Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2024, 13:26
Behavioral task
behavioral1
Sample
JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe
-
Size
1.3MB
-
MD5
e58d57a99b94073f53a65b4daccb4bdf
-
SHA1
a71dd67fcb52e302d1c8c1ef7921d920e025c052
-
SHA256
27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b
-
SHA512
cce7e526e2aea3564f4ade20981a010856d4686f9350a9a79de02b5b053e44dfd0730f4324c7f052f37c8265042468de695893920205db20e7161183ab62d88d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3624 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1572 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4012 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4816 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4328 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3684 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4696 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 424 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 388 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3280 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4000 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4044 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3524 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3672 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3392 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4404 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 4088 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 4088 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x0007000000023c9f-10.dat dcrat behavioral2/memory/1560-13-0x0000000000010000-0x0000000000120000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4452 powershell.exe 4488 powershell.exe 1068 powershell.exe 5092 powershell.exe 1832 powershell.exe 376 powershell.exe 2300 powershell.exe 4120 powershell.exe 4152 powershell.exe 4440 powershell.exe 1256 powershell.exe 2208 powershell.exe 1880 powershell.exe 3536 powershell.exe 4544 powershell.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation conhost.exe -
Executes dropped EXE 14 IoCs
pid Process 1560 DllCommonsvc.exe 1964 conhost.exe 1456 conhost.exe 396 conhost.exe 3932 conhost.exe 2192 conhost.exe 2616 conhost.exe 2140 conhost.exe 4596 conhost.exe 2640 conhost.exe 3120 conhost.exe 1604 conhost.exe 1116 conhost.exe 216 conhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 24 raw.githubusercontent.com 50 raw.githubusercontent.com 52 raw.githubusercontent.com 51 raw.githubusercontent.com 54 raw.githubusercontent.com 16 raw.githubusercontent.com 38 raw.githubusercontent.com 39 raw.githubusercontent.com 53 raw.githubusercontent.com 17 raw.githubusercontent.com 40 raw.githubusercontent.com 43 raw.githubusercontent.com 44 raw.githubusercontent.com 45 raw.githubusercontent.com -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Office16\sihost.exe DllCommonsvc.exe File created C:\Program Files\Microsoft Office\Office16\66fc9ff0ee96c2 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\Idle.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\6ccacd8608530f DllCommonsvc.exe File created C:\Program Files\dotnet\csrss.exe DllCommonsvc.exe File created C:\Program Files\dotnet\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\fontdrvhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\5b884080fd4f94 DllCommonsvc.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\apppatch\AppPatch64\explorer.exe DllCommonsvc.exe File created C:\Windows\apppatch\AppPatch64\7a0fd90576e088 DllCommonsvc.exe File created C:\Windows\fr-FR\sysmon.exe DllCommonsvc.exe File created C:\Windows\fr-FR\121e5b5079f7c0 DllCommonsvc.exe File created C:\Windows\InputMethod\CHS\wininit.exe DllCommonsvc.exe File created C:\Windows\InputMethod\CHS\56085415360792 DllCommonsvc.exe File created C:\Windows\en-US\conhost.exe DllCommonsvc.exe File created C:\Windows\en-US\088424020bedd6 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings conhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3660 schtasks.exe 3024 schtasks.exe 3968 schtasks.exe 1376 schtasks.exe 1444 schtasks.exe 2552 schtasks.exe 4872 schtasks.exe 424 schtasks.exe 2044 schtasks.exe 2852 schtasks.exe 1232 schtasks.exe 2984 schtasks.exe 4044 schtasks.exe 1684 schtasks.exe 2272 schtasks.exe 1328 schtasks.exe 3648 schtasks.exe 4696 schtasks.exe 2288 schtasks.exe 4812 schtasks.exe 3624 schtasks.exe 4328 schtasks.exe 388 schtasks.exe 1660 schtasks.exe 5076 schtasks.exe 1572 schtasks.exe 3052 schtasks.exe 3020 schtasks.exe 3280 schtasks.exe 3524 schtasks.exe 3672 schtasks.exe 1604 schtasks.exe 2748 schtasks.exe 4816 schtasks.exe 3684 schtasks.exe 4000 schtasks.exe 3392 schtasks.exe 4012 schtasks.exe 3064 schtasks.exe 4604 schtasks.exe 4404 schtasks.exe 1516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 1560 DllCommonsvc.exe 376 powershell.exe 376 powershell.exe 1068 powershell.exe 1068 powershell.exe 4488 powershell.exe 4488 powershell.exe 4440 powershell.exe 4440 powershell.exe 4452 powershell.exe 4452 powershell.exe 4120 powershell.exe 4120 powershell.exe 2208 powershell.exe 2208 powershell.exe 1256 powershell.exe 1256 powershell.exe 5092 powershell.exe 5092 powershell.exe 1832 powershell.exe 1832 powershell.exe 2300 powershell.exe 2300 powershell.exe 4544 powershell.exe 4544 powershell.exe 4120 powershell.exe 3536 powershell.exe 3536 powershell.exe 4152 powershell.exe 4152 powershell.exe 1880 powershell.exe 1880 powershell.exe 1964 conhost.exe 1964 conhost.exe 4152 powershell.exe 376 powershell.exe 5092 powershell.exe 1068 powershell.exe 4440 powershell.exe 4488 powershell.exe 1832 powershell.exe 1256 powershell.exe 2300 powershell.exe 4544 powershell.exe 2208 powershell.exe 3536 powershell.exe 4452 powershell.exe 1880 powershell.exe 1456 conhost.exe 396 conhost.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 1560 DllCommonsvc.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeDebugPrivilege 4488 powershell.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeDebugPrivilege 4152 powershell.exe Token: SeDebugPrivilege 3536 powershell.exe Token: SeDebugPrivilege 4440 powershell.exe Token: SeDebugPrivilege 4120 powershell.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 1964 conhost.exe Token: SeDebugPrivilege 2300 powershell.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 1456 conhost.exe Token: SeDebugPrivilege 396 conhost.exe Token: SeDebugPrivilege 3932 conhost.exe Token: SeDebugPrivilege 2192 conhost.exe Token: SeDebugPrivilege 2616 conhost.exe Token: SeDebugPrivilege 2140 conhost.exe Token: SeDebugPrivilege 4596 conhost.exe Token: SeDebugPrivilege 2640 conhost.exe Token: SeDebugPrivilege 3120 conhost.exe Token: SeDebugPrivilege 1604 conhost.exe Token: SeDebugPrivilege 1116 conhost.exe Token: SeDebugPrivilege 216 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1100 2012 JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe 83 PID 2012 wrote to memory of 1100 2012 JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe 83 PID 2012 wrote to memory of 1100 2012 JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe 83 PID 1100 wrote to memory of 4848 1100 WScript.exe 85 PID 1100 wrote to memory of 4848 1100 WScript.exe 85 PID 1100 wrote to memory of 4848 1100 WScript.exe 85 PID 4848 wrote to memory of 1560 4848 cmd.exe 87 PID 4848 wrote to memory of 1560 4848 cmd.exe 87 PID 1560 wrote to memory of 4440 1560 DllCommonsvc.exe 132 PID 1560 wrote to memory of 4440 1560 DllCommonsvc.exe 132 PID 1560 wrote to memory of 2208 1560 DllCommonsvc.exe 133 PID 1560 wrote to memory of 2208 1560 DllCommonsvc.exe 133 PID 1560 wrote to memory of 1256 1560 DllCommonsvc.exe 134 PID 1560 wrote to memory of 1256 1560 DllCommonsvc.exe 134 PID 1560 wrote to memory of 1880 1560 DllCommonsvc.exe 135 PID 1560 wrote to memory of 1880 1560 DllCommonsvc.exe 135 PID 1560 wrote to memory of 1832 1560 DllCommonsvc.exe 136 PID 1560 wrote to memory of 1832 1560 DllCommonsvc.exe 136 PID 1560 wrote to memory of 376 1560 DllCommonsvc.exe 137 PID 1560 wrote to memory of 376 1560 DllCommonsvc.exe 137 PID 1560 wrote to memory of 4452 1560 DllCommonsvc.exe 138 PID 1560 wrote to memory of 4452 1560 DllCommonsvc.exe 138 PID 1560 wrote to memory of 3536 1560 DllCommonsvc.exe 139 PID 1560 wrote to memory of 3536 1560 DllCommonsvc.exe 139 PID 1560 wrote to memory of 4488 1560 DllCommonsvc.exe 140 PID 1560 wrote to memory of 4488 1560 DllCommonsvc.exe 140 PID 1560 wrote to memory of 2300 1560 DllCommonsvc.exe 141 PID 1560 wrote to memory of 2300 1560 DllCommonsvc.exe 141 PID 1560 wrote to memory of 4120 1560 DllCommonsvc.exe 142 PID 1560 wrote to memory of 4120 1560 DllCommonsvc.exe 142 PID 1560 wrote to memory of 4152 1560 DllCommonsvc.exe 143 PID 1560 wrote to memory of 4152 1560 DllCommonsvc.exe 143 PID 1560 wrote to memory of 4544 1560 DllCommonsvc.exe 144 PID 1560 wrote to memory of 4544 1560 DllCommonsvc.exe 144 PID 1560 wrote to memory of 1068 1560 DllCommonsvc.exe 145 PID 1560 wrote to memory of 1068 1560 DllCommonsvc.exe 145 PID 1560 wrote to memory of 5092 1560 DllCommonsvc.exe 146 PID 1560 wrote to memory of 5092 1560 DllCommonsvc.exe 146 PID 1560 wrote to memory of 1964 1560 DllCommonsvc.exe 161 PID 1560 wrote to memory of 1964 1560 DllCommonsvc.exe 161 PID 1964 wrote to memory of 1320 1964 conhost.exe 170 PID 1964 wrote to memory of 1320 1964 conhost.exe 170 PID 1320 wrote to memory of 4132 1320 cmd.exe 172 PID 1320 wrote to memory of 4132 1320 cmd.exe 172 PID 1320 wrote to memory of 1456 1320 cmd.exe 178 PID 1320 wrote to memory of 1456 1320 cmd.exe 178 PID 1456 wrote to memory of 3412 1456 conhost.exe 180 PID 1456 wrote to memory of 3412 1456 conhost.exe 180 PID 3412 wrote to memory of 4596 3412 cmd.exe 182 PID 3412 wrote to memory of 4596 3412 cmd.exe 182 PID 3412 wrote to memory of 396 3412 cmd.exe 187 PID 3412 wrote to memory of 396 3412 cmd.exe 187 PID 396 wrote to memory of 4416 396 conhost.exe 189 PID 396 wrote to memory of 4416 396 conhost.exe 189 PID 4416 wrote to memory of 2708 4416 cmd.exe 191 PID 4416 wrote to memory of 2708 4416 cmd.exe 191 PID 4416 wrote to memory of 3932 4416 cmd.exe 193 PID 4416 wrote to memory of 3932 4416 cmd.exe 193 PID 3932 wrote to memory of 424 3932 conhost.exe 195 PID 3932 wrote to memory of 424 3932 conhost.exe 195 PID 424 wrote to memory of 3864 424 cmd.exe 197 PID 424 wrote to memory of 3864 424 cmd.exe 197 PID 424 wrote to memory of 2192 424 cmd.exe 199 PID 424 wrote to memory of 2192 424 cmd.exe 199 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27c19559712c6e96c0428aed6bc861c558de8e151b3e04533f3f0ce35fee972b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\Registry.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\InputMethod\CHS\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\en-US\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\upfc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\taskhostw.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\apppatch\AppPatch64\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\dotnet\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\fontdrvhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\fr-FR\sysmon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Start Menu\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\Office16\sihost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VAhDAdBh8f.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4132
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ELd0wzhjGt.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:4596
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\i0MStmnXAe.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2708
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GW80Ek08hx.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:3864
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HHf3c4kdaf.bat"14⤵PID:1444
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:4916
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8YXrskW4JY.bat"16⤵PID:1108
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:3792
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2140 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XErLL4imMU.bat"18⤵PID:804
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:1044
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\j5VZ5DKdOS.bat"20⤵PID:4324
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:3384
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\L9j9zErPDE.bat"22⤵PID:2152
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2972
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3120 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3jGxsc69Nm.bat"24⤵PID:4788
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:2308
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ISA3vp411k.bat"26⤵PID:3792
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:1888
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\owZfSNRP11.bat"28⤵PID:664
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:5108
-
-
C:\Windows\en-US\conhost.exe"C:\Windows\en-US\conhost.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X5jGqiFaSS.bat"30⤵PID:4572
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:4404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Windows\InputMethod\CHS\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\InputMethod\CHS\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\InputMethod\CHS\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Windows\en-US\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Windows\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Windows\apppatch\AppPatch64\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\apppatch\AppPatch64\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\apppatch\AppPatch64\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\providercommon\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\dotnet\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\dotnet\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\dotnet\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Windows\fr-FR\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\fr-FR\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Windows\fr-FR\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Start Menu\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Start Menu\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Start Menu\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\Office16\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office16\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Office16\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
Filesize
193B
MD5a05ba2bf63c1d4b09358f3db83ab8338
SHA190f6ac123070dff5271d9b44a1a6fd355b0187a0
SHA256d4aa0c510174940b86e37c0239f5e70899648070a055abcdd8a0c8a621eea55e
SHA512e3fc9cd0abf5b7e8e0ae3e3adc408b4e80a5b96e9335b12e4fb973da75ea25540094971fe98e1be9fdbf1f50a37e916979b0e3978761653766d20adf7471ba89
-
Filesize
193B
MD574ac5a566728b082b0f3dbcc179d2735
SHA1849c72e3233a5e37aaf3ac86cd0bc59d164987a1
SHA256972699d7bed74d83a4301511dcd004bf51d7d6db112e98dd5826e93853c0d81d
SHA5129decb9ba928a67206f832b18c434dd0e749b8f2497dee5c2f08c71206bd2d1fa9a13165d44e30009d2685ed81c2cd732882284511402f4814f68b39bb2361cdc
-
Filesize
193B
MD550fa9d07d3eea1b4a2f2fea49cc20495
SHA1ffbfac5cda21ce155587ea1145373f95339e2f00
SHA256067453e8e3e75eaf2aa7a589afd905c6e676c5f9d66cd9c24005b260763d17b4
SHA512f8bbcc031811713f07d33ca1904e8e8155fb8a65a69e0e67368f5908069adcf37c9bad7e33b98bd92c35d6013f8339e52b301477f74c66e8a7972d58158fc471
-
Filesize
193B
MD5265f6bb97c24f4f97bdf36f11b4da429
SHA16e49536fd5b4e370fc664f1a99c762081ef38fd0
SHA256a2d2220c98cda50165bc2f8bd2fc33fd0dc0729c919f457eac8426854ebae14f
SHA5126fea4ade6ce313a9e09cd60a724c43df0b282a32c5ab8c3c25955e6a2078fab57847df6a0c473e027332e986c6cb652cf97fb9d387e1d61aaaf883f6070a2559
-
Filesize
193B
MD5d66baa6847760708c7985c2f5530cca0
SHA1660945a8333ccda6be78243eff8559b6a7ab6a4e
SHA256062f7622884418b11417bd69b5ff7a577cc6353df3431d546a223d4a334856b5
SHA51235695a6ee88580d9db17be5d8e518e2612cda04249e053ae93d68d6dc3f1440c36028dc4b0345494630dbccaeb9cb27370586761aa085bbf5a1dffb2b4159ac0
-
Filesize
193B
MD5311eb1dc8022afd3a164c4be7c2b00b0
SHA176f9cf8082a1b751d2c27d17b9f56b2df9a240d5
SHA256d2d39bec4d85d9fe054093688f1879a0a756824d7e863d3d3000193cd5175084
SHA5127b31cc8717e2ae92f5ab04374846956aaf8245ed1909d3a874cf873dbfcaa4ad3735ba83a80713729d8e4706d8e93b2a235572aa60f38b21db09001bc8bc9ea1
-
Filesize
193B
MD5c507b5ca12cc3e4118dbb0365f753589
SHA1d21d854dd9d4e076b9bad90b45a3671e124a274c
SHA25651744273e71c940980f1abc2f6496e60d2023066583f7876cb5f5ea6b6242aee
SHA5128a3202615ae795100881c82cc03bf5651f22b83293ccdd4d47b11971fe06bcb26121aa088be14f41544c31812ba24b3ae327f8e99c1d56a1d4412b2ac8020fb4
-
Filesize
193B
MD56b2b153ea518e9858a64239a200ed1c9
SHA1c54bb02d115f2dc4f18e375efdbf3bc58336c0a5
SHA25664235278245b8448551f676db9e5639513462833f44862aa12a92038448fc12e
SHA51216295dfeb5206339d668df5b640f932fed17309e4900b6f5d4d4bfb34f19fe2abcfb18483da43eaee6c4fbca4939ed3517baba801e925bc947edc4d7f80b1650
-
Filesize
193B
MD5134cf6023825121fc8f71fd87c5a8bb3
SHA120e3e583300c21bb05315f4a015af9f4d09e5ecb
SHA256c90df6869f5b738c7b8c4b18dd1a1234f1c19a0c7aa5636f5bb21862f64cb96b
SHA5129272f86f90bb5a672311b1bb459c136e912aa10eb01928469bd63b9b5738787dfe7bd57cdb277ff039d648e34302d7de17fd0e9a85ca1d1b82f8fbc82ab46337
-
Filesize
193B
MD5b96a0e3309b2aaa11d7e920d5041684a
SHA1b9b336e7566c167c1bff8bb2340929b2aa7367af
SHA256dffdf82dd687d42bf038ace4b79a26eeda91b78ce6db43490761f8af0d9541d3
SHA512be883829979c481008ecc670436bc578756b29ca18a6c23d47a578fc4a65c736b96e244cddf2d610a4310abd19d09247729a86048e13a72ad8024f7017dd19c9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
193B
MD5c02b96297e2adbd7dc3e0bffd452d390
SHA12b5f770a7cebfc2531ef762d727ce56930e43ecf
SHA2569f7f71b6223401cce09281a98e7dd53985ad9eb37bc10434f52089dc47f8035f
SHA51297b0727bd27d705b2457db7e42315146e47f1ddda728aad577d1726c53e79fed8c881f6623349a6cbff24f4d7fe59b4045b54fbbe874aec5a811f617a4522759
-
Filesize
193B
MD50c78127eda8de8631548fed6984d2eb2
SHA1666a72b5e3cf7020fe8b3a44b01502df67344e07
SHA256f461dcc1cc3b9eee9118865890754fdb7a422003191f75a05369231c0d0b499b
SHA512de71cd9ef48927260c04fcd3b81f9f19bf570ec989abb53863404588c384fb39c80d646664787126b239b52716e7c405b2e8789c80d4d2ae630e6ab96546ceea
-
Filesize
193B
MD50b49ae031cb1481b6a0d99dfb12da2d9
SHA19edb93cc71933cbebe7ee1a7b9eedca5c2c4f1cd
SHA256e52b0d1c27c57fab158f0d07aaf2d3675a795d21644d803eae34eb2f54c98cab
SHA51243946953c9f6ce07ea3f7629be600b825b1cc2cc9ac27761411c476317be1130e1dd36f53bfe8f4b50c79f961fadcf9a6fbaed33490330d56d5e2b31613655bd
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478