b
SHA2560ea9b6738cd1ead576012d8de15c08095ea8066c869671aecc3349692759bf4f
SHA512199352c21f4a2191f110224042ed443a7332024fee66f986ba3b47a700e8bc1902618d6d00414e6375e546942decbfef9c15a75883d68d462c79acdd443c68a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c98cc6da81cf0160938a79d56d7bc2
SHA1e169a32694cd572adf48b1c5efa035951bf61894
SHA25639f45768dde77534019be7cfc9741566774ac2b7e6ddcd0408200975a73dd885
SHA512e83d8fa1a707d6dcbd0b0cc7b5c3c84f2b217ec07c583640d563d593474dabfd1ab02baf2e70ece9d5e4e07f231b8cc91c6491b9ffc827329e53fb918c0e4205
-
Filesize
225B
MD5ecc895602ea288d39261cc0d2c16f64a
SHA158870be17cdbc8db5f4c177157e44bf8600e1ad7
SHA25628f30250fc36ac52da1c64a89b68eff8d7f9fa6c279cbad9a7f395480809dab4
SHA512340468d1f1597ca83cc7cc3cd6969787f9ab1a70a7ff85978dd215b9db7be61674b2cd59700c943995b38645adf8e3776c169c421201a8a06bcf5a2b2ca245a6
-
Filesize
225B
MD5167993ee58562f29f9030554f3c5d505
SHA16b800bfd9efa6b35ba7c17a1de2648cba6ba40d0
SHA256a6a05926c2da5ae84d1506e1fa1599281c6ff2d65a3522345131bdc8bf7d6fbb
SHA5124bb2a091743cb39b609ff18ef30c78e0985e575da99d1faba886937dd08c65afa100eb1f687c0e830bdc8d21a9fd71c3bb311bf9ad957754941240307511d28f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
225B
MD50b7f067749802c901a1ea608d98372a3
SHA1756b2c64faeaaf33937d054855258e8cd95ac2b3
SHA2566dbbaf02fb82826309b9821645a0d2ca6e17304a98b1b4cca79c69da26448d91
SHA512a1c7ceab157b2f1879e6b2a67746191ef0f9a27010e078d058a6499ad5c40e12c7e355f9b5a2f3eba0d198b3ca42f3321071c5823e2304cf600120215d8512a8
-
Filesize
225B
MD5d339fd81b6b0b3c10e8830381a533a6d
SHA10b72eaa0fb1c679fcef795bc51258b502a88d597
SHA256eacbe6ab227e52c0df82444c1659558764e0b940f3b9dcd2036363659607c734
SHA512672df2c64b4988da3c0ca3d68b43508228a6c999c714825201ba0c2d72e95180ef9a4447ecda3303976cad47693d6193e5973aa9b3526992a3e5d20571ad8558
-
Filesize
225B
MD542f3799d2e240fc04ffde86144744be6
SHA1d358ea1fdae4276997c4cad56f7731fb04288ecf
SHA2563c2433dbcbe04f01100cc3731fe117e5758c6f86adbb2e7fa13029db46eebc0c
SHA512f0b75b7191f01cf0e5eebd796d7315455f1e2340c5a5037b33aac082e1086a4470a995a2849de42d080ce46246c4cd33035d80ccef1153a70abddd0cbee85468
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
225B
MD5ae211cc1eac2f6cd7820e183fffd3383
SHA1dca306dc037c97be9e558423ecee72e4845c9b94
SHA256d01c1c790db52199a1ebc4ccb8622b1ac230ffd23dcd50fa3f251e3c88b7a323
SHA51260536bc9bb7d2d38d85e51f36dd72ac4918c8ae7c5fae61a64b59cfa0d1018e1b331c0c93d6b84ae71ace2ae75510a636ddd45428c655fe5eaa9501d8b958a19
-
Filesize
225B
MD57c0c557d755016c8b80d05de578a73d1
SHA192776c7ce2220b92794fe3f406b550a15b36383d
SHA2563d8c5ac9c2c417a45cfb25e4b2a7ddb127c9eb3fceee882d8a0bec4bd5abaa76
SHA5121da2565155b5b748337f8e6024a3042968e29fd1285d5617a3bbb57e87c55e57beb19b9e0e63433792421db7cc76743c31c7ff6df10a3fcaf7bed59d55e70d9c
-
Filesize
225B
MD59d7e954ac16a4e297f20daf4198cf2f4
SHA1d259c578473e5cefe3fbfe4f83de8844a6b25914
SHA25657116e31e2a19060b73931a856fcbe7069cac90521f919e8f83159fbee3928dc
SHA512db106664846c7d17c44896096ff9ad2f0441f35be275da1d21b16a0b1abeaf0cf3dfbe05a9368e94840d77168a14fa05f8e35f64d56828b746ffe7c30012e31a
-
Filesize
225B
MD5a72099013825d16e66194892aaa54631
SHA1c63e93eda750648a4c906313aca4fe624a50d05d
SHA256f4ed4fef232e1e03de14a7939ad8db1bf0b801d1e660993919a787cb7acb83c2
SHA512eca769661db1fe584bbf976f908cb47dcbe0c5cbdf3f59c04bb6854f034fcdf9d9ae6ff0965645e76fc64d50821773c8782d0d5d140d542a2d9ac6f7d8596c14
-
Filesize
225B
MD54f3933c4b512ede05d182202015b6265
SHA1586e883a6f2d2d140cbd210089eaf6854f67ca3a
SHA2565dc2277e4be3cb38677a446b1c47b692fc760755e32b24fdb29c6b921aa58dca
SHA512020a7cd81c8fd760914483654117a70eaf763d8aebcc5675ace0a21bf6568c5155aa86c877a009ece51b74f197ff7dc40c282c31d3bca5a612adf11d3cc74736
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ee2e146cb15b9c7944f35ea668bdc1d2
SHA13121fab55e293f8e6ec3dab79a5aacd1802eb874
SHA256f50d28cf53abf9048e4f4dead4d01190cdca88e30f9a87b0311203dd50956603
SHA512a1b7a85c6384c5e056738d298fe6240802e04c305fb73d35ecbf71af6cce357d56cbbca90349d4419ce18c670de6d1d69470e3526aa6d5b4df5bd57e79cc87b3
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394