Analysis
-
max time kernel
899s -
max time network
431s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 18:04
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
79069701295f944d67c5f2e0213b3b9c
-
SHA1
589e8b6227ec6ef923f7eb8e4dc96797593f9535
-
SHA256
ff62c26c8faf00f841ddeae1e095b8a65a9cb4e0d2a01879aaa8d767c4550cf8
-
SHA512
472570fbf5ee21c05d9e40aaef32686b5f3f63eba93c7f3efdc23493e74017cea8b2a91a1ac7d8cdbc67fedb18f4dcae20c08fa3b6486807fa38d03dd2114f67
-
SSDEEP
49152:mvjI22SsaNYfdPBldt698dBcjHtqRJ6sbR3LoGdnTHHB72eh2NT:mvc22SsaNYfdPBldt6+dBcjHtqRJ62
Malware Config
Extracted
quasar
1.4.1
test-rat
46.125.249.50:4782:4782
e2bb43be-2392-4c93-9a3c-dcea173d5afd
-
encryption_key
AE2F816185F134AF4E7D747D3E55802DE0F16A45
-
install_name
Virus-Rat.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Update
-
subdirectory
Rat-Test-cx
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/4740-1-0x0000000000F10000-0x0000000001234000-memory.dmp family_quasar behavioral1/files/0x000400000001e4e1-5.dat family_quasar -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Virus-Rat.exe -
Executes dropped EXE 64 IoCs
pid Process 1384 Virus-Rat.exe 2964 Virus-Rat.exe 1940 Virus-Rat.exe 1920 Virus-Rat.exe 4064 Virus-Rat.exe 452 Virus-Rat.exe 4976 Virus-Rat.exe 4384 Virus-Rat.exe 2240 Virus-Rat.exe 3992 Virus-Rat.exe 1080 Virus-Rat.exe 3908 Virus-Rat.exe 4208 Virus-Rat.exe 2496 Virus-Rat.exe 3504 Virus-Rat.exe 5100 Virus-Rat.exe 1856 Virus-Rat.exe 3712 Virus-Rat.exe 1144 Virus-Rat.exe 1512 Virus-Rat.exe 3448 Virus-Rat.exe 5056 Virus-Rat.exe 2416 Virus-Rat.exe 2600 Virus-Rat.exe 4820 Virus-Rat.exe 1392 Virus-Rat.exe 3924 Virus-Rat.exe 3728 Virus-Rat.exe 2520 Virus-Rat.exe 3856 Virus-Rat.exe 1048 Virus-Rat.exe 4364 Virus-Rat.exe 1600 Virus-Rat.exe 784 Virus-Rat.exe 3776 Virus-Rat.exe 3692 Virus-Rat.exe 2608 Virus-Rat.exe 2712 Virus-Rat.exe 4496 Virus-Rat.exe 2236 Virus-Rat.exe 2304 Virus-Rat.exe 1072 Virus-Rat.exe 508 Virus-Rat.exe 4316 Virus-Rat.exe 4488 Virus-Rat.exe 3516 Virus-Rat.exe 4040 Virus-Rat.exe 2788 Virus-Rat.exe 2868 Virus-Rat.exe 1168 Virus-Rat.exe 4752 Virus-Rat.exe 2460 Virus-Rat.exe 1816 Virus-Rat.exe 1836 Virus-Rat.exe 2236 Virus-Rat.exe 208 Virus-Rat.exe 2684 Virus-Rat.exe 1380 Virus-Rat.exe 3092 Virus-Rat.exe 5048 Virus-Rat.exe 2140 Virus-Rat.exe 4936 Virus-Rat.exe 4000 Virus-Rat.exe 4108 Virus-Rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1212 PING.EXE 3492 PING.EXE 3768 PING.EXE 4364 PING.EXE 4640 PING.EXE 4084 PING.EXE 1108 PING.EXE 3712 PING.EXE 3244 PING.EXE 4772 PING.EXE 4416 PING.EXE 388 PING.EXE 816 PING.EXE 4032 PING.EXE 4796 PING.EXE 1072 PING.EXE 5116 PING.EXE 60 PING.EXE 744 PING.EXE 4436 PING.EXE 4984 PING.EXE 344 PING.EXE 2936 PING.EXE 2336 PING.EXE 760 PING.EXE 1224 PING.EXE 3916 PING.EXE 2232 PING.EXE 1132 PING.EXE 2176 PING.EXE 3168 PING.EXE 880 PING.EXE 4512 PING.EXE 732 PING.EXE 3580 PING.EXE 2080 PING.EXE 3036 PING.EXE 3656 PING.EXE 2120 PING.EXE 2476 PING.EXE 3896 PING.EXE 3424 PING.EXE 3304 PING.EXE 4656 PING.EXE 1672 PING.EXE 3748 PING.EXE 4948 PING.EXE 4224 PING.EXE 3036 PING.EXE 3292 PING.EXE 2944 PING.EXE 4296 PING.EXE 4460 PING.EXE 1072 PING.EXE 1920 PING.EXE 396 PING.EXE 1392 PING.EXE 868 PING.EXE 3288 PING.EXE 4156 PING.EXE 3736 PING.EXE 4216 PING.EXE 5104 PING.EXE 3000 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 4640 PING.EXE 3036 PING.EXE 1152 PING.EXE 4656 PING.EXE 4296 PING.EXE 1340 PING.EXE 4984 PING.EXE 816 PING.EXE 3168 PING.EXE 4104 PING.EXE 4216 PING.EXE 4512 PING.EXE 4576 PING.EXE 3356 PING.EXE 1108 PING.EXE 3748 PING.EXE 744 PING.EXE 2476 PING.EXE 5004 PING.EXE 5116 PING.EXE 4032 PING.EXE 732 PING.EXE 760 PING.EXE 2944 PING.EXE 1852 PING.EXE 880 PING.EXE 2176 PING.EXE 3036 PING.EXE 3736 PING.EXE 3768 PING.EXE 3292 PING.EXE 4740 PING.EXE 1072 PING.EXE 1748 PING.EXE 3916 PING.EXE 396 PING.EXE 4860 PING.EXE 1132 PING.EXE 208 PING.EXE 3244 PING.EXE 868 PING.EXE 4796 PING.EXE 1072 PING.EXE 4376 PING.EXE 3564 PING.EXE 4084 PING.EXE 508 PING.EXE 4416 PING.EXE 3580 PING.EXE 4224 PING.EXE 388 PING.EXE 4108 PING.EXE 4948 PING.EXE 4436 PING.EXE 1392 PING.EXE 344 PING.EXE 60 PING.EXE 3304 PING.EXE 1672 PING.EXE 5104 PING.EXE 548 PING.EXE 1224 PING.EXE 3424 PING.EXE 1220 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe 1304 schtasks.exe 4084 schtasks.exe 2752 schtasks.exe 4584 schtasks.exe 452 schtasks.exe 1100 schtasks.exe 760 schtasks.exe 3496 schtasks.exe 4644 schtasks.exe 3276 schtasks.exe 2396 schtasks.exe 4388 schtasks.exe 3236 schtasks.exe 4980 schtasks.exe 648 schtasks.exe 4156 schtasks.exe 1392 schtasks.exe 4024 schtasks.exe 5100 schtasks.exe 4400 schtasks.exe 4064 schtasks.exe 4340 schtasks.exe 4468 schtasks.exe 1196 schtasks.exe 4540 schtasks.exe 4580 schtasks.exe 2448 schtasks.exe 1852 schtasks.exe 4548 schtasks.exe 3896 schtasks.exe 1092 schtasks.exe 3768 schtasks.exe 2708 schtasks.exe 4136 schtasks.exe 3076 schtasks.exe 60 schtasks.exe 4272 schtasks.exe 4836 schtasks.exe 3696 schtasks.exe 3576 schtasks.exe 4476 schtasks.exe 556 schtasks.exe 4948 schtasks.exe 4920 schtasks.exe 4536 schtasks.exe 4972 schtasks.exe 4644 schtasks.exe 880 schtasks.exe 1668 schtasks.exe 4884 schtasks.exe 3032 schtasks.exe 1632 schtasks.exe 4952 schtasks.exe 4708 schtasks.exe 2556 schtasks.exe 2116 schtasks.exe 3236 schtasks.exe 4916 schtasks.exe 3200 schtasks.exe 3796 schtasks.exe 2524 schtasks.exe 5036 schtasks.exe 1508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4368 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4740 Client-built.exe Token: SeDebugPrivilege 1384 Virus-Rat.exe Token: SeDebugPrivilege 2964 Virus-Rat.exe Token: SeDebugPrivilege 4368 taskmgr.exe Token: SeSystemProfilePrivilege 4368 taskmgr.exe Token: SeCreateGlobalPrivilege 4368 taskmgr.exe Token: SeDebugPrivilege 1940 Virus-Rat.exe Token: SeDebugPrivilege 1920 Virus-Rat.exe Token: SeDebugPrivilege 4064 Virus-Rat.exe Token: SeDebugPrivilege 452 Virus-Rat.exe Token: SeDebugPrivilege 4976 Virus-Rat.exe Token: SeDebugPrivilege 4384 Virus-Rat.exe Token: SeDebugPrivilege 2240 Virus-Rat.exe Token: SeDebugPrivilege 3992 Virus-Rat.exe Token: SeDebugPrivilege 1080 Virus-Rat.exe Token: SeDebugPrivilege 3908 Virus-Rat.exe Token: SeDebugPrivilege 4208 Virus-Rat.exe Token: SeDebugPrivilege 2496 Virus-Rat.exe Token: SeDebugPrivilege 3504 Virus-Rat.exe Token: SeDebugPrivilege 5100 Virus-Rat.exe Token: SeDebugPrivilege 1856 Virus-Rat.exe Token: SeDebugPrivilege 3712 Virus-Rat.exe Token: SeDebugPrivilege 1144 Virus-Rat.exe Token: SeDebugPrivilege 1512 Virus-Rat.exe Token: SeDebugPrivilege 3448 Virus-Rat.exe Token: SeDebugPrivilege 5056 Virus-Rat.exe Token: SeDebugPrivilege 2416 Virus-Rat.exe Token: SeDebugPrivilege 2600 Virus-Rat.exe Token: SeDebugPrivilege 4820 Virus-Rat.exe Token: SeDebugPrivilege 1392 Virus-Rat.exe Token: SeDebugPrivilege 3924 Virus-Rat.exe Token: SeDebugPrivilege 3728 Virus-Rat.exe Token: SeDebugPrivilege 2520 Virus-Rat.exe Token: SeDebugPrivilege 3856 Virus-Rat.exe Token: SeDebugPrivilege 1048 Virus-Rat.exe Token: SeDebugPrivilege 4364 Virus-Rat.exe Token: SeDebugPrivilege 1600 Virus-Rat.exe Token: SeDebugPrivilege 784 Virus-Rat.exe Token: SeDebugPrivilege 3776 Virus-Rat.exe Token: SeDebugPrivilege 3692 Virus-Rat.exe Token: SeDebugPrivilege 2608 Virus-Rat.exe Token: SeDebugPrivilege 2712 Virus-Rat.exe Token: SeDebugPrivilege 4496 Virus-Rat.exe Token: SeDebugPrivilege 2236 Virus-Rat.exe Token: SeDebugPrivilege 2304 Virus-Rat.exe Token: SeDebugPrivilege 1072 Virus-Rat.exe Token: SeDebugPrivilege 508 Virus-Rat.exe Token: SeDebugPrivilege 4316 Virus-Rat.exe Token: SeDebugPrivilege 4488 Virus-Rat.exe Token: SeDebugPrivilege 3516 Virus-Rat.exe Token: SeDebugPrivilege 4040 Virus-Rat.exe Token: SeDebugPrivilege 2788 Virus-Rat.exe Token: SeDebugPrivilege 2868 Virus-Rat.exe Token: SeDebugPrivilege 1168 Virus-Rat.exe Token: SeDebugPrivilege 4752 Virus-Rat.exe Token: SeDebugPrivilege 2460 Virus-Rat.exe Token: SeDebugPrivilege 1816 Virus-Rat.exe Token: SeDebugPrivilege 1836 Virus-Rat.exe Token: SeDebugPrivilege 2236 Virus-Rat.exe Token: SeDebugPrivilege 208 Virus-Rat.exe Token: SeDebugPrivilege 2684 Virus-Rat.exe Token: SeDebugPrivilege 1380 Virus-Rat.exe Token: SeDebugPrivilege 3092 Virus-Rat.exe Token: SeDebugPrivilege 5048 Virus-Rat.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe 4368 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 3796 4740 Client-built.exe 85 PID 4740 wrote to memory of 3796 4740 Client-built.exe 85 PID 4740 wrote to memory of 1384 4740 Client-built.exe 87 PID 4740 wrote to memory of 1384 4740 Client-built.exe 87 PID 1384 wrote to memory of 2764 1384 Virus-Rat.exe 88 PID 1384 wrote to memory of 2764 1384 Virus-Rat.exe 88 PID 1384 wrote to memory of 2328 1384 Virus-Rat.exe 90 PID 1384 wrote to memory of 2328 1384 Virus-Rat.exe 90 PID 2328 wrote to memory of 4732 2328 cmd.exe 92 PID 2328 wrote to memory of 4732 2328 cmd.exe 92 PID 2328 wrote to memory of 760 2328 cmd.exe 93 PID 2328 wrote to memory of 760 2328 cmd.exe 93 PID 2328 wrote to memory of 2964 2328 cmd.exe 104 PID 2328 wrote to memory of 2964 2328 cmd.exe 104 PID 2964 wrote to memory of 1920 2964 Virus-Rat.exe 108 PID 2964 wrote to memory of 1920 2964 Virus-Rat.exe 108 PID 2964 wrote to memory of 1696 2964 Virus-Rat.exe 111 PID 2964 wrote to memory of 1696 2964 Virus-Rat.exe 111 PID 1696 wrote to memory of 4580 1696 cmd.exe 113 PID 1696 wrote to memory of 4580 1696 cmd.exe 113 PID 1696 wrote to memory of 3356 1696 cmd.exe 114 PID 1696 wrote to memory of 3356 1696 cmd.exe 114 PID 1696 wrote to memory of 1940 1696 cmd.exe 123 PID 1696 wrote to memory of 1940 1696 cmd.exe 123 PID 1940 wrote to memory of 344 1940 Virus-Rat.exe 124 PID 1940 wrote to memory of 344 1940 Virus-Rat.exe 124 PID 1940 wrote to memory of 3748 1940 Virus-Rat.exe 127 PID 1940 wrote to memory of 3748 1940 Virus-Rat.exe 127 PID 3748 wrote to memory of 64 3748 cmd.exe 129 PID 3748 wrote to memory of 64 3748 cmd.exe 129 PID 3748 wrote to memory of 4640 3748 cmd.exe 130 PID 3748 wrote to memory of 4640 3748 cmd.exe 130 PID 3748 wrote to memory of 1920 3748 cmd.exe 134 PID 3748 wrote to memory of 1920 3748 cmd.exe 134 PID 1920 wrote to memory of 116 1920 Virus-Rat.exe 135 PID 1920 wrote to memory of 116 1920 Virus-Rat.exe 135 PID 1920 wrote to memory of 1972 1920 Virus-Rat.exe 138 PID 1920 wrote to memory of 1972 1920 Virus-Rat.exe 138 PID 1972 wrote to memory of 3060 1972 cmd.exe 140 PID 1972 wrote to memory of 3060 1972 cmd.exe 140 PID 1972 wrote to memory of 4984 1972 cmd.exe 141 PID 1972 wrote to memory of 4984 1972 cmd.exe 141 PID 1972 wrote to memory of 4064 1972 cmd.exe 143 PID 1972 wrote to memory of 4064 1972 cmd.exe 143 PID 4064 wrote to memory of 1852 4064 Virus-Rat.exe 144 PID 4064 wrote to memory of 1852 4064 Virus-Rat.exe 144 PID 4064 wrote to memory of 1616 4064 Virus-Rat.exe 147 PID 4064 wrote to memory of 1616 4064 Virus-Rat.exe 147 PID 1616 wrote to memory of 4372 1616 cmd.exe 149 PID 1616 wrote to memory of 4372 1616 cmd.exe 149 PID 1616 wrote to memory of 3036 1616 cmd.exe 150 PID 1616 wrote to memory of 3036 1616 cmd.exe 150 PID 1616 wrote to memory of 452 1616 cmd.exe 152 PID 1616 wrote to memory of 452 1616 cmd.exe 152 PID 452 wrote to memory of 660 452 Virus-Rat.exe 153 PID 452 wrote to memory of 660 452 Virus-Rat.exe 153 PID 452 wrote to memory of 1600 452 Virus-Rat.exe 156 PID 452 wrote to memory of 1600 452 Virus-Rat.exe 156 PID 1600 wrote to memory of 4260 1600 cmd.exe 158 PID 1600 wrote to memory of 4260 1600 cmd.exe 158 PID 1600 wrote to memory of 396 1600 cmd.exe 159 PID 1600 wrote to memory of 396 1600 cmd.exe 159 PID 1600 wrote to memory of 4976 1600 cmd.exe 161 PID 1600 wrote to memory of 4976 1600 cmd.exe 161 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3796
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f3⤵PID:2764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\o5ut1ZKWNc9n.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:760
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qNITi7mkZgOL.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:4580
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:3356
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f7⤵PID:344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WnXbfzHhFkro.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:64
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4640
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f9⤵PID:116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zMP2FV7jlgJo.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:3060
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4984
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:1852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yjtiikWghi9t.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:4372
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f13⤵PID:660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GxS8GTJoqRm6.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:4260
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:396
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4976 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:2524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tLzoWoiGTXVM.bat" "15⤵PID:1172
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1072
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4384 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:4548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7E1NorHFNcr0.bat" "17⤵PID:2340
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
PID:4860
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f19⤵PID:3576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fjnaJRNvqJZB.bat" "19⤵PID:2084
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:2832
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:1392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KwrlxlyyR2ti.bat" "21⤵PID:4560
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:3588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3656
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:3236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\u4pFs1VB3i1I.bat" "23⤵PID:556
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:5100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1224
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0qhRm6RFPsOM.bat" "25⤵PID:1996
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:3728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
PID:3564
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4208 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f27⤵PID:1852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3Cl5KNnPlAPU.bat" "27⤵PID:2572
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3352
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5116
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f29⤵PID:4280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qS94VGEpB9bs.bat" "29⤵PID:3212
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:4868
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1392
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3504 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:4476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\533xHITsUlS4.bat" "31⤵PID:3924
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵PID:1264
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f33⤵PID:1764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RJdxmeMQ4SW9.bat" "33⤵PID:5004
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4828
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:388
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:4644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dn8Un1qLuiOF.bat" "35⤵PID:4844
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:220
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1132
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3712 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:4064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ynUjBZSbG6JS.bat" "37⤵PID:936
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:3104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:816
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f39⤵PID:1016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wJoierGNEU8Y.bat" "39⤵PID:1892
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:2704
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4084
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:4340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9Shc3ZJnIySS.bat" "41⤵PID:2084
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:1608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1212
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f43⤵PID:3200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nArQVOLYhzLa.bat" "43⤵PID:4932
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:3656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4772
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f45⤵PID:216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xeNwWD8aNNNK.bat" "45⤵PID:2968
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:1616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
PID:4108
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:4024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dIlAP5xzPYgE.bat" "47⤵PID:4712
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:1168
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
PID:508
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f49⤵PID:3104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AJqPallWYUI1.bat" "49⤵PID:2448
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:4984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3292
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:3076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PYc8cKRPRQFB.bat" "51⤵PID:3620
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:64
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
PID:1152
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:4708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VwcWjqp4j04g.bat" "53⤵PID:3584
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:1108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2936
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PBaHdvCgfJk0.bat" "55⤵PID:3368
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:4640
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f57⤵
- Scheduled Task/Job: Scheduled Task
PID:4644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aOpjPW3rzITo.bat" "57⤵PID:3736
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:3544
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- Runs ping.exe
PID:1852
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RcFuAlPee7Ry.bat" "59⤵PID:3352
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:4564
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4032
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:60
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tiY91pouirs8.bat" "61⤵PID:5116
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:4884
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:344
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:3276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JSlTRhfBeOvO.bat" "63⤵PID:3864
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:3588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3424
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f65⤵
- Scheduled Task/Job: Scheduled Task
PID:4272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qx4QeBoXSCwF.bat" "65⤵PID:1008
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:2116
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3168
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:2396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tJjCsXD9tNPa.bat" "67⤵PID:4636
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:2788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2336
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"68⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:4948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RtkSgWOexLbl.bat" "69⤵PID:2276
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:4236
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵PID:5072
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"70⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3776 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f71⤵PID:1356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9FeeqrlXiKv2.bat" "71⤵PID:368
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:4412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4656
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"72⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:1304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\p8aSC4JExbQL.bat" "73⤵PID:2108
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:1956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:60
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"74⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2608 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f75⤵PID:1104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C7T7k26sRwRQ.bat" "75⤵PID:4848
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:544
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4416
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"76⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f77⤵PID:4500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8BbU3X6SGmHT.bat" "77⤵PID:4384
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:4020
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3492
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"78⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4496 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:5036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tCU7kIeE0Km3.bat" "79⤵PID:1536
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:2540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3304
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"80⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:2556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\THdmeQTh7hvP.bat" "81⤵PID:4580
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:4520
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- Runs ping.exe
PID:4376
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"82⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2304 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:4468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OzV178P9bJ3O.bat" "83⤵PID:3320
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1672
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"84⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:3896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l4fGFMjlHRim.bat" "85⤵PID:1852
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:2684
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3736
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"86⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:508 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f87⤵
- Scheduled Task/Job: Scheduled Task
PID:4980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d70ET8bKJK82.bat" "87⤵PID:1568
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:924
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3768
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"88⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4316 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:1668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3IidPMWCrbpK.bat" "89⤵PID:3292
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:2744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3288
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"90⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f91⤵
- Scheduled Task/Job: Scheduled Task
PID:4836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\i0AjtQTLijQ3.bat" "91⤵PID:452
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:3268
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1108
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"92⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f93⤵
- Scheduled Task/Job: Scheduled Task
PID:1092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fhEq9MSH2kMf.bat" "93⤵PID:2540
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:1748
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- Runs ping.exe
PID:4104
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"94⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:2116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zy4fKiwkvcdr.bat" "95⤵PID:4420
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:4740
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3748
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"96⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:3236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7Q43tKMVaSKl.bat" "97⤵PID:2708
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:1032
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- Runs ping.exe
PID:208
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"98⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:3696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ahXR3yC6HQ4Q.bat" "99⤵PID:4108
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:2032
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:880
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"100⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f101⤵
- Scheduled Task/Job: Scheduled Task
PID:1508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\W80omqa2uag2.bat" "101⤵PID:5020
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:844
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4216
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:3768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tsGeDtX6YPOY.bat" "103⤵PID:2608
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:2744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- Runs ping.exe
PID:1220
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"104⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vzrqh3vDiI7g.bat" "105⤵PID:868
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:1564
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4296
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"106⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f107⤵PID:2712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IeR0dgqBFnqF.bat" "107⤵PID:2036
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:2884
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2120
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"108⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f109⤵PID:3036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tNXbgquiGwRs.bat" "109⤵PID:3304
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:1764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4460
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"110⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f111⤵
- Scheduled Task/Job: Scheduled Task
PID:4156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H0ZAEdgM9B2I.bat" "111⤵PID:3500
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:2612
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵PID:1616
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"112⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:208 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f113⤵
- Scheduled Task/Job: Scheduled Task
PID:2708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oCJ2DsRGCSWF.bat" "113⤵PID:4828
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:4768
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:744
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"114⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f115⤵
- Scheduled Task/Job: Scheduled Task
PID:4920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\t3VbdwoWnDjf.bat" "115⤵PID:976
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:2324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4512
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"116⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vkUA0OYaNTlQ.bat" "117⤵PID:1176
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:3344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2176
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"118⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f119⤵PID:2956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EGa6nnDM1KL8.bat" "119⤵PID:3248
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:3864
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:732
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"120⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:1196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KuG6pDpnt3qq.bat" "121⤵PID:4456
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:2136
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-