Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/01/2025, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe
Resource
win7-20240903-en
General
-
Target
7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe
-
Size
1.9MB
-
MD5
04095b54d4245dca4aeb05310a2ddc8a
-
SHA1
4d5bc54fade2e8af35d36ae0cab2c0f835cb7334
-
SHA256
7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c
-
SHA512
f666c5f973a67aeb3d56b2055884267f2fd892634c2267dbd0e29965285dc05d876658fa944100bafe572b66061a8a7caefd3b1e650ee9302ae229255a8a854f
-
SSDEEP
49152:OB8cSz7LU1B6RIML97yovHGfx8UINTPWUznpd:QEvKB6WMBvqnIJx
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 300 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 1432 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 1432 schtasks.exe 34 -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1416 powershell.exe 1112 powershell.exe 1308 powershell.exe 1520 powershell.exe 1636 powershell.exe 1732 powershell.exe 1712 powershell.exe 1688 powershell.exe 1196 powershell.exe 448 powershell.exe 2292 powershell.exe 2420 powershell.exe 848 powershell.exe 108 powershell.exe 1596 powershell.exe 1192 powershell.exe 2996 powershell.exe 2412 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2604 Bluestacks.exe 2184 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2940 cmd.exe 2940 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 5 ipinfo.io -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System.exe Bluestacks.exe File created C:\Program Files (x86)\Common Files\27d1bcfc3c54e0 Bluestacks.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\L2Schemas\taskhost.exe Bluestacks.exe File created C:\Windows\L2Schemas\b75386f1303e64 Bluestacks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1888 PING.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Bluestacks.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Bluestacks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1888 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe 2308 schtasks.exe 2880 schtasks.exe 1576 schtasks.exe 300 schtasks.exe 2376 schtasks.exe 2884 schtasks.exe 2184 schtasks.exe 3064 schtasks.exe 2408 schtasks.exe 2172 schtasks.exe 2320 schtasks.exe 2452 schtasks.exe 560 schtasks.exe 2984 schtasks.exe 1748 schtasks.exe 2784 schtasks.exe 2064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe 2604 Bluestacks.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2604 Bluestacks.exe Token: SeDebugPrivilege 1192 powershell.exe Token: SeDebugPrivilege 1112 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 1196 powershell.exe Token: SeDebugPrivilege 1416 powershell.exe Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 108 powershell.exe Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 2292 powershell.exe Token: SeDebugPrivilege 448 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2996 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 2184 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 780 2764 7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe 30 PID 2764 wrote to memory of 780 2764 7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe 30 PID 2764 wrote to memory of 780 2764 7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe 30 PID 2764 wrote to memory of 780 2764 7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe 30 PID 780 wrote to memory of 2940 780 WScript.exe 31 PID 780 wrote to memory of 2940 780 WScript.exe 31 PID 780 wrote to memory of 2940 780 WScript.exe 31 PID 780 wrote to memory of 2940 780 WScript.exe 31 PID 2940 wrote to memory of 2604 2940 cmd.exe 33 PID 2940 wrote to memory of 2604 2940 cmd.exe 33 PID 2940 wrote to memory of 2604 2940 cmd.exe 33 PID 2940 wrote to memory of 2604 2940 cmd.exe 33 PID 2604 wrote to memory of 1636 2604 Bluestacks.exe 53 PID 2604 wrote to memory of 1636 2604 Bluestacks.exe 53 PID 2604 wrote to memory of 1636 2604 Bluestacks.exe 53 PID 2604 wrote to memory of 1416 2604 Bluestacks.exe 54 PID 2604 wrote to memory of 1416 2604 Bluestacks.exe 54 PID 2604 wrote to memory of 1416 2604 Bluestacks.exe 54 PID 2604 wrote to memory of 1688 2604 Bluestacks.exe 55 PID 2604 wrote to memory of 1688 2604 Bluestacks.exe 55 PID 2604 wrote to memory of 1688 2604 Bluestacks.exe 55 PID 2604 wrote to memory of 848 2604 Bluestacks.exe 56 PID 2604 wrote to memory of 848 2604 Bluestacks.exe 56 PID 2604 wrote to memory of 848 2604 Bluestacks.exe 56 PID 2604 wrote to memory of 1196 2604 Bluestacks.exe 57 PID 2604 wrote to memory of 1196 2604 Bluestacks.exe 57 PID 2604 wrote to memory of 1196 2604 Bluestacks.exe 57 PID 2604 wrote to memory of 108 2604 Bluestacks.exe 58 PID 2604 wrote to memory of 108 2604 Bluestacks.exe 58 PID 2604 wrote to memory of 108 2604 Bluestacks.exe 58 PID 2604 wrote to memory of 1732 2604 Bluestacks.exe 59 PID 2604 wrote to memory of 1732 2604 Bluestacks.exe 59 PID 2604 wrote to memory of 1732 2604 Bluestacks.exe 59 PID 2604 wrote to memory of 448 2604 Bluestacks.exe 60 PID 2604 wrote to memory of 448 2604 Bluestacks.exe 60 PID 2604 wrote to memory of 448 2604 Bluestacks.exe 60 PID 2604 wrote to memory of 1112 2604 Bluestacks.exe 61 PID 2604 wrote to memory of 1112 2604 Bluestacks.exe 61 PID 2604 wrote to memory of 1112 2604 Bluestacks.exe 61 PID 2604 wrote to memory of 1596 2604 Bluestacks.exe 62 PID 2604 wrote to memory of 1596 2604 Bluestacks.exe 62 PID 2604 wrote to memory of 1596 2604 Bluestacks.exe 62 PID 2604 wrote to memory of 1192 2604 Bluestacks.exe 63 PID 2604 wrote to memory of 1192 2604 Bluestacks.exe 63 PID 2604 wrote to memory of 1192 2604 Bluestacks.exe 63 PID 2604 wrote to memory of 2996 2604 Bluestacks.exe 64 PID 2604 wrote to memory of 2996 2604 Bluestacks.exe 64 PID 2604 wrote to memory of 2996 2604 Bluestacks.exe 64 PID 2604 wrote to memory of 2412 2604 Bluestacks.exe 65 PID 2604 wrote to memory of 2412 2604 Bluestacks.exe 65 PID 2604 wrote to memory of 2412 2604 Bluestacks.exe 65 PID 2604 wrote to memory of 2292 2604 Bluestacks.exe 66 PID 2604 wrote to memory of 2292 2604 Bluestacks.exe 66 PID 2604 wrote to memory of 2292 2604 Bluestacks.exe 66 PID 2604 wrote to memory of 2420 2604 Bluestacks.exe 67 PID 2604 wrote to memory of 2420 2604 Bluestacks.exe 67 PID 2604 wrote to memory of 2420 2604 Bluestacks.exe 67 PID 2604 wrote to memory of 1712 2604 Bluestacks.exe 68 PID 2604 wrote to memory of 1712 2604 Bluestacks.exe 68 PID 2604 wrote to memory of 1712 2604 Bluestacks.exe 68 PID 2604 wrote to memory of 1308 2604 Bluestacks.exe 69 PID 2604 wrote to memory of 1308 2604 Bluestacks.exe 69 PID 2604 wrote to memory of 1308 2604 Bluestacks.exe 69 PID 2604 wrote to memory of 1520 2604 Bluestacks.exe 70 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe"C:\Users\Admin\AppData\Local\Temp\7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\QUJ9Bg46i5eTnOQKEnteAp7rp1YY9NQfmUbhx6iPrrb4U6kE.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\6iq5IFzZA9EyHTwKHM8vXk9USXtHecApoG.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe"C:\Users\Admin\AppData\Local\Temp\WinRAR/data/bin/unistall/Bluestacks.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\L2Schemas\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Temp\Crashpad\attachments\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0rWdBYlBWf.bat"5⤵PID:972
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:2612
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1888
-
-
C:\Windows\Temp\Crashpad\attachments\explorer.exe"C:\Windows\Temp\Crashpad\attachments\explorer.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Windows\L2Schemas\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\L2Schemas\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Windows\L2Schemas\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Windows\Temp\Crashpad\attachments\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\attachments\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Windows\Temp\Crashpad\attachments\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BluestacksB" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Bluestacks" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BluestacksB" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177B
MD50405c69bf802735dc50c9093e93f146b
SHA12fe791e27b41595cbc665cb6df0b8f7953b173b5
SHA2567487bffe60397a81b9d0996dfa67bebcf7f43eb902a8dc8b01c03d8620131147
SHA51244b96d5de9e2cf92fa12c0ecb3eded15bea7f50147299f199db5add6a7080f74032203ac55ac226df06b67ab32dc727e2f2e5e5c932573e1344d5bb3d398d793
-
Filesize
95B
MD5aa898d60b0bc1941439402668a8a16b3
SHA19574950945fc837fe9ff07ee3ca6c32185842e0e
SHA256046bfe53d5f3e0658d97eeada7719219544da9cf16508a1e85b0bfe7831388a8
SHA5125964f3294d9a7e8ccbe4d8c2c5fd66edc5ad28bd4b5c9664c67ff74f85852ae7d3fa45f42862821f91e94f4ce03c248a858b0e8a4026ef66cdce72c96159a2ff
-
C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\QUJ9Bg46i5eTnOQKEnteAp7rp1YY9NQfmUbhx6iPrrb4U6kE.vbe
Filesize240B
MD586d5fa5e3228e9586230609c34cdeec7
SHA11e27f4cf478a2bb3a99491476e74c7968b811eed
SHA256a68460a1a574480ffa92d8d4fbe8636d5a32cc3da84936bcb3b47d829a7e588d
SHA512d4b15b180ab9887f0547193cd42f7273c82bf53f228df74f64424ed684342bc7717669f909a7a156cc0e37a6415a12fddeb7d27c9cc12058d93ce64e2345bc79
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53911bace22b677f0d244cce3b82ce6a5
SHA1691a319ed769e9941487c688a173f2f72b18d87e
SHA256790fb894e53739f17e0eb620e609b4857a98e3c6c595166e8f3367e3757dc6c1
SHA512b25a936d0c01108f164d7a51d9c5362567a47e345872c63c75b6f0f6dfc6a5be290f8956e95acae94b87063c3c36f49687eecad92a254de54f7eeb6469afe2e3