Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 13:42
Behavioral task
behavioral1
Sample
JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe
-
Size
1.3MB
-
MD5
e570065fa523a3acb20a81d91b3fef6c
-
SHA1
fdfa35dbe77eb334bc90690bef04afdfbe3f226c
-
SHA256
63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556
-
SHA512
2d5cacc35af780d2567f36a553f1151e1e8e1f58f941017706803bd5ae18220d6d02e5b580888ff325b0680ca538599f5f29c555ff32704dc18e81056ff863c3
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2948 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 2640 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 2640 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x000700000001921d-9.dat dcrat behavioral1/memory/2784-13-0x0000000000340000-0x0000000000450000-memory.dmp dcrat behavioral1/memory/608-63-0x0000000000D20000-0x0000000000E30000-memory.dmp dcrat behavioral1/memory/2160-300-0x0000000000160000-0x0000000000270000-memory.dmp dcrat behavioral1/memory/2824-361-0x0000000000F50000-0x0000000001060000-memory.dmp dcrat behavioral1/memory/1664-599-0x0000000001210000-0x0000000001320000-memory.dmp dcrat behavioral1/memory/1852-659-0x0000000001230000-0x0000000001340000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 760 powershell.exe 1364 powershell.exe 2840 powershell.exe 484 powershell.exe 548 powershell.exe 2244 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2784 DllCommonsvc.exe 608 Idle.exe 2276 Idle.exe 2648 Idle.exe 2356 Idle.exe 2160 Idle.exe 2824 Idle.exe 3048 Idle.exe 2764 Idle.exe 324 Idle.exe 1664 Idle.exe 1852 Idle.exe -
Loads dropped DLL 2 IoCs
pid Process 1568 cmd.exe 1568 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 23 raw.githubusercontent.com 29 raw.githubusercontent.com 33 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 19 raw.githubusercontent.com 36 raw.githubusercontent.com 15 raw.githubusercontent.com 26 raw.githubusercontent.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\6ccacd8608530f DllCommonsvc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\debug\WIA\csrss.exe DllCommonsvc.exe File created C:\Windows\debug\WIA\886983d96e3d3e DllCommonsvc.exe File created C:\Windows\Help\mui\0C0A\OSPPSVC.exe DllCommonsvc.exe File created C:\Windows\Help\mui\0C0A\1610b97d3ab4a7 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2292 schtasks.exe 2708 schtasks.exe 572 schtasks.exe 1676 schtasks.exe 2088 schtasks.exe 2456 schtasks.exe 2544 schtasks.exe 3012 schtasks.exe 2228 schtasks.exe 2420 schtasks.exe 2948 schtasks.exe 3044 schtasks.exe 2996 schtasks.exe 1200 schtasks.exe 2984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 2840 powershell.exe 760 powershell.exe 2244 powershell.exe 484 powershell.exe 548 powershell.exe 1364 powershell.exe 608 Idle.exe 2276 Idle.exe 2648 Idle.exe 2356 Idle.exe 2160 Idle.exe 2824 Idle.exe 3048 Idle.exe 2764 Idle.exe 324 Idle.exe 1664 Idle.exe 1852 Idle.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2784 DllCommonsvc.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 760 powershell.exe Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 484 powershell.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeDebugPrivilege 608 Idle.exe Token: SeDebugPrivilege 2276 Idle.exe Token: SeDebugPrivilege 2648 Idle.exe Token: SeDebugPrivilege 2356 Idle.exe Token: SeDebugPrivilege 2160 Idle.exe Token: SeDebugPrivilege 2824 Idle.exe Token: SeDebugPrivilege 3048 Idle.exe Token: SeDebugPrivilege 2764 Idle.exe Token: SeDebugPrivilege 324 Idle.exe Token: SeDebugPrivilege 1664 Idle.exe Token: SeDebugPrivilege 1852 Idle.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2896 1056 JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe 31 PID 1056 wrote to memory of 2896 1056 JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe 31 PID 1056 wrote to memory of 2896 1056 JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe 31 PID 1056 wrote to memory of 2896 1056 JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe 31 PID 2896 wrote to memory of 1568 2896 WScript.exe 32 PID 2896 wrote to memory of 1568 2896 WScript.exe 32 PID 2896 wrote to memory of 1568 2896 WScript.exe 32 PID 2896 wrote to memory of 1568 2896 WScript.exe 32 PID 1568 wrote to memory of 2784 1568 cmd.exe 34 PID 1568 wrote to memory of 2784 1568 cmd.exe 34 PID 1568 wrote to memory of 2784 1568 cmd.exe 34 PID 1568 wrote to memory of 2784 1568 cmd.exe 34 PID 2784 wrote to memory of 2244 2784 DllCommonsvc.exe 51 PID 2784 wrote to memory of 2244 2784 DllCommonsvc.exe 51 PID 2784 wrote to memory of 2244 2784 DllCommonsvc.exe 51 PID 2784 wrote to memory of 760 2784 DllCommonsvc.exe 52 PID 2784 wrote to memory of 760 2784 DllCommonsvc.exe 52 PID 2784 wrote to memory of 760 2784 DllCommonsvc.exe 52 PID 2784 wrote to memory of 1364 2784 DllCommonsvc.exe 53 PID 2784 wrote to memory of 1364 2784 DllCommonsvc.exe 53 PID 2784 wrote to memory of 1364 2784 DllCommonsvc.exe 53 PID 2784 wrote to memory of 2840 2784 DllCommonsvc.exe 54 PID 2784 wrote to memory of 2840 2784 DllCommonsvc.exe 54 PID 2784 wrote to memory of 2840 2784 DllCommonsvc.exe 54 PID 2784 wrote to memory of 484 2784 DllCommonsvc.exe 55 PID 2784 wrote to memory of 484 2784 DllCommonsvc.exe 55 PID 2784 wrote to memory of 484 2784 DllCommonsvc.exe 55 PID 2784 wrote to memory of 548 2784 DllCommonsvc.exe 56 PID 2784 wrote to memory of 548 2784 DllCommonsvc.exe 56 PID 2784 wrote to memory of 548 2784 DllCommonsvc.exe 56 PID 2784 wrote to memory of 2196 2784 DllCommonsvc.exe 63 PID 2784 wrote to memory of 2196 2784 DllCommonsvc.exe 63 PID 2784 wrote to memory of 2196 2784 DllCommonsvc.exe 63 PID 2196 wrote to memory of 1972 2196 cmd.exe 65 PID 2196 wrote to memory of 1972 2196 cmd.exe 65 PID 2196 wrote to memory of 1972 2196 cmd.exe 65 PID 2196 wrote to memory of 608 2196 cmd.exe 66 PID 2196 wrote to memory of 608 2196 cmd.exe 66 PID 2196 wrote to memory of 608 2196 cmd.exe 66 PID 608 wrote to memory of 1476 608 Idle.exe 67 PID 608 wrote to memory of 1476 608 Idle.exe 67 PID 608 wrote to memory of 1476 608 Idle.exe 67 PID 1476 wrote to memory of 2928 1476 cmd.exe 69 PID 1476 wrote to memory of 2928 1476 cmd.exe 69 PID 1476 wrote to memory of 2928 1476 cmd.exe 69 PID 1476 wrote to memory of 2276 1476 cmd.exe 70 PID 1476 wrote to memory of 2276 1476 cmd.exe 70 PID 1476 wrote to memory of 2276 1476 cmd.exe 70 PID 2276 wrote to memory of 844 2276 Idle.exe 71 PID 2276 wrote to memory of 844 2276 Idle.exe 71 PID 2276 wrote to memory of 844 2276 Idle.exe 71 PID 844 wrote to memory of 1676 844 cmd.exe 73 PID 844 wrote to memory of 1676 844 cmd.exe 73 PID 844 wrote to memory of 1676 844 cmd.exe 73 PID 844 wrote to memory of 2648 844 cmd.exe 74 PID 844 wrote to memory of 2648 844 cmd.exe 74 PID 844 wrote to memory of 2648 844 cmd.exe 74 PID 2648 wrote to memory of 1720 2648 Idle.exe 75 PID 2648 wrote to memory of 1720 2648 Idle.exe 75 PID 2648 wrote to memory of 1720 2648 Idle.exe 75 PID 1720 wrote to memory of 1808 1720 cmd.exe 77 PID 1720 wrote to memory of 1808 1720 cmd.exe 77 PID 1720 wrote to memory of 1808 1720 cmd.exe 77 PID 1720 wrote to memory of 2356 1720 cmd.exe 78 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Local Settings\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\debug\WIA\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aIQ010jr8y.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1972
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TEfATY8not.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2928
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SaOkt9ru2m.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1676
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6Po3x2tXZG.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:1808
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dCyIaH4v8D.bat"13⤵PID:2904
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2020
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yvohz7Nokj.bat"15⤵PID:952
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2616
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Zi7wkUpBKE.bat"17⤵PID:1364
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2960
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XdxpZ3I66P.bat"19⤵PID:1348
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:1056
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4stVUxPy0P.bat"21⤵PID:1208
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:1768
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\V9nTU0UPEK.bat"23⤵PID:320
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:2584
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BGyPdaK1JU.bat"25⤵PID:1668
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:356
-
-
C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2sHl3bGdB9.bat"27⤵PID:2288
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:2660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Local Settings\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Local Settings\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\debug\WIA\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\debug\WIA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\debug\WIA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d654eef5984996e7e291b0c123ebb90
SHA1d2c6e0f87a6e77717a24cd8c49dd9db510f7b420
SHA25618e04f342f1097de1c79bb41ce864d8d73a2d4b92bdb0138521846853d5af33b
SHA512fec882be28db656dd6090999b6e6aac0766c81b4e98e38575e4a0f460561cebc9bbbf5c300446918d2ab906d2be98c11bef3dcfcabdc08de994e6024bac893ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa834b587a8b5fcc15ceb4151c6cbb6
SHA16cbcd93a7150dc745daa7de4c4c83220c13e50e5
SHA256543e196e528e13a79f76d74638ededeb06b370dd6b9111cb586a43c2f5bc14cb
SHA512aa7c4bd07f20c51ca7cf78acbaacc8c9e8f61ec1dcdb20155d8b9ed9eb6440037a957a7a59e6bb9a7484df3b1b7079d5855c6c278bc0347f66cc2a961837ea93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9f8f8231ad3003189d77dff670d996
SHA10050b992c9c0200a5976187793ccadd89cde7030
SHA25693958eeb5ffbef6b6eaf482db5e05394bc7761d19f0bf074fc03845cea62f362
SHA51289cc81818f0adc0125522e4a6032c97530bf5a6d9160b053f3855e8784b518e2d110f0c15f15783e49b26957292dbea8bb73baa2d5e95e79e6348925b6bcfa36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c741cc2d5ac4dd7e6e58ce099c129614
SHA16736592a3bae93b3c195524ff1d89afb6695e2a9
SHA256a0d805ab76e37bc3e059c643b9e0dd8bfe0e9a1d084b6533fe2638525e126330
SHA512838d3327c49c9b81cbeb362a32e43c77ea2a181d89588fbf5c5efc7d2ad2cae823cd1b6b9484321d853a89b06e6add7f59b19b4a1b227de7f23f8b527c815192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2093a81f6c0cbe4807044fd83dc712
SHA1f2bf97a19a8386083886480eb778af5040a3d10e
SHA256b8e47fd5620d532fb323ba58408c33a3c0c38bf647c22a340f088c855d13533f
SHA512cf00b003f1f4a122ed57344423665f2b436413eb8227f71e04c1541c61662916c4e1059ef759ec20e6e57fca615057c7285d2363a4ad95e9d9ef593aa1ba52fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136cd353123e0e747b6764a461c3fbd8
SHA1ed374f13173c130bfa4b0fbd59464746a06f6447
SHA256d9d184ca3b6b852973a8a5789aac9019c9fdf9030e58437db0c514260ceeeba3
SHA5126609228000094c89a0b6374b309da1ef95877d95e199f660abc5dc9aee03c25ce4152f66441861b0e4f99ee4335e96fc090573f41c9ef0743a49e2ce49f4088e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879b560dcd4f89fe65a2bd88427e8884
SHA15e0e03e5e7ee1ffe6eae6ecc5987690e564edf3f
SHA2561308f14793bc1710c212c7a3acaef44d8c922935d9f392bc384054935b13973a
SHA512718e2e7cb36507bd00ff61bc99982f9d09f95658fdcd00d5deab2c18d9acdc7502012a871b06395bf56aa20d3ca0296b8f129bed20b1338fcfad504c29a31f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597678a9011d744c7d0e58667360e9172
SHA1b26e10690de3bd8f325f2906ade682fe87fb8865
SHA256308098e9ff7d280eb317d77fe441e3ae2cdd525d226bd267b71c6fd46f24b117
SHA512877819404b5c07a64d74ab05226aa2ade266372047b1ec10236fa9bef9d28036f69f95d47bb1ce5799e70d1dbb930215f3fe65ef53184ef8bf8a025abc756b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d35e55320d986f17ba1050dde502b1e
SHA104fb6802906778877971560d834a299b4979e7af
SHA25617d921336adc117a4f4f6a53a0b5c8a037a2a768c40d9e96b5629eb734ef9003
SHA5128b1e2f168c8397401735e273082448c43c6b2df105dde9fbe5cf0bae3b90adcbbd8a70e79c24dfbf8554f565daca7df0f7b8686cce5480da495b4cf19c3f8ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb846f5a000d1b012db5fd3c1bff664
SHA1034613df98a1fcc31acaf471d6b88129db5b8ab5
SHA256c026737d79702784bb5b033f288684b98e40b523d27459240083e7b76a6ddef6
SHA512cab912a834baa1c886545317a4a2781ccd42ae2d1aed51c87031fec7ad7198e4915ad9787b9b87de8ad78dbe76162fd27b6c5bd405d8fcbb94b27f0c2e5fcff8
-
Filesize
215B
MD5a4eac82e4637da9a6f3731fb69166c62
SHA17446bd2ca78d345a5a45616bcf3afec8da0ad1e8
SHA2562adda00ff144c4d64dcd96b4216673a0a77455ba3efaa507c063f2caf14a9682
SHA5125d86805b041a93dedfe01dff233f55ca059609e0cc51d788d27288d3066480db20c5e4ee24e541a9baa4ed61ddb703ea39494a39cd211b4b9b9d299d65f424d2
-
Filesize
215B
MD5a3e60f6f05f0c4acfc53d2698619cc2d
SHA1c77fc031d380eb183225f464377b8599249c80be
SHA256de8b3e1ab0adaeb326b9b3096450bfab7aa14242056e2b1c526bfd3ff8ba6c57
SHA5123351a398c3feb390869f8bfa865d2ca210b16dc3994207f5a82493835e7f51a17e8c1c3b27ac48916cdd8e460cd01eaa82b62fcbba7bbb6504ff2a3297638286
-
Filesize
215B
MD527207d22bc6cc243660894b3b690b2c0
SHA1d14df189e445cd3e0bbc2b239475d1686a883f77
SHA2566ff6fdb165e0cc226bfcb39f5334f048491147d07e1d857548f72c71bad9e12a
SHA5120f0f596802c6ab04dfd414860a9cbe4189b1b9524167c3de437cd9b4b408403a276db2f6b4bb19b538af911488766d5719c4a97319b23ceb7fa7fa020e3b53e4
-
Filesize
215B
MD54e697fe8942f1ef39c7c91a4f77de1f7
SHA18d01db0691026840a2ffa4c2d8e14760b5f696d0
SHA25678585863f23c7854c2380c446bab2729982e6dc13e980e3b34e6017bf759c852
SHA5122ffce0da957d04930939d44a8edc77ff34adbf4d751a9642a24689ca74f8744fc4ecb8eaea975de731d85bfed2b4f0ec70e4053b2c221f5dcdd91aff1681f14e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
215B
MD55bb6f5fb1384ce3b2c6e57efea6cf41a
SHA1932a016307730d43be76461b5a4360fc1fab974c
SHA256a2e6d4722cb406d27d949829e87ee9bb0a11970964de07522bb2c436ad69d17d
SHA512f8baa6dad7b10255d12b0788db6f49ff6b557073c1fcc29f2a8abb6a5629bc542928d4e000977cab1c985c521c0563588f76a08ffe0d3507c1243b4a466200db
-
Filesize
215B
MD521695c33a221c2198d129a53c588e587
SHA137c438374cc892d15202c7f445099c79a6a92bcf
SHA2561e8b22df7ec8cd5f97cfa53854627cacbd32926a8f7fddf7db58bf9c9d533f37
SHA5129d8143f3cf63a779623ae1187a4c0a072850276b20731d3765554e1df61f2e2ff5f9493d41678e7e1dcf0887a5519c03c2e02c0ce7447586663de5fb40e68e66
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
215B
MD5dbb445e70d770bfd096e3436f52b1237
SHA10b03192c545265d70e8ba1a416200aeb1729043d
SHA256d35ed45e965562de00f409df70f8c30141c84f45656692b9ff331cb54d768975
SHA5121f9fe8805787290725acb3753eef618fc31cfc8cd56b7503aca66478e2a3f4df1cd057b6c538730d1e5d0251af720cc6eeeff3e568a3ff0256e04db6b3e3641b
-
Filesize
215B
MD52a1b8e3150a14cafd97381e74a531ac7
SHA1d063957ff4650e0a8d708c6f647b6b8a36eb22e0
SHA256f07c0bca7081952f88648e33b50b2b32580a5a0393b58f6cf25f4c239c676600
SHA512d855125389124557fa70b4543bda12d28fa93811f2459ae6048d2ded6c3039814be270ad1ee55de7fee6abf7891bf00636ffc914731f54a7937be2b69fe8a011
-
Filesize
215B
MD53ec01ecb48fcaf7a8e6532c842b18b2c
SHA1db66ffb2afc38e888f7db545cffdd63588639577
SHA2567f2e222ad88d97ef75492bf6445a90baac18631f5b3162186940616881223feb
SHA5121a570d9577e8f5aee245aba0cd3966af2a74a7ee717efde493c4f9e2a4b72f12bf326d8564420f2c8f4d921242f68270d3a882dad51babdc8100d2b96f67f93d
-
Filesize
215B
MD51d675807713f0dd3b1d0317f6e402f1c
SHA193cea7961987e63ffe3f2c4446f79ca8beb2072d
SHA2565092b48749eaa958d53679039b4cb84a14b2e149cdf9f9bec46bc2cacff9792f
SHA5120f8608079b1b12ea9d929a6eaeb0cd0a2ea8613b9ff90ca7b48584f2b5ca28a0506d62d3325056c13aa630bc72e89345c0569d71faeee06e6e3ab72aa709a682
-
Filesize
215B
MD58463117c4182609452aad8e515eee61a
SHA19172cc6782602734800df2e965cda34ed3d21ce0
SHA256ac659c658593b2ab45cf85e017a9d3b9ea6c404bbadae159bba0f135b1f28eb2
SHA512b46924493f3c8d4e919360c6f44c795edeb3572940c6d9c6e25fc305e7e3149f4bb5a123d1068fa8adeff54c1888bf0baf3f1262694d26748ff589d52cf29d60
-
Filesize
215B
MD53bfc95b86367620d788aa64969842685
SHA129417ec3a327e650446f519bedd209e5bce1ffc3
SHA256ff16985ae2a3111f10aaacb60495e2b24ca8c3755ce35cd546ef347a03fd1693
SHA51208b82332da539ead84ce7bb062eed1fe15c4bc78d80431fe3bbc1b4b3a7a9d878b2d920c2d43221cb35fe01b4a8bbca304c4faccee4e657b647906b1e2d8e024
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5450dcd7e7f29fe08ccdf291148c8af1a
SHA1efe6b8591d1ffdec012af676c917aa1addb96ead
SHA256296c24da178f13e27a4dcc48e53a74692f4192ffed117193c858350cd36dd14c
SHA5127101bc68ea74c7300e0a6dc9b58959c3506a7366efde7a82431518eee7ae94b0c091dce565291631f8cab4b2426aee2e0f0fe5265a77a2a4efd1c46fd59b6bf5
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394