Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/01/2025, 19:36
Behavioral task
behavioral1
Sample
10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe
Resource
win10v2004-20241007-en
General
-
Target
10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe
-
Size
1.7MB
-
MD5
a95c577913d17f1786babed3306fed60
-
SHA1
16106bfac76f6e4f711a9dd7e016cd52fbaeb774
-
SHA256
10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91
-
SHA512
314edb12b8885f8f9ea83e991b49aafcc629d5325f3439460610cc0046f0f0d1d629cecd79c2a9c48899d07c171253be7e65a6ef27c1434cf5ff55d5043fdec0
-
SSDEEP
24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 876 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 676 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 2784 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2784 schtasks.exe 29 -
resource yara_rule behavioral1/memory/2840-1-0x00000000011C0000-0x0000000001376000-memory.dmp dcrat behavioral1/files/0x000600000001a3f6-31.dat dcrat behavioral1/files/0x000700000001a457-75.dat dcrat behavioral1/memory/2668-194-0x00000000013A0000-0x0000000001556000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 24 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2460 powershell.exe 2112 powershell.exe 2228 powershell.exe 2156 powershell.exe 112 powershell.exe 2812 powershell.exe 560 powershell.exe 840 powershell.exe 2968 powershell.exe 1608 powershell.exe 2396 powershell.exe 1612 powershell.exe 1548 powershell.exe 1536 powershell.exe 2456 powershell.exe 2652 powershell.exe 3020 powershell.exe 1592 powershell.exe 1108 powershell.exe 1776 powershell.exe 2544 powershell.exe 2500 powershell.exe 2204 powershell.exe 1976 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe -
Executes dropped EXE 3 IoCs
pid Process 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2668 WmiPrvSE.exe 2892 WmiPrvSE.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\Java\RCXFBF1.tmp 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\RCXA6.tmp 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files\Internet Explorer\images\886983d96e3d3e 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files\Java\6203df4a6bafc7 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\101b941d020240 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File opened for modification C:\Program Files\Java\lsass.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File opened for modification C:\Program Files (x86)\Common Files\WmiPrvSE.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File opened for modification C:\Program Files\Internet Explorer\images\csrss.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files\Java\lsass.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File opened for modification C:\Program Files\Java\RCXFBE0.tmp 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\lsm.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\RCX28.tmp 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\lsm.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files (x86)\Common Files\WmiPrvSE.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files (x86)\Common Files\24dbde2999530e 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe File created C:\Program Files\Internet Explorer\images\csrss.exe 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe 1744 schtasks.exe 676 schtasks.exe 984 schtasks.exe 588 schtasks.exe 2320 schtasks.exe 2636 schtasks.exe 760 schtasks.exe 2676 schtasks.exe 2736 schtasks.exe 1748 schtasks.exe 2860 schtasks.exe 432 schtasks.exe 3032 schtasks.exe 2516 schtasks.exe 2172 schtasks.exe 3056 schtasks.exe 2152 schtasks.exe 2116 schtasks.exe 2868 schtasks.exe 2136 schtasks.exe 876 schtasks.exe 1924 schtasks.exe 2612 schtasks.exe 1744 schtasks.exe 2700 schtasks.exe 2508 schtasks.exe 1640 schtasks.exe 2272 schtasks.exe 2752 schtasks.exe 568 schtasks.exe 2068 schtasks.exe 3052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 1108 powershell.exe 1536 powershell.exe 1776 powershell.exe 2112 powershell.exe 840 powershell.exe 2228 powershell.exe 2544 powershell.exe 1548 powershell.exe 2460 powershell.exe 1976 powershell.exe 2500 powershell.exe 2456 powershell.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 1608 powershell.exe 1612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe Token: SeDebugPrivilege 1108 powershell.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 1776 powershell.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 840 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 1592 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 112 powershell.exe Token: SeDebugPrivilege 2668 WmiPrvSE.exe Token: SeDebugPrivilege 2892 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 840 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 42 PID 2840 wrote to memory of 840 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 42 PID 2840 wrote to memory of 840 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 42 PID 2840 wrote to memory of 1976 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 43 PID 2840 wrote to memory of 1976 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 43 PID 2840 wrote to memory of 1976 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 43 PID 2840 wrote to memory of 1108 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 44 PID 2840 wrote to memory of 1108 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 44 PID 2840 wrote to memory of 1108 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 44 PID 2840 wrote to memory of 1548 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 45 PID 2840 wrote to memory of 1548 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 45 PID 2840 wrote to memory of 1548 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 45 PID 2840 wrote to memory of 1536 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 46 PID 2840 wrote to memory of 1536 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 46 PID 2840 wrote to memory of 1536 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 46 PID 2840 wrote to memory of 1776 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 47 PID 2840 wrote to memory of 1776 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 47 PID 2840 wrote to memory of 1776 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 47 PID 2840 wrote to memory of 2460 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 51 PID 2840 wrote to memory of 2460 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 51 PID 2840 wrote to memory of 2460 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 51 PID 2840 wrote to memory of 2456 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 52 PID 2840 wrote to memory of 2456 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 52 PID 2840 wrote to memory of 2456 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 52 PID 2840 wrote to memory of 2112 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 53 PID 2840 wrote to memory of 2112 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 53 PID 2840 wrote to memory of 2112 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 53 PID 2840 wrote to memory of 2544 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 54 PID 2840 wrote to memory of 2544 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 54 PID 2840 wrote to memory of 2544 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 54 PID 2840 wrote to memory of 2500 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 55 PID 2840 wrote to memory of 2500 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 55 PID 2840 wrote to memory of 2500 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 55 PID 2840 wrote to memory of 2228 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 56 PID 2840 wrote to memory of 2228 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 56 PID 2840 wrote to memory of 2228 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 56 PID 2840 wrote to memory of 780 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 66 PID 2840 wrote to memory of 780 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 66 PID 2840 wrote to memory of 780 2840 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 66 PID 780 wrote to memory of 2652 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 88 PID 780 wrote to memory of 2652 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 88 PID 780 wrote to memory of 2652 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 88 PID 780 wrote to memory of 1612 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 89 PID 780 wrote to memory of 1612 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 89 PID 780 wrote to memory of 1612 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 89 PID 780 wrote to memory of 2204 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 90 PID 780 wrote to memory of 2204 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 90 PID 780 wrote to memory of 2204 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 90 PID 780 wrote to memory of 1608 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 92 PID 780 wrote to memory of 1608 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 92 PID 780 wrote to memory of 1608 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 92 PID 780 wrote to memory of 2968 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 94 PID 780 wrote to memory of 2968 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 94 PID 780 wrote to memory of 2968 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 94 PID 780 wrote to memory of 3020 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 96 PID 780 wrote to memory of 3020 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 96 PID 780 wrote to memory of 3020 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 96 PID 780 wrote to memory of 2156 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 97 PID 780 wrote to memory of 2156 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 97 PID 780 wrote to memory of 2156 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 97 PID 780 wrote to memory of 112 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 99 PID 780 wrote to memory of 112 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 99 PID 780 wrote to memory of 112 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 99 PID 780 wrote to memory of 2396 780 10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe"C:\Users\Admin\AppData\Local\Temp\10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe"1⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe"C:\Users\Admin\AppData\Local\Temp\10deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Program Files (x86)\Common Files\WmiPrvSE.exe"C:\Program Files (x86)\Common Files\WmiPrvSE.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9bf31cee-5c77-4d7b-82dd-dd94ce068a62.vbs"4⤵PID:1640
-
C:\Program Files (x86)\Common Files\WmiPrvSE.exe"C:\Program Files (x86)\Common Files\WmiPrvSE.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f9c5cf3d-7dea-46e8-8243-e644b73ba0a4.vbs"4⤵PID:2848
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\Java\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Java\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\Java\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\Default\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Users\Default\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Common Files\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\Default\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Default\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Users\Default\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\images\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\images\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\images\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5d0903def66392c38734e2360fd715bd0
SHA1dc457e046e1d0ff5ae75b5ebe2510e36938ef753
SHA256a2a9125c8a5f77187240036c3fe96aef7ee99e40e66966e6cc40f303cf99cc56
SHA512d6e518f5ce26622823035a7bd2c3ccae705974389001b957793515d9833f3bfa31a85ad66b96d79dd05d451b5a23202f49e0de4dffee0eac151f2cef0abbf6e6
-
Filesize
724B
MD51dd7913e401a9211456a29085c968c5c
SHA1d9ad3988636a3737b995c633a5adef665cd5df3c
SHA256bff432a5b8ef43db168837273a342f63bb8c936477ab6928a62e874ac246abc5
SHA512aed112eefd56ba2168cc40754569e16330024541eaad31ebcff5eadd7721a4f0252eb5e28f119c1db6ce17f1fe524b559a57c6a6f07b1b2afa301f117c09a335
-
Filesize
1.7MB
MD5a95c577913d17f1786babed3306fed60
SHA116106bfac76f6e4f711a9dd7e016cd52fbaeb774
SHA25610deea290eb4d8620994434958a5ba14e8669f34a2ab998b65792acad1b49c91
SHA512314edb12b8885f8f9ea83e991b49aafcc629d5325f3439460610cc0046f0f0d1d629cecd79c2a9c48899d07c171253be7e65a6ef27c1434cf5ff55d5043fdec0
-
Filesize
500B
MD59cdedcdfe30dd3f0056151c384cd67c1
SHA10b3d9c963d268e3bee71e79bb4cc511334d7ddd9
SHA256f54cf57789549ce19ec4f10214cda747ec03fa01d5dada76f74ff0d39a9b507a
SHA5122dc9771f82a99b8452a7c9c876d76806886d3fb54c6384b6234ec500202352eb4653368900f0b4df1533f7d7cf1ae81e900ab565c1a8faa68c04ee7d5e2133b1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD590a5040914cc6202a0c17a0603034ee1
SHA1f352157a49ccf6032df5cbed42b30f467b86e2e6
SHA2565f8a6c3b09e153f2a4570d0b1725ef843ade0505bd0c6390242e17f226bf976f
SHA512bb2f9c3c6f7ef61b28f2e5e17a7cd61db75b460bdb91ba8af0980537e3c8919b93c53e67d78774a8894dc519ffab393546eb78741bf1368aefcd0dd496e42817