Overview
overview
10Static
static
10e1dcb9ba72...29.exe
windows7-x64
3e1dcb9ba72...29.exe
windows10-2004-x64
3e2071b429e...5c.exe
windows7-x64
10e2071b429e...5c.exe
windows10-2004-x64
10e249dbf0ac...f4.exe
windows7-x64
8e249dbf0ac...f4.exe
windows10-2004-x64
8e277271cc7...e8.exe
windows7-x64
10e277271cc7...e8.exe
windows10-2004-x64
10e282def0d2...89.exe
windows7-x64
10e282def0d2...89.exe
windows10-2004-x64
10e29645b977...39.exe
windows7-x64
7e29645b977...39.exe
windows10-2004-x64
7e2bfb9c5da...0c.exe
windows7-x64
1e2bfb9c5da...0c.exe
windows10-2004-x64
1e316eea789...fa.exe
windows7-x64
1e316eea789...fa.exe
windows10-2004-x64
1e3250ba3e9...f9.exe
windows7-x64
10e3250ba3e9...f9.exe
windows10-2004-x64
10e34a914ca2...b1.exe
windows7-x64
10e34a914ca2...b1.exe
windows10-2004-x64
10e37b2913aa...c6.exe
windows7-x64
10e37b2913aa...c6.exe
windows10-2004-x64
10e37c63b72b...0d.exe
windows7-x64
10e37c63b72b...0d.exe
windows10-2004-x64
10e37cf80804...e0.exe
windows7-x64
10e37cf80804...e0.exe
windows10-2004-x64
10e3a2f6c598...82.exe
windows7-x64
1e3a2f6c598...82.exe
windows10-2004-x64
1e3a86fc42d...62.exe
windows7-x64
9e3a86fc42d...62.exe
windows10-2004-x64
9e3e3053d34...10.exe
windows7-x64
10e3e3053d34...10.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
e1dcb9ba72b5d530a7025537eed091187313975f51f1a4756d379129a1eaa629.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1dcb9ba72b5d530a7025537eed091187313975f51f1a4756d379129a1eaa629.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
e2071b429ed0a109ba6ae98cc6bd94651c73805963058322d9ab5fc3ad8c385c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
e2071b429ed0a109ba6ae98cc6bd94651c73805963058322d9ab5fc3ad8c385c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
e249dbf0acda03b41cc7ffb9d3ffe996eb648e79ec5b514d819180faebef48f4.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
e249dbf0acda03b41cc7ffb9d3ffe996eb648e79ec5b514d819180faebef48f4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
e277271cc70bc12cb5a62950728025e8.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
e277271cc70bc12cb5a62950728025e8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
e282def0d26b0a0ace50c80bd0d3e389.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
e282def0d26b0a0ace50c80bd0d3e389.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
e29645b97716a1a1d083e644500c71a7e2a3c20f8c6812785f6242461eccfe39.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
e29645b97716a1a1d083e644500c71a7e2a3c20f8c6812785f6242461eccfe39.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
e2bfb9c5dab6674c2bd9eec1f66e4f0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
e2bfb9c5dab6674c2bd9eec1f66e4f0c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
e316eea78900620a3194bc604bab1d058ec60832baa6df78d0795ebee9ecd6fa.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
e316eea78900620a3194bc604bab1d058ec60832baa6df78d0795ebee9ecd6fa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
e3250ba3e962ddf90560e00c92659cf9.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
e3250ba3e962ddf90560e00c92659cf9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
e34a914ca2b4fd7d490bd7fa0893c9b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
e34a914ca2b4fd7d490bd7fa0893c9b1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
e37b2913aafb08ae275e16364b9916c6.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
e37b2913aafb08ae275e16364b9916c6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
e37c63b72b4dd8c6a148989a74f33e54278e68275a33bcd9bab0dbac29e5af0d.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
e37c63b72b4dd8c6a148989a74f33e54278e68275a33bcd9bab0dbac29e5af0d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
e3a2f6c598bc05769da36673f1f02c90f737d5293bf16ba0c839e92cf4258382.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
e3a2f6c598bc05769da36673f1f02c90f737d5293bf16ba0c839e92cf4258382.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
e3a86fc42dbea243f01ab5183b1e1f0c1907b4b6d46428df1d055ceb3dc9f662.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
e3a86fc42dbea243f01ab5183b1e1f0c1907b4b6d46428df1d055ceb3dc9f662.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe
Resource
win10v2004-20250314-en
General
-
Target
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
-
Size
563KB
-
MD5
2b846d776f1a6fbe1ec811a245da8143
-
SHA1
ecc293b1fc5be7e85f69f423817dbbcb090d76c2
-
SHA256
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0
-
SHA512
ea5640d2abf98c22415b443ea1debb71bc218c8f02ae1f86444d57e0ca524b04158c6e91f0ea3b80b4fddc1687d77c954e4f6f7f6bf533774a17e1f642beaa56
-
SSDEEP
6144:+mLrULcs2P7uZA3j41e6VlWT8b9EheZw/uzQ7Ozl449NYI0VxWRbX12Vvz:3+N8+1PVle8RZB4OY1Wr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\Videos\\xdwdSpybot - Search & Destroy.exe" e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Loads dropped DLL 41 IoCs
pid Process 364 Process not Found 6052 Process not Found 3744 Process not Found 4364 Process not Found 1192 Process not Found 3612 Process not Found 2760 Process not Found 6068 Process not Found 5864 Process not Found 2240 Process not Found 5252 Process not Found 3396 Process not Found 924 Process not Found 1492 Process not Found 5480 Process not Found 1080 Process not Found 2040 Process not Found 5752 Process not Found 5204 Process not Found 3388 Process not Found 5256 Process not Found 1960 Process not Found 6072 Process not Found 2400 Process not Found 5092 Process not Found 5036 Process not Found 4284 Process not Found 4568 Process not Found 1804 Process not Found 5628 Process not Found 3892 Process not Found 532 Process not Found 4312 Process not Found 4960 Process not Found 5820 Process not Found 1932 Process not Found 5404 Process not Found 4640 Process not Found 4744 Process not Found 1332 Process not Found 4432 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System32 = "C:\\Users\\Admin\\AppData\\Roaming\\xdwdUnreal Engine.exe" e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 41 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 824 schtasks.exe 5824 schtasks.exe 5380 schtasks.exe 4120 schtasks.exe 4264 schtasks.exe 2156 schtasks.exe 216 schtasks.exe 696 schtasks.exe 2432 schtasks.exe 6132 schtasks.exe 3744 schtasks.exe 2272 schtasks.exe 1704 schtasks.exe 6124 schtasks.exe 4332 schtasks.exe 5248 schtasks.exe 996 schtasks.exe 3944 schtasks.exe 1192 schtasks.exe 6056 schtasks.exe 5344 schtasks.exe 1832 schtasks.exe 1168 schtasks.exe 5252 schtasks.exe 5776 schtasks.exe 3600 schtasks.exe 3400 schtasks.exe 4492 schtasks.exe 3112 schtasks.exe 5736 schtasks.exe 332 schtasks.exe 636 schtasks.exe 3480 schtasks.exe 4996 schtasks.exe 5632 schtasks.exe 5284 schtasks.exe 1988 schtasks.exe 4280 schtasks.exe 5824 schtasks.exe 4960 schtasks.exe 3584 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5228 wrote to memory of 6080 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 97 PID 5228 wrote to memory of 6080 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 97 PID 6080 wrote to memory of 824 6080 CMD.exe 99 PID 6080 wrote to memory of 824 6080 CMD.exe 99 PID 5228 wrote to memory of 2176 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 100 PID 5228 wrote to memory of 2176 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 100 PID 2176 wrote to memory of 1988 2176 CMD.exe 102 PID 2176 wrote to memory of 1988 2176 CMD.exe 102 PID 5228 wrote to memory of 1372 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 103 PID 5228 wrote to memory of 1372 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 103 PID 1372 wrote to memory of 6056 1372 CMD.exe 105 PID 1372 wrote to memory of 6056 1372 CMD.exe 105 PID 5228 wrote to memory of 2972 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 106 PID 5228 wrote to memory of 2972 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 106 PID 2972 wrote to memory of 4280 2972 CMD.exe 108 PID 2972 wrote to memory of 4280 2972 CMD.exe 108 PID 5228 wrote to memory of 1228 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 109 PID 5228 wrote to memory of 1228 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 109 PID 1228 wrote to memory of 5824 1228 CMD.exe 111 PID 1228 wrote to memory of 5824 1228 CMD.exe 111 PID 5228 wrote to memory of 1916 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 112 PID 5228 wrote to memory of 1916 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 112 PID 1916 wrote to memory of 696 1916 CMD.exe 114 PID 1916 wrote to memory of 696 1916 CMD.exe 114 PID 5228 wrote to memory of 1896 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 120 PID 5228 wrote to memory of 1896 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 120 PID 5228 wrote to memory of 6076 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 129 PID 5228 wrote to memory of 6076 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 129 PID 6076 wrote to memory of 2272 6076 CMD.exe 131 PID 6076 wrote to memory of 2272 6076 CMD.exe 131 PID 5228 wrote to memory of 2844 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 132 PID 5228 wrote to memory of 2844 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 132 PID 2844 wrote to memory of 636 2844 CMD.exe 134 PID 2844 wrote to memory of 636 2844 CMD.exe 134 PID 5228 wrote to memory of 1372 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 135 PID 5228 wrote to memory of 1372 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 135 PID 1372 wrote to memory of 1832 1372 CMD.exe 137 PID 1372 wrote to memory of 1832 1372 CMD.exe 137 PID 5228 wrote to memory of 5868 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 138 PID 5228 wrote to memory of 5868 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 138 PID 5868 wrote to memory of 5824 5868 CMD.exe 140 PID 5868 wrote to memory of 5824 5868 CMD.exe 140 PID 5228 wrote to memory of 4972 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 141 PID 5228 wrote to memory of 4972 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 141 PID 4972 wrote to memory of 4960 4972 CMD.exe 143 PID 4972 wrote to memory of 4960 4972 CMD.exe 143 PID 5228 wrote to memory of 4332 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 144 PID 5228 wrote to memory of 4332 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 144 PID 4332 wrote to memory of 4120 4332 CMD.exe 146 PID 4332 wrote to memory of 4120 4332 CMD.exe 146 PID 5228 wrote to memory of 3204 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 147 PID 5228 wrote to memory of 3204 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 147 PID 3204 wrote to memory of 1168 3204 CMD.exe 149 PID 3204 wrote to memory of 1168 3204 CMD.exe 149 PID 5228 wrote to memory of 3680 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 150 PID 5228 wrote to memory of 3680 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 150 PID 3680 wrote to memory of 1704 3680 CMD.exe 152 PID 3680 wrote to memory of 1704 3680 CMD.exe 152 PID 5228 wrote to memory of 5212 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 153 PID 5228 wrote to memory of 5212 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 153 PID 5212 wrote to memory of 3480 5212 CMD.exe 155 PID 5212 wrote to memory of 3480 5212 CMD.exe 155 PID 5228 wrote to memory of 1992 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 157 PID 5228 wrote to memory of 1992 5228 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 157 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe"C:\Users\Admin\AppData\Local\Temp\e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5228 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Project" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:6080 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Project" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:824
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1988
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Dropbox" /tr "C:\Users\Admin\AppData\Roaming\xdwdUnreal Engine.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Dropbox" /tr "C:\Users\Admin\AppData\Roaming\xdwdUnreal Engine.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:6056
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4280
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5824
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:696
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:1896
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5380
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:6076 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2272
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:636
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1832
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5868 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5824
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4960
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4120
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1168
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1704
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5212 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3480
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:1992
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4492
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2408
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:6124
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:5472
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4996
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:640
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5344
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2972
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5252
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:5468
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2432
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2024
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4332
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2816
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5776
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:4592
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3112
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:4052
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5632
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:1924
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:6132
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:4620
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3600
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:1516
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5248
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:6124
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4264
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:4576
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5284
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:1396
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3584
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:5236
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3744
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:6084
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:996
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:3624
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2156
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2224
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3944
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:5092
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1192
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:5632
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:216
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:4748
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5736
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2180
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:332
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:5420
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3400
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6