Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 14:25
Behavioral task
behavioral1
Sample
JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe
-
Size
1.3MB
-
MD5
afd4ace69708dc0f2aa7c7b7c2966196
-
SHA1
5bf9ec802350d511695b8a7de764dfb21a051c17
-
SHA256
9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253
-
SHA512
2165cd829acd5d41e7c6f211ace913f31b567710ae92a9972f3359cfff8ba2c08359c6ee30cf4dd755ccbe4d378b42507c889ae5b12bb2fa65a0fe35e797dd6e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 304 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 576 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 308 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 552 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1224 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 2316 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2316 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000015d81-9.dat dcrat behavioral1/memory/2168-13-0x0000000000D00000-0x0000000000E10000-memory.dmp dcrat behavioral1/memory/2100-114-0x0000000000D70000-0x0000000000E80000-memory.dmp dcrat behavioral1/memory/916-220-0x00000000000F0000-0x0000000000200000-memory.dmp dcrat behavioral1/memory/3020-280-0x00000000003F0000-0x0000000000500000-memory.dmp dcrat behavioral1/memory/2168-340-0x0000000000E10000-0x0000000000F20000-memory.dmp dcrat behavioral1/memory/2552-400-0x00000000011E0000-0x00000000012F0000-memory.dmp dcrat behavioral1/memory/2916-697-0x00000000013C0000-0x00000000014D0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2792 powershell.exe 2820 powershell.exe 1932 powershell.exe 2572 powershell.exe 2744 powershell.exe 1608 powershell.exe 2896 powershell.exe 2624 powershell.exe 876 powershell.exe 860 powershell.exe 2692 powershell.exe 2216 powershell.exe 1924 powershell.exe 2632 powershell.exe 2628 powershell.exe 2404 powershell.exe 2112 powershell.exe 1676 powershell.exe 1872 powershell.exe 2892 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2168 DllCommonsvc.exe 2100 lsass.exe 916 lsass.exe 3020 lsass.exe 2168 lsass.exe 2552 lsass.exe 2576 lsass.exe 2392 lsass.exe 320 lsass.exe 2024 lsass.exe 2916 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 cmd.exe 1684 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 33 raw.githubusercontent.com 29 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 15 raw.githubusercontent.com 18 raw.githubusercontent.com 22 raw.githubusercontent.com 26 raw.githubusercontent.com -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\en-US\cmd.exe DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\en-US\winlogon.exe DllCommonsvc.exe File created C:\Program Files\Uninstall Information\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files\Windows Defender\es-ES\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files\Windows Defender\es-ES\24dbde2999530e DllCommonsvc.exe File created C:\Program Files (x86)\Windows Defender\winlogon.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Defender\cc11b995f2a76d DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\conhost.exe DllCommonsvc.exe File created C:\Program Files\Uninstall Information\explorer.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\en-US\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\en-US\cc11b995f2a76d DllCommonsvc.exe File created C:\Program Files\Windows Journal\Templates\csrss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Office\OSPPSVC.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Office\1610b97d3ab4a7 DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\088424020bedd6 DllCommonsvc.exe File created C:\Program Files\Windows Journal\Templates\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files\Windows Media Player\Icons\smss.exe DllCommonsvc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\ShellNew\wininit.exe DllCommonsvc.exe File created C:\Windows\ShellNew\56085415360792 DllCommonsvc.exe File created C:\Windows\Branding\Basebrd\sppsvc.exe DllCommonsvc.exe File created C:\Windows\Branding\Basebrd\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Windows\servicing\GC64\services.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 408 schtasks.exe 2808 schtasks.exe 304 schtasks.exe 2636 schtasks.exe 2028 schtasks.exe 2544 schtasks.exe 2896 schtasks.exe 2748 schtasks.exe 2480 schtasks.exe 1568 schtasks.exe 2548 schtasks.exe 1548 schtasks.exe 2504 schtasks.exe 3004 schtasks.exe 2328 schtasks.exe 2956 schtasks.exe 1104 schtasks.exe 1520 schtasks.exe 2336 schtasks.exe 1560 schtasks.exe 2644 schtasks.exe 1632 schtasks.exe 308 schtasks.exe 2156 schtasks.exe 2124 schtasks.exe 1484 schtasks.exe 2324 schtasks.exe 2720 schtasks.exe 2432 schtasks.exe 3060 schtasks.exe 968 schtasks.exe 2000 schtasks.exe 576 schtasks.exe 2960 schtasks.exe 552 schtasks.exe 1028 schtasks.exe 2996 schtasks.exe 1804 schtasks.exe 2244 schtasks.exe 932 schtasks.exe 2984 schtasks.exe 2752 schtasks.exe 2592 schtasks.exe 2616 schtasks.exe 2200 schtasks.exe 1536 schtasks.exe 2120 schtasks.exe 3008 schtasks.exe 2932 schtasks.exe 2804 schtasks.exe 2776 schtasks.exe 2664 schtasks.exe 1812 schtasks.exe 1608 schtasks.exe 2460 schtasks.exe 2620 schtasks.exe 1224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2168 DllCommonsvc.exe 2896 powershell.exe 2820 powershell.exe 860 powershell.exe 2624 powershell.exe 2692 powershell.exe 2632 powershell.exe 1872 powershell.exe 1676 powershell.exe 1932 powershell.exe 2892 powershell.exe 2112 powershell.exe 876 powershell.exe 2744 powershell.exe 2404 powershell.exe 1608 powershell.exe 2628 powershell.exe 1924 powershell.exe 2572 powershell.exe 2792 powershell.exe 2216 powershell.exe 2100 lsass.exe 916 lsass.exe 3020 lsass.exe 2168 lsass.exe 2552 lsass.exe 2576 lsass.exe 2392 lsass.exe 320 lsass.exe 2024 lsass.exe 2916 lsass.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2168 DllCommonsvc.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 860 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 1932 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 2100 lsass.exe Token: SeDebugPrivilege 876 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2404 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 2216 powershell.exe Token: SeDebugPrivilege 916 lsass.exe Token: SeDebugPrivilege 3020 lsass.exe Token: SeDebugPrivilege 2168 lsass.exe Token: SeDebugPrivilege 2552 lsass.exe Token: SeDebugPrivilege 2576 lsass.exe Token: SeDebugPrivilege 2392 lsass.exe Token: SeDebugPrivilege 320 lsass.exe Token: SeDebugPrivilege 2024 lsass.exe Token: SeDebugPrivilege 2916 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3040 2104 JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe 30 PID 2104 wrote to memory of 3040 2104 JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe 30 PID 2104 wrote to memory of 3040 2104 JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe 30 PID 2104 wrote to memory of 3040 2104 JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe 30 PID 3040 wrote to memory of 1684 3040 WScript.exe 31 PID 3040 wrote to memory of 1684 3040 WScript.exe 31 PID 3040 wrote to memory of 1684 3040 WScript.exe 31 PID 3040 wrote to memory of 1684 3040 WScript.exe 31 PID 1684 wrote to memory of 2168 1684 cmd.exe 33 PID 1684 wrote to memory of 2168 1684 cmd.exe 33 PID 1684 wrote to memory of 2168 1684 cmd.exe 33 PID 1684 wrote to memory of 2168 1684 cmd.exe 33 PID 2168 wrote to memory of 860 2168 DllCommonsvc.exe 93 PID 2168 wrote to memory of 860 2168 DllCommonsvc.exe 93 PID 2168 wrote to memory of 860 2168 DllCommonsvc.exe 93 PID 2168 wrote to memory of 2692 2168 DllCommonsvc.exe 94 PID 2168 wrote to memory of 2692 2168 DllCommonsvc.exe 94 PID 2168 wrote to memory of 2692 2168 DllCommonsvc.exe 94 PID 2168 wrote to memory of 2632 2168 DllCommonsvc.exe 95 PID 2168 wrote to memory of 2632 2168 DllCommonsvc.exe 95 PID 2168 wrote to memory of 2632 2168 DllCommonsvc.exe 95 PID 2168 wrote to memory of 2572 2168 DllCommonsvc.exe 96 PID 2168 wrote to memory of 2572 2168 DllCommonsvc.exe 96 PID 2168 wrote to memory of 2572 2168 DllCommonsvc.exe 96 PID 2168 wrote to memory of 2628 2168 DllCommonsvc.exe 97 PID 2168 wrote to memory of 2628 2168 DllCommonsvc.exe 97 PID 2168 wrote to memory of 2628 2168 DllCommonsvc.exe 97 PID 2168 wrote to memory of 1872 2168 DllCommonsvc.exe 98 PID 2168 wrote to memory of 1872 2168 DllCommonsvc.exe 98 PID 2168 wrote to memory of 1872 2168 DllCommonsvc.exe 98 PID 2168 wrote to memory of 2892 2168 DllCommonsvc.exe 99 PID 2168 wrote to memory of 2892 2168 DllCommonsvc.exe 99 PID 2168 wrote to memory of 2892 2168 DllCommonsvc.exe 99 PID 2168 wrote to memory of 2216 2168 DllCommonsvc.exe 100 PID 2168 wrote to memory of 2216 2168 DllCommonsvc.exe 100 PID 2168 wrote to memory of 2216 2168 DllCommonsvc.exe 100 PID 2168 wrote to memory of 2404 2168 DllCommonsvc.exe 101 PID 2168 wrote to memory of 2404 2168 DllCommonsvc.exe 101 PID 2168 wrote to memory of 2404 2168 DllCommonsvc.exe 101 PID 2168 wrote to memory of 2820 2168 DllCommonsvc.exe 102 PID 2168 wrote to memory of 2820 2168 DllCommonsvc.exe 102 PID 2168 wrote to memory of 2820 2168 DllCommonsvc.exe 102 PID 2168 wrote to memory of 1932 2168 DllCommonsvc.exe 103 PID 2168 wrote to memory of 1932 2168 DllCommonsvc.exe 103 PID 2168 wrote to memory of 1932 2168 DllCommonsvc.exe 103 PID 2168 wrote to memory of 1924 2168 DllCommonsvc.exe 104 PID 2168 wrote to memory of 1924 2168 DllCommonsvc.exe 104 PID 2168 wrote to memory of 1924 2168 DllCommonsvc.exe 104 PID 2168 wrote to memory of 2744 2168 DllCommonsvc.exe 106 PID 2168 wrote to memory of 2744 2168 DllCommonsvc.exe 106 PID 2168 wrote to memory of 2744 2168 DllCommonsvc.exe 106 PID 2168 wrote to memory of 1608 2168 DllCommonsvc.exe 107 PID 2168 wrote to memory of 1608 2168 DllCommonsvc.exe 107 PID 2168 wrote to memory of 1608 2168 DllCommonsvc.exe 107 PID 2168 wrote to memory of 2792 2168 DllCommonsvc.exe 108 PID 2168 wrote to memory of 2792 2168 DllCommonsvc.exe 108 PID 2168 wrote to memory of 2792 2168 DllCommonsvc.exe 108 PID 2168 wrote to memory of 2624 2168 DllCommonsvc.exe 109 PID 2168 wrote to memory of 2624 2168 DllCommonsvc.exe 109 PID 2168 wrote to memory of 2624 2168 DllCommonsvc.exe 109 PID 2168 wrote to memory of 2896 2168 DllCommonsvc.exe 110 PID 2168 wrote to memory of 2896 2168 DllCommonsvc.exe 110 PID 2168 wrote to memory of 2896 2168 DllCommonsvc.exe 110 PID 2168 wrote to memory of 2112 2168 DllCommonsvc.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c161f70bc20595d263848a7288e78d80f603718db48fc8c82bba797bd482253.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Favorites\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender\es-ES\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ShellNew\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Journal\Templates\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Office\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Branding\Basebrd\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\en-US\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\en-US\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x1DfgQ9qXa.bat"6⤵PID:1596
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1284
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8Lq6d7xQt2.bat"8⤵PID:2264
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2692
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JbtrqXgYk1.bat"10⤵PID:856
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:1776
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ph8sa6VtQm.bat"12⤵PID:2120
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1628
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hGpPWS23Hw.bat"14⤵PID:2752
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:916
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bbMo3XBCxD.bat"16⤵PID:2972
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2960
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GN1wkOWwnv.bat"18⤵PID:2008
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2216
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\l8nFZEr7oq.bat"20⤵PID:2324
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2768
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\V68XQM6FdC.bat"22⤵PID:2620
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2372
-
-
C:\MSOCache\All Users\lsass.exe"C:\MSOCache\All Users\lsass.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Favorites\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Public\Favorites\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Favorites\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Defender\es-ES\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\es-ES\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\es-ES\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Defender\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Windows\ShellNew\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\ShellNew\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Windows\ShellNew\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Journal\Templates\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\Templates\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Journal\Templates\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Office\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Office\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Windows\Branding\Basebrd\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Branding\Basebrd\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Windows\Branding\Basebrd\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Mail\en-US\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\en-US\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\en-US\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\en-US\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\en-US\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\en-US\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Downloads\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\Downloads\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Downloads\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files\Uninstall Information\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50513220be2070b533f06292d91da0ec6
SHA19a15620a9bfe01e83427a6ccc30ebf4eff0f23ed
SHA2562eadf5708da9e78d3a17599af2ecbe73b53121baa04a2a8e7ab5069858b512a8
SHA512201e51283f389037295bd3d3aeba3520886617453b5ed5aa16205d77d920c26e4457bdc9f515683460f58df9dea46ca90946199a3ee5d25717110d996578efe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544914af3d48bf4a11f26e075f43d5bd8
SHA19b8d750edfb30863d06fba5050d532d6334de44d
SHA25692906fbaaf6653f0e508dcffbc732354684a772123b6c1b4e8f2e2b026615bc8
SHA5128e93509657c2e321bfd69bc0a6ee499d94df115aa5eab7818ca1705677ecb3dc9d9e0a70a7c12940f1bab63ba1514ece735f3570094a2cf4d92b1768dc0f7824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a99f3229d631f1745ca90f9edbe378
SHA121b20ac3fa84fe36600306a9ebe32edaa2baa5ef
SHA256076f167e28d580cee637e360686fe1fef29bfb17f8afe0e57c8405c2a4157b97
SHA512d3511be57f446d2b9baa4d44d97c74abbef2e4d27ef7cad5d7661139450d535e456197b63df54b398d22f7200eb536b875827f374e34186cb193f2e02cd16dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6beef969f17315984d1beb22a95217
SHA1f5628b4cb3b64335d01f5701ab45f5bf7e267342
SHA2562460a8a6c62b3545386356a50510e286935c1d7df6e12658929abd7c57da4f65
SHA512e957096ed1ba552158298eaf4c1a3f3a67881ae591ff38806e83e07a89996319888fadaccc5a2e0dd3e93899d84625393767427d65aeefacc8add3f140616d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874717ae69e9a82ab312adae6fc82fa2
SHA1600b94ba3d1e23707f29dff0de515adbd8452601
SHA256594936722f8e9f3ec8dd19b2daa72ec1ce9d1c31cd03a42b500ebf65a82975a9
SHA51238e5172037877668eca897c0aa954280918e839374a25446c9902b3d2097c4a993a179624697dc9678c40ba10d9a92b90e91acd62f08c09041a438e973dcb7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f9ebd65e2cb568538e4cde729f90ea
SHA18375f38a4423aa51b5a06bf3d28205c3ac7d821b
SHA25608c27165640480ff69ab64922946b6003bcb1c8946b6c6e477e764a92c4e7b8b
SHA51246e2756b61769865192e2de9715ec363d6db9593208d97ef7bc2b68528e81e094d6a6724f7ac53034ef34caff347290ad352c5e8efd0a37e02d2876a13bd9788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7189aec6698b053f2dc6cc1d5af970
SHA123d03e0b6fdd6261413316671dd936f2b1150f5f
SHA256acd9f3b564ddad8984bc49d19a6ba6d0de6055702b640ed32777cba0b7fd32a1
SHA512301c9f9eb4bf8bb4c719516b8cb0920b0ca660d822960db800e1998be209d0d00c80b99a6ac5110de5860a7defc9f0b6afc1661905f0b2a295f9e4986ae1fc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95127760e8b8d5b1ee951a381ba9dfd
SHA1d28f21df5770988b7cf89cf1bd44a7fb6fd9eb48
SHA256b8205d02f5eb17f8d696a0113ec79be3ed228df3a420eb4456f54cb04aadd217
SHA512bb7cd644e89cdc3d0f25fe993a985bf311e3b093762d57dd1232fd1d7923fc9780171781861adb07e596446447dbec21bafa3212d229c42a645ec32ea1070cd8
-
Filesize
196B
MD5a9ec5b2cc0e060684db2520205cfdd6f
SHA1b592c0f25370ec7c577f14062159755a6994d3c6
SHA25641f081bb84adb8100825a5692a67f67dac3650164bbb8aad898c4825392e75e1
SHA512d309d0f4639c81d096f3afd76ed33fddf58b32cc00ecd40ba9e4ffa05c7e53597c92abdf4517b63cbd0f7adb1a10e9d723de34abdb068dfc8dc441e363ddaaee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
196B
MD5371f56fbb8873aecde6179ee50a4b88c
SHA1374d420f639ae1f67627003a60d20527a47e2ee4
SHA25660effe08e0d8b0fc3c930ef34803fce5a49bffc781ada583f1b46f3e276043e1
SHA51284f1c7975bc6705999b5fcda4b8d14c5a95169b66ac0f8cce0d058a7f6075c50b77cbab31319e5e6b572d57358af2d6675f3deca1653667402be2bbdeb4f3246
-
Filesize
196B
MD5c6036a6fda5ee5f9517e03f11c69964a
SHA123f337f32ccece0af4f211acd4dce8b1e083b381
SHA256ba1542c16feaf015983c497d780fce816cd99103b8e57381521c97b5eed12d19
SHA51206fdd8aeec91605ea51830e0109a439aeec35e37b83fd37ea3d44b892879d544bf0f6ecb3f235ebf6659d7164e7c5b218d38d67de521212fb7e3f4a305eb75e4
-
Filesize
196B
MD5a399aa0ab46becd02e8d75d77c9ad8b4
SHA1de6cc963982feddbab854739fb2c3d9a30cdfef4
SHA25630975506b3c0dbf29b41fe4433195dc7f664871baedea5e17381532c1e69bef9
SHA512012faf92653cbab99cdc71da3e4afadb9457c943971e7b42ed8f8e343b9227149722360af2283bded3147d986e72ae599557392c016a609d4f671c6188f7537e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
196B
MD5009d03d8a4135a025900e39ed1832364
SHA1803bbe1e51666bd2312600569f8a6632d76770a1
SHA25654be33e690a1d3f6cb1de1d9a6b92e69fbe44207b97c153a57fda60d1e4935dd
SHA5124b96475c2325de24046466a2b5fe6c28576d1446952ebe5b7abf858e774f73d39da8d3a45212652911b25355314075cd72fa28fbe39ceb01517c2a58986d715c
-
Filesize
196B
MD5a4eb0c0f594ca1c2af7e5866f33c55dc
SHA1cb56408f45a5a68c0b9fcc81fa7611cbb8948719
SHA2566c25a0926360b42d480da0009a3cdfc741e4238af083f06170facfb46436be9f
SHA51219cf18475281cee08169b5df19b23372b5d929c3093b78f0967da68b545b6004a3d2738cc5e364b9c02e71c0be0b2a1846700e56f2bb32b4cb06b70233030180
-
Filesize
196B
MD5879e2258c76ff17ca5f5b7494f7656fb
SHA18c0c98e37e5002734f2ffdc4d6e209d1798e50cd
SHA256b160ca47d47fd33dd3f2138e2c502ea7c261b183d8d45a1ea5755b0cef960920
SHA512f261a957e2766f34bb6acd81146864be3ad02a2bd35d381cdc8bd7f12270b7c56326cfce52a355a62b2dd45b6a5cde269b1ed97b3f240b012b4c7430e847c8a7
-
Filesize
196B
MD519304f632927cef43dd1a2dfd0cac90b
SHA1824c4539b8fde7541e7f18bfb79fd2bbae085149
SHA25663a090df3cddb915b4fb7f72a3a2a5aec0901b69a89ee99c648c92a36b0ef005
SHA5121d2a48aff24667dbcfc61dac4753cb4dcbf133f5d1ea50cf764af61bb766ec7482ae77f975cd7db231ad37cd9e81cd84d02a61fa36f3ef7270d6a06be6f0c5c4
-
Filesize
196B
MD5be829b6f0a4dba74faf615d9326e6e76
SHA11eb6a3907cb683425fcb19554ded58b7d1fcd066
SHA25608fed2dfddf4ac3a19349e2cd4c3bc49b285e1296822b37028309cf45d2f6c7c
SHA51282760fc995c3d46264b2868f1a52a1e38eac9e7a31ec421b4a341e5b98bfcc803f68bd89a43ea57f90630929fca479cacebc74008dd9b5e760a7c5a5284e5547
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e48ce116ff8063d6b584ff76defff018
SHA18c4487ef9afae5c9566dbf6b4f08221474bdfd1e
SHA25699207c15fbfc29a8ce40a5154f096e39ded804ffac94fafea5e3ad4d0b561d25
SHA5123cee33ac5aa3226a1842ef1dd31d0ae49364b144a5afc1d56018a5ea85e2954b0fae544a2ecd513d5a4a583877eb79507b206aa965f915fb5ce5a9774dfa52e5
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394