Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1011a186984a...8e.exe
windows7-x64
1011a186984a...8e.exe
windows10-2004-x64
1012085ebb04...95.exe
windows7-x64
712085ebb04...95.exe
windows10-2004-x64
712106013cf...70.exe
windows7-x64
712106013cf...70.exe
windows10-2004-x64
1012199d72af...85.exe
windows7-x64
712199d72af...85.exe
windows10-2004-x64
71221040998...44.exe
windows7-x64
11221040998...44.exe
windows10-2004-x64
1124dba0b2d...f5.exe
windows7-x64
10124dba0b2d...f5.exe
windows10-2004-x64
101277e3138b...40.exe
windows7-x64
71277e3138b...40.exe
windows10-2004-x64
7128d992668...24.exe
windows7-x64
128d992668...24.exe
windows10-2004-x64
12ad57fc11...51.exe
windows7-x64
1012ad57fc11...51.exe
windows10-2004-x64
1012c28767fd...83.exe
windows7-x64
712c28767fd...83.exe
windows10-2004-x64
712c96664a8...ef.exe
windows7-x64
112c96664a8...ef.exe
windows10-2004-x64
812d3790d20...e3.exe
windows7-x64
1012d3790d20...e3.exe
windows10-2004-x64
1012e02e413d...cd.exe
windows7-x64
1012e02e413d...cd.exe
windows10-2004-x64
101300fbf843...ba.exe
windows7-x64
11300fbf843...ba.exe
windows10-2004-x64
11302b023e7...d0.exe
windows7-x64
101302b023e7...d0.exe
windows10-2004-x64
10132d07a999...ba.exe
windows7-x64
10132d07a999...ba.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:08
Behavioral task
behavioral1
Sample
11a186984a7cc6c1fd4317dffed3a78e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11a186984a7cc6c1fd4317dffed3a78e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
12085ebb04414916835a2dbcd2cdfa95.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
12085ebb04414916835a2dbcd2cdfa95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
12106013cf4b5ee1826ab514eb4f7270.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
12106013cf4b5ee1826ab514eb4f7270.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
12199d72af0652fdf09349f59304d485.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
12199d72af0652fdf09349f59304d485.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
1221040998425fdd5a21132a64664d44.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
1221040998425fdd5a21132a64664d44.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
124dba0b2dc9c0fbfca662c90c117b8d64b655ae41744a3ac84f9e4772e722f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
124dba0b2dc9c0fbfca662c90c117b8d64b655ae41744a3ac84f9e4772e722f5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
1277e3138bd062ad1b4496b667377740.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
1277e3138bd062ad1b4496b667377740.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
128d99266894940572aa679491991ffa32c69a3f30b328a316ff2106d88bbf24.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
128d99266894940572aa679491991ffa32c69a3f30b328a316ff2106d88bbf24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
12ad57fc1129bbd8f479ba77406cf3b88d6da57c734a97299bb080341edefc51.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
12ad57fc1129bbd8f479ba77406cf3b88d6da57c734a97299bb080341edefc51.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
12c28767fd63064bd07e6679f2c45083.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
12c28767fd63064bd07e6679f2c45083.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
12c96664a866ff277b9245ef96eb64bd45af3f29145600b828a14312ba332fef.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
12c96664a866ff277b9245ef96eb64bd45af3f29145600b828a14312ba332fef.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
12d3790d20dcd64ff72360ebd3b199e3.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
12d3790d20dcd64ff72360ebd3b199e3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
12e02e413d59c118fb50dcbf2f8ef3cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
12e02e413d59c118fb50dcbf2f8ef3cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
1300fbf843b8fcf8554979a45a3e48ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
1300fbf843b8fcf8554979a45a3e48ba.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
132d07a999d32afb20d86ba84981ceed907353b3d7b5b0aae98c59759c41e3ba.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
132d07a999d32afb20d86ba84981ceed907353b3d7b5b0aae98c59759c41e3ba.exe
Resource
win10v2004-20250314-en
General
-
Target
1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe
-
Size
292KB
-
MD5
2c8710e45af4a4ad7b9302039b54e9f2
-
SHA1
c538d61838ff6dea5af244da9cc166230d97d6d8
-
SHA256
1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0
-
SHA512
4b6862bf7d13835b70577140de686a5beda617bbbe1af6655bf86942fb2b93bc04d8f3c1414b1884005fcfc1530fa28efe5bcb445f1b5c3eedafda6a1dbe9bf2
-
SSDEEP
6144:EHs491fPeXle6VlWT8b9nBSb64H5Xbfr:qH9elPVle8FgVZLr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Public\\Documents\\xdwdMicrosoft Security Essentials.exe" 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 47 IoCs
pid Process 5808 Process not Found 3532 Process not Found 5704 Process not Found 3604 Process not Found 2200 Process not Found 4140 Process not Found 1672 Process not Found 4604 Process not Found 3984 Process not Found 5268 Process not Found 2448 Process not Found 1168 Process not Found 4972 Process not Found 184 Process not Found 6132 Process not Found 1060 Process not Found 5136 Process not Found 5580 Process not Found 1824 Process not Found 1004 Process not Found 3088 Process not Found 232 Process not Found 1168 Process not Found 5096 Process not Found 4060 Process not Found 4900 Process not Found 4876 Process not Found 3928 Process not Found 5756 Process not Found 1744 Process not Found 5844 Process not Found 5852 Process not Found 5700 Process not Found 4292 Process not Found 5512 Process not Found 5008 Process not Found 5484 Process not Found 4316 Process not Found 4472 Process not Found 2760 Process not Found 1256 Process not Found 1504 Process not Found 1644 Process not Found 5552 Process not Found 3964 Process not Found 2448 Process not Found 4772 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xdwdfghfghfg = "C:\\Users\\Public\\Pictures\\xdwdRainmeter.exe" 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 46 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1204 schtasks.exe 4928 schtasks.exe 3944 schtasks.exe 532 schtasks.exe 3420 schtasks.exe 4928 schtasks.exe 4728 schtasks.exe 5196 schtasks.exe 4492 schtasks.exe 4500 schtasks.exe 4344 schtasks.exe 3144 schtasks.exe 2692 schtasks.exe 6004 schtasks.exe 5804 schtasks.exe 3016 schtasks.exe 4300 schtasks.exe 2132 schtasks.exe 3108 schtasks.exe 5196 schtasks.exe 4860 schtasks.exe 3112 schtasks.exe 5272 schtasks.exe 2944 schtasks.exe 5792 schtasks.exe 3604 schtasks.exe 2332 schtasks.exe 5680 schtasks.exe 1424 schtasks.exe 5656 schtasks.exe 5108 schtasks.exe 4040 schtasks.exe 4940 schtasks.exe 2236 schtasks.exe 2912 schtasks.exe 6016 schtasks.exe 3976 schtasks.exe 4580 schtasks.exe 2592 schtasks.exe 3532 schtasks.exe 5628 schtasks.exe 2380 schtasks.exe 4180 schtasks.exe 4920 schtasks.exe 532 schtasks.exe 5724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 4988 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 92 PID 2316 wrote to memory of 4988 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 92 PID 4988 wrote to memory of 4920 4988 CMD.exe 94 PID 4988 wrote to memory of 4920 4988 CMD.exe 94 PID 2316 wrote to memory of 6088 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 95 PID 2316 wrote to memory of 6088 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 95 PID 6088 wrote to memory of 4928 6088 CMD.exe 97 PID 6088 wrote to memory of 4928 6088 CMD.exe 97 PID 2316 wrote to memory of 1128 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 98 PID 2316 wrote to memory of 1128 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 98 PID 1128 wrote to memory of 2236 1128 CMD.exe 100 PID 1128 wrote to memory of 2236 1128 CMD.exe 100 PID 2316 wrote to memory of 1100 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 101 PID 2316 wrote to memory of 1100 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 101 PID 1100 wrote to memory of 4940 1100 CMD.exe 103 PID 1100 wrote to memory of 4940 1100 CMD.exe 103 PID 2316 wrote to memory of 4004 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 105 PID 2316 wrote to memory of 4004 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 105 PID 4004 wrote to memory of 1424 4004 CMD.exe 107 PID 4004 wrote to memory of 1424 4004 CMD.exe 107 PID 2316 wrote to memory of 5912 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 109 PID 2316 wrote to memory of 5912 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 109 PID 5912 wrote to memory of 5656 5912 CMD.exe 111 PID 5912 wrote to memory of 5656 5912 CMD.exe 111 PID 2316 wrote to memory of 5440 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 112 PID 2316 wrote to memory of 5440 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 112 PID 5440 wrote to memory of 532 5440 CMD.exe 114 PID 5440 wrote to memory of 532 5440 CMD.exe 114 PID 2316 wrote to memory of 5004 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 115 PID 2316 wrote to memory of 5004 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 115 PID 5004 wrote to memory of 2132 5004 CMD.exe 117 PID 5004 wrote to memory of 2132 5004 CMD.exe 117 PID 2316 wrote to memory of 3444 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 119 PID 2316 wrote to memory of 3444 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 119 PID 3444 wrote to memory of 3108 3444 CMD.exe 121 PID 3444 wrote to memory of 3108 3444 CMD.exe 121 PID 2316 wrote to memory of 5548 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 122 PID 2316 wrote to memory of 5548 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 122 PID 5548 wrote to memory of 3944 5548 CMD.exe 124 PID 5548 wrote to memory of 3944 5548 CMD.exe 124 PID 2316 wrote to memory of 5904 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 125 PID 2316 wrote to memory of 5904 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 125 PID 5904 wrote to memory of 5196 5904 CMD.exe 127 PID 5904 wrote to memory of 5196 5904 CMD.exe 127 PID 2316 wrote to memory of 5436 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 128 PID 2316 wrote to memory of 5436 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 128 PID 5436 wrote to memory of 4500 5436 CMD.exe 130 PID 5436 wrote to memory of 4500 5436 CMD.exe 130 PID 2316 wrote to memory of 3480 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 133 PID 2316 wrote to memory of 3480 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 133 PID 3480 wrote to memory of 2912 3480 CMD.exe 135 PID 3480 wrote to memory of 2912 3480 CMD.exe 135 PID 2316 wrote to memory of 692 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 136 PID 2316 wrote to memory of 692 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 136 PID 692 wrote to memory of 3532 692 CMD.exe 138 PID 692 wrote to memory of 3532 692 CMD.exe 138 PID 2316 wrote to memory of 4876 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 140 PID 2316 wrote to memory of 4876 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 140 PID 4876 wrote to memory of 4344 4876 CMD.exe 142 PID 4876 wrote to memory of 4344 4876 CMD.exe 142 PID 2316 wrote to memory of 5380 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 144 PID 2316 wrote to memory of 5380 2316 1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe 144 PID 5380 wrote to memory of 532 5380 CMD.exe 146 PID 5380 wrote to memory of 532 5380 CMD.exe 146 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe"C:\Users\Admin\AppData\Local\Temp\1302b023e7a6467907a6e1d40829dbfda775881d842b72f6b58ac85e92d559d0.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "HandBrake" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "HandBrake" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4920
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:6088 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4928
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Evernote" /tr "C:\Users\Public\Pictures\xdwdRainmeter.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Evernote" /tr "C:\Users\Public\Pictures\xdwdRainmeter.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2236
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4940
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1424
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5912 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5656
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:532
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2132
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3108
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5548 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3944
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5904 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5196
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5436 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4500
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3532
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4344
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5380 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:532
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:1092
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5628
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:1752
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3144
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:3964
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3420
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:5712
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:6016
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2192
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:4868
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2380
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:1552
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4928
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:4844
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5792
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:4484
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4860
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:4580
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5108
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:4636
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4728
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:5760
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4040
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2372
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:6004
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2032
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3112
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:1436
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5804
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2040
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5196
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:3692
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4492
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2380
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3016
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2928
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3976
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:4940
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3604
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:4732
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4300
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:5732
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2836
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4580
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:5248
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5724
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:1696
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5272
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:5936
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4180
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:5596
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5680
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2004
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1204
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:3416
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST & exit2⤵PID:2820
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "MATLAB" /tr "C:\Users\Public\Documents\xdwdMicrosoft Security Essentials.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6