Overview
overview
10Static
static
1063bc6776b7...3b.exe
windows7-x64
1063bc6776b7...3b.exe
windows10-2004-x64
10641434cfae...75.exe
windows7-x64
10641434cfae...75.exe
windows10-2004-x64
10642fefb64c...0c.exe
windows7-x64
10642fefb64c...0c.exe
windows10-2004-x64
106433ad2b9d...59.exe
windows7-x64
106433ad2b9d...59.exe
windows10-2004-x64
1064402f0d8e...c0.exe
windows7-x64
1064402f0d8e...c0.exe
windows10-2004-x64
106443d92f8c...ff.exe
windows7-x64
106443d92f8c...ff.exe
windows10-2004-x64
10647ab91c93...52.exe
windows7-x64
1647ab91c93...52.exe
windows10-2004-x64
1064a6177287...fd.exe
windows7-x64
164a6177287...fd.exe
windows10-2004-x64
164cb9bc958...bf.exe
windows7-x64
364cb9bc958...bf.exe
windows10-2004-x64
364d77182d5...9a.exe
windows7-x64
1064d77182d5...9a.exe
windows10-2004-x64
1064f4533af0...b2.exe
windows7-x64
1064f4533af0...b2.exe
windows10-2004-x64
10650411faaa...82.exe
windows7-x64
10650411faaa...82.exe
windows10-2004-x64
1065099e4d1a...a3.exe
windows7-x64
765099e4d1a...a3.exe
windows10-2004-x64
76568e08910...e3.exe
windows7-x64
106568e08910...e3.exe
windows10-2004-x64
10656d929530...ab.exe
windows7-x64
10656d929530...ab.exe
windows10-2004-x64
1065720da539...b1.exe
windows7-x64
1065720da539...b1.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:11
Behavioral task
behavioral1
Sample
63bc6776b78545b5e68372b858dc903b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63bc6776b78545b5e68372b858dc903b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
641434cfae2a1d91473c0acaa431299740a85fa7008a30e2cfa100dba19e4a75.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
641434cfae2a1d91473c0acaa431299740a85fa7008a30e2cfa100dba19e4a75.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
642fefb64c917e4bfd08481bb0727b0c.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
642fefb64c917e4bfd08481bb0727b0c.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
6433ad2b9da636f9059c27cf6a0f9a59.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
6433ad2b9da636f9059c27cf6a0f9a59.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
64402f0d8e48be50cf9751b33f85d1c0.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
64402f0d8e48be50cf9751b33f85d1c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
647ab91c9355e42a7d39ffda3cedfa52.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
647ab91c9355e42a7d39ffda3cedfa52.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
64a6177287d88d0d420ed321ca3a7a447d4458564f7297262bfa96b77107e6fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
64a6177287d88d0d420ed321ca3a7a447d4458564f7297262bfa96b77107e6fd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
64cb9bc958e235b6acb2da12523bf9bf.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
64cb9bc958e235b6acb2da12523bf9bf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
64d77182d5d559f24eac8d7dc728bb9a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
64d77182d5d559f24eac8d7dc728bb9a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
64f4533af02b80feba9bf2a759275bb2.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
64f4533af02b80feba9bf2a759275bb2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
650411faaa2265f31bf28d4276b14f82.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
650411faaa2265f31bf28d4276b14f82.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
65099e4d1aa799000e529ebfb194fca3.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
65099e4d1aa799000e529ebfb194fca3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
6568e08910efb944663d1ebc8ef4693849bdd01571f3698d389fc43b09c8dfe3.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
6568e08910efb944663d1ebc8ef4693849bdd01571f3698d389fc43b09c8dfe3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
656d9295309f4be629d6be73cbe53495b77b1a0cfc3a693e73de5ef3b39700ab.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
656d9295309f4be629d6be73cbe53495b77b1a0cfc3a693e73de5ef3b39700ab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
65720da539dfc37aaa5a4ae46f696cb1.exe
Resource
win7-20241023-en
General
-
Target
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe
-
Size
402KB
-
MD5
1239250e00e12134114d4e2db1a01919
-
SHA1
21703d663fc91ba5df42436f5ed882723916041c
-
SHA256
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff
-
SHA512
4703ac430a44bc943b92a9b80877407df50c0e02ab687eb9d3c8b483ba1f8dc0774bc36fd26fe1c36e0c9960a6ca16dc88fa0506f82d0ccb883255d964fe1f79
-
SSDEEP
6144:78AVcrit0NZuJl1e6VlWT8b9vb+zE1P78doDbG5/4/1V1hQ:78A+GhPVle8Ezbdoup4tV1hQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Program Files\\xdwdMATLAB.exe" 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\skkjkjjoiooi = "C:\\Users\\Admin\\Videos\\xdwdLightroom.exe" 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\xdwdMATLAB.exe 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe File opened for modification C:\Program Files\xdwdMATLAB.exe 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 41 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe 892 schtasks.exe 3052 schtasks.exe 2184 schtasks.exe 1868 schtasks.exe 2720 schtasks.exe 2532 schtasks.exe 2880 schtasks.exe 1760 schtasks.exe 2408 schtasks.exe 2056 schtasks.exe 2952 schtasks.exe 2316 schtasks.exe 2984 schtasks.exe 2288 schtasks.exe 1948 schtasks.exe 2816 schtasks.exe 1980 schtasks.exe 2996 schtasks.exe 1256 schtasks.exe 1612 schtasks.exe 2104 schtasks.exe 988 schtasks.exe 888 schtasks.exe 2840 schtasks.exe 1520 schtasks.exe 2220 schtasks.exe 1988 schtasks.exe 2096 schtasks.exe 2316 schtasks.exe 1916 schtasks.exe 2508 schtasks.exe 2680 schtasks.exe 2316 schtasks.exe 1564 schtasks.exe 2612 schtasks.exe 1940 schtasks.exe 2888 schtasks.exe 1088 schtasks.exe 2720 schtasks.exe 2596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2120 CMD.exe 2996 schtasks.exe 2840 CMD.exe 2984 schtasks.exe 372 CMD.exe 1520 schtasks.exe 3056 CMD.exe 1256 schtasks.exe 1928 CMD.exe 2532 schtasks.exe 1720 CMD.exe 2288 schtasks.exe 1736 CMD.exe 892 schtasks.exe 2728 CMD.exe 2680 schtasks.exe 2344 CMD.exe 2316 schtasks.exe 2876 CMD.exe 2880 schtasks.exe 1476 CMD.exe 1916 schtasks.exe 2624 CMD.exe 2220 schtasks.exe 2180 CMD.exe 2508 schtasks.exe 1532 CMD.exe 1988 schtasks.exe 1484 CMD.exe 1612 schtasks.exe 1600 CMD.exe 1564 schtasks.exe 2664 CMD.exe 2612 schtasks.exe 2768 CMD.exe 2104 schtasks.exe 2960 CMD.exe 2056 schtasks.exe 1672 CMD.exe 3052 schtasks.exe 2008 CMD.exe 2096 schtasks.exe 2180 CMD.exe 988 schtasks.exe 2076 CMD.exe 1948 schtasks.exe 2496 CMD.exe 888 schtasks.exe 2824 CMD.exe 2720 schtasks.exe 2424 CMD.exe 2316 schtasks.exe 2988 CMD.exe 2952 schtasks.exe 1788 CMD.exe 1940 schtasks.exe 380 CMD.exe 2816 schtasks.exe 1752 CMD.exe 2184 schtasks.exe 1660 CMD.exe 1868 schtasks.exe 2288 CMD.exe 1760 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2776 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 32 PID 1992 wrote to memory of 2776 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 32 PID 1992 wrote to memory of 2776 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 32 PID 2776 wrote to memory of 2596 2776 CMD.exe 34 PID 2776 wrote to memory of 2596 2776 CMD.exe 34 PID 2776 wrote to memory of 2596 2776 CMD.exe 34 PID 1992 wrote to memory of 2332 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 35 PID 1992 wrote to memory of 2332 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 35 PID 1992 wrote to memory of 2332 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 35 PID 2332 wrote to memory of 2688 2332 CMD.exe 37 PID 2332 wrote to memory of 2688 2332 CMD.exe 37 PID 2332 wrote to memory of 2688 2332 CMD.exe 37 PID 1992 wrote to memory of 2120 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 38 PID 1992 wrote to memory of 2120 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 38 PID 1992 wrote to memory of 2120 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 38 PID 2120 wrote to memory of 2996 2120 CMD.exe 40 PID 2120 wrote to memory of 2996 2120 CMD.exe 40 PID 2120 wrote to memory of 2996 2120 CMD.exe 40 PID 1992 wrote to memory of 2840 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 41 PID 1992 wrote to memory of 2840 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 41 PID 1992 wrote to memory of 2840 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 41 PID 2840 wrote to memory of 2984 2840 CMD.exe 43 PID 2840 wrote to memory of 2984 2840 CMD.exe 43 PID 2840 wrote to memory of 2984 2840 CMD.exe 43 PID 1992 wrote to memory of 372 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 44 PID 1992 wrote to memory of 372 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 44 PID 1992 wrote to memory of 372 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 44 PID 372 wrote to memory of 1520 372 CMD.exe 46 PID 372 wrote to memory of 1520 372 CMD.exe 46 PID 372 wrote to memory of 1520 372 CMD.exe 46 PID 1992 wrote to memory of 3056 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 47 PID 1992 wrote to memory of 3056 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 47 PID 1992 wrote to memory of 3056 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 47 PID 3056 wrote to memory of 1256 3056 CMD.exe 49 PID 3056 wrote to memory of 1256 3056 CMD.exe 49 PID 3056 wrote to memory of 1256 3056 CMD.exe 49 PID 1992 wrote to memory of 1928 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 50 PID 1992 wrote to memory of 1928 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 50 PID 1992 wrote to memory of 1928 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 50 PID 1928 wrote to memory of 2532 1928 CMD.exe 52 PID 1928 wrote to memory of 2532 1928 CMD.exe 52 PID 1928 wrote to memory of 2532 1928 CMD.exe 52 PID 1992 wrote to memory of 1720 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 53 PID 1992 wrote to memory of 1720 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 53 PID 1992 wrote to memory of 1720 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 53 PID 1720 wrote to memory of 2288 1720 CMD.exe 55 PID 1720 wrote to memory of 2288 1720 CMD.exe 55 PID 1720 wrote to memory of 2288 1720 CMD.exe 55 PID 1992 wrote to memory of 1736 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 56 PID 1992 wrote to memory of 1736 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 56 PID 1992 wrote to memory of 1736 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 56 PID 1736 wrote to memory of 892 1736 CMD.exe 58 PID 1736 wrote to memory of 892 1736 CMD.exe 58 PID 1736 wrote to memory of 892 1736 CMD.exe 58 PID 1992 wrote to memory of 2728 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 59 PID 1992 wrote to memory of 2728 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 59 PID 1992 wrote to memory of 2728 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 59 PID 2728 wrote to memory of 2680 2728 CMD.exe 61 PID 2728 wrote to memory of 2680 2728 CMD.exe 61 PID 2728 wrote to memory of 2680 2728 CMD.exe 61 PID 1992 wrote to memory of 2344 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 62 PID 1992 wrote to memory of 2344 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 62 PID 1992 wrote to memory of 2344 1992 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 62 PID 2344 wrote to memory of 2316 2344 CMD.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe"C:\Users\Admin\AppData\Local\Temp\6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2596
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2688
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1256
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:380 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2444
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2408
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:700
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2924
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2316
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2848
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2888
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2976
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1304
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:576
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1088
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6