Overview
overview
10Static
static
1063bc6776b7...3b.exe
windows7-x64
1063bc6776b7...3b.exe
windows10-2004-x64
10641434cfae...75.exe
windows7-x64
10641434cfae...75.exe
windows10-2004-x64
10642fefb64c...0c.exe
windows7-x64
10642fefb64c...0c.exe
windows10-2004-x64
106433ad2b9d...59.exe
windows7-x64
106433ad2b9d...59.exe
windows10-2004-x64
1064402f0d8e...c0.exe
windows7-x64
1064402f0d8e...c0.exe
windows10-2004-x64
106443d92f8c...ff.exe
windows7-x64
106443d92f8c...ff.exe
windows10-2004-x64
10647ab91c93...52.exe
windows7-x64
1647ab91c93...52.exe
windows10-2004-x64
1064a6177287...fd.exe
windows7-x64
164a6177287...fd.exe
windows10-2004-x64
164cb9bc958...bf.exe
windows7-x64
364cb9bc958...bf.exe
windows10-2004-x64
364d77182d5...9a.exe
windows7-x64
1064d77182d5...9a.exe
windows10-2004-x64
1064f4533af0...b2.exe
windows7-x64
1064f4533af0...b2.exe
windows10-2004-x64
10650411faaa...82.exe
windows7-x64
10650411faaa...82.exe
windows10-2004-x64
1065099e4d1a...a3.exe
windows7-x64
765099e4d1a...a3.exe
windows10-2004-x64
76568e08910...e3.exe
windows7-x64
106568e08910...e3.exe
windows10-2004-x64
10656d929530...ab.exe
windows7-x64
10656d929530...ab.exe
windows10-2004-x64
1065720da539...b1.exe
windows7-x64
1065720da539...b1.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:11
Behavioral task
behavioral1
Sample
63bc6776b78545b5e68372b858dc903b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63bc6776b78545b5e68372b858dc903b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
641434cfae2a1d91473c0acaa431299740a85fa7008a30e2cfa100dba19e4a75.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
641434cfae2a1d91473c0acaa431299740a85fa7008a30e2cfa100dba19e4a75.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
642fefb64c917e4bfd08481bb0727b0c.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
642fefb64c917e4bfd08481bb0727b0c.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
6433ad2b9da636f9059c27cf6a0f9a59.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
6433ad2b9da636f9059c27cf6a0f9a59.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
64402f0d8e48be50cf9751b33f85d1c0.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
64402f0d8e48be50cf9751b33f85d1c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
647ab91c9355e42a7d39ffda3cedfa52.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
647ab91c9355e42a7d39ffda3cedfa52.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
64a6177287d88d0d420ed321ca3a7a447d4458564f7297262bfa96b77107e6fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
64a6177287d88d0d420ed321ca3a7a447d4458564f7297262bfa96b77107e6fd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
64cb9bc958e235b6acb2da12523bf9bf.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
64cb9bc958e235b6acb2da12523bf9bf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
64d77182d5d559f24eac8d7dc728bb9a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
64d77182d5d559f24eac8d7dc728bb9a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
64f4533af02b80feba9bf2a759275bb2.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
64f4533af02b80feba9bf2a759275bb2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
650411faaa2265f31bf28d4276b14f82.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
650411faaa2265f31bf28d4276b14f82.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
65099e4d1aa799000e529ebfb194fca3.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
65099e4d1aa799000e529ebfb194fca3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
6568e08910efb944663d1ebc8ef4693849bdd01571f3698d389fc43b09c8dfe3.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
6568e08910efb944663d1ebc8ef4693849bdd01571f3698d389fc43b09c8dfe3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
656d9295309f4be629d6be73cbe53495b77b1a0cfc3a693e73de5ef3b39700ab.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
656d9295309f4be629d6be73cbe53495b77b1a0cfc3a693e73de5ef3b39700ab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
65720da539dfc37aaa5a4ae46f696cb1.exe
Resource
win7-20241023-en
General
-
Target
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe
-
Size
402KB
-
MD5
1239250e00e12134114d4e2db1a01919
-
SHA1
21703d663fc91ba5df42436f5ed882723916041c
-
SHA256
6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff
-
SHA512
4703ac430a44bc943b92a9b80877407df50c0e02ab687eb9d3c8b483ba1f8dc0774bc36fd26fe1c36e0c9960a6ca16dc88fa0506f82d0ccb883255d964fe1f79
-
SSDEEP
6144:78AVcrit0NZuJl1e6VlWT8b9vb+zE1P78doDbG5/4/1V1hQ:78A+GhPVle8Ezbdoup4tV1hQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Program Files\\xdwdMATLAB.exe" 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 45 IoCs
pid Process 4544 Process not Found 4760 Process not Found 5484 Process not Found 5096 Process not Found 3152 Process not Found 2692 Process not Found 4240 Process not Found 5440 Process not Found 3780 Process not Found 2756 Process not Found 3800 Process not Found 4368 Process not Found 4624 Process not Found 1164 Process not Found 5936 Process not Found 4412 Process not Found 1252 Process not Found 1784 Process not Found 5040 Process not Found 1780 Process not Found 4920 Process not Found 4596 Process not Found 1636 Process not Found 4104 Process not Found 4208 Process not Found 4080 Process not Found 1176 Process not Found 3000 Process not Found 5488 Process not Found 872 Process not Found 5192 Process not Found 1016 Process not Found 4152 Process not Found 960 Process not Found 5480 Process not Found 4720 Process not Found 5936 Process not Found 5692 Process not Found 4744 Process not Found 1540 Process not Found 1160 Process not Found 5380 Process not Found 5952 Process not Found 4808 Process not Found 1836 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skkjkjjoiooi = "C:\\Users\\Admin\\Videos\\xdwdLightroom.exe" 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\xdwdMATLAB.exe 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe File opened for modification C:\Program Files\xdwdMATLAB.exe 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5476 schtasks.exe 5556 schtasks.exe 756 schtasks.exe 5108 schtasks.exe 552 schtasks.exe 5564 schtasks.exe 2608 schtasks.exe 3684 schtasks.exe 4264 schtasks.exe 4440 schtasks.exe 2652 schtasks.exe 5740 schtasks.exe 5380 schtasks.exe 5032 schtasks.exe 5748 schtasks.exe 2304 schtasks.exe 4800 schtasks.exe 2828 schtasks.exe 2248 schtasks.exe 3056 schtasks.exe 544 schtasks.exe 5624 schtasks.exe 3256 schtasks.exe 1596 schtasks.exe 4580 schtasks.exe 2960 schtasks.exe 1252 schtasks.exe 2136 schtasks.exe 1640 schtasks.exe 3564 schtasks.exe 4388 schtasks.exe 2004 schtasks.exe 5692 schtasks.exe 4608 schtasks.exe 3684 schtasks.exe 4396 schtasks.exe 700 schtasks.exe 5172 schtasks.exe 5384 schtasks.exe 4784 schtasks.exe 5132 schtasks.exe 1928 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4596 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 89 PID 4224 wrote to memory of 4596 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 89 PID 4596 wrote to memory of 4800 4596 CMD.exe 91 PID 4596 wrote to memory of 4800 4596 CMD.exe 91 PID 4224 wrote to memory of 4896 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 92 PID 4224 wrote to memory of 4896 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 92 PID 4896 wrote to memory of 2828 4896 CMD.exe 94 PID 4896 wrote to memory of 2828 4896 CMD.exe 94 PID 4224 wrote to memory of 5648 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 95 PID 4224 wrote to memory of 5648 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 95 PID 5648 wrote to memory of 700 5648 CMD.exe 97 PID 5648 wrote to memory of 700 5648 CMD.exe 97 PID 4224 wrote to memory of 3472 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 101 PID 4224 wrote to memory of 3472 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 101 PID 3472 wrote to memory of 3684 3472 CMD.exe 103 PID 3472 wrote to memory of 3684 3472 CMD.exe 103 PID 4224 wrote to memory of 936 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 105 PID 4224 wrote to memory of 936 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 105 PID 936 wrote to memory of 552 936 CMD.exe 107 PID 936 wrote to memory of 552 936 CMD.exe 107 PID 4224 wrote to memory of 5288 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 109 PID 4224 wrote to memory of 5288 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 109 PID 5288 wrote to memory of 4264 5288 CMD.exe 111 PID 5288 wrote to memory of 4264 5288 CMD.exe 111 PID 4224 wrote to memory of 1048 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 113 PID 4224 wrote to memory of 1048 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 113 PID 1048 wrote to memory of 3564 1048 CMD.exe 115 PID 1048 wrote to memory of 3564 1048 CMD.exe 115 PID 4224 wrote to memory of 6060 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 117 PID 4224 wrote to memory of 6060 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 117 PID 6060 wrote to memory of 2248 6060 CMD.exe 119 PID 6060 wrote to memory of 2248 6060 CMD.exe 119 PID 4224 wrote to memory of 4868 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 120 PID 4224 wrote to memory of 4868 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 120 PID 4868 wrote to memory of 4388 4868 CMD.exe 122 PID 4868 wrote to memory of 4388 4868 CMD.exe 122 PID 4224 wrote to memory of 4840 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 127 PID 4224 wrote to memory of 4840 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 127 PID 4840 wrote to memory of 3056 4840 CMD.exe 129 PID 4840 wrote to memory of 3056 4840 CMD.exe 129 PID 4224 wrote to memory of 4004 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 133 PID 4224 wrote to memory of 4004 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 133 PID 4004 wrote to memory of 5564 4004 CMD.exe 135 PID 4004 wrote to memory of 5564 4004 CMD.exe 135 PID 4224 wrote to memory of 884 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 136 PID 4224 wrote to memory of 884 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 136 PID 884 wrote to memory of 5740 884 CMD.exe 138 PID 884 wrote to memory of 5740 884 CMD.exe 138 PID 4224 wrote to memory of 2392 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 139 PID 4224 wrote to memory of 2392 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 139 PID 2392 wrote to memory of 5556 2392 CMD.exe 141 PID 2392 wrote to memory of 5556 2392 CMD.exe 141 PID 4224 wrote to memory of 4916 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 142 PID 4224 wrote to memory of 4916 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 142 PID 4916 wrote to memory of 4580 4916 CMD.exe 144 PID 4916 wrote to memory of 4580 4916 CMD.exe 144 PID 4224 wrote to memory of 4052 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 145 PID 4224 wrote to memory of 4052 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 145 PID 4052 wrote to memory of 2004 4052 CMD.exe 147 PID 4052 wrote to memory of 2004 4052 CMD.exe 147 PID 4224 wrote to memory of 1276 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 148 PID 4224 wrote to memory of 1276 4224 6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe 148 PID 1276 wrote to memory of 2960 1276 CMD.exe 150 PID 1276 wrote to memory of 2960 1276 CMD.exe 150 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe"C:\Users\Admin\AppData\Local\Temp\6443d92f8c4431775845dd6d68d6cdeab6453cd51c27f917256b59ea5503dbff.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4800
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5648 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:700
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3684
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:552
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5288 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4264
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3564
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:6060 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2248
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4388
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3056
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5564
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5740
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5556
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4580
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2004
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2960
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5664
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5380
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2120
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:756
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4680
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5172
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:644
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:544
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:3772
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5032
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2628
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5624
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1560
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5692
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1260
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1252
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5940
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5108
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:3064
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3256
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4844
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5384
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4256
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4440
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5892
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4608
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:6076
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2136
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4488
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4784
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4688
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3684
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5484
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1640
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2640
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5132
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:3860
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2652
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1712
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1928
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5780
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5040
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5748
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:3360
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:6068
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1596
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5600
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5476
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:956
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4396
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6