Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
107ea3b64868...cf.exe
windows7-x64
107ea3b64868...cf.exe
windows10-2004-x64
107ebaf99c04...24.exe
windows7-x64
67ebaf99c04...24.exe
windows10-2004-x64
67ee13560bd...12.exe
windows7-x64
107ee13560bd...12.exe
windows10-2004-x64
107ef695e2eb...8f.exe
windows7-x64
107ef695e2eb...8f.exe
windows10-2004-x64
107f08f6ad11...70.exe
windows7-x64
107f08f6ad11...70.exe
windows10-2004-x64
107f0a89c07b...88.exe
windows7-x64
17f0a89c07b...88.exe
windows10-2004-x64
17f4990caad...07.exe
windows7-x64
107f4990caad...07.exe
windows10-2004-x64
107f584766e9...23.exe
windows7-x64
107f584766e9...23.exe
windows10-2004-x64
107f653aa47f...d4.exe
windows7-x64
107f653aa47f...d4.exe
windows10-2004-x64
107f99ce9b97...e0.exe
windows7-x64
107f99ce9b97...e0.exe
windows10-2004-x64
107fa6bf4f19...ab.exe
windows7-x64
107fa6bf4f19...ab.exe
windows10-2004-x64
107fb245795f...72.exe
windows7-x64
107fb245795f...72.exe
windows10-2004-x64
107fb519a181...1c.exe
windows7-x64
107fb519a181...1c.exe
windows10-2004-x64
108017678d87...da.exe
windows7-x64
108017678d87...da.exe
windows10-2004-x64
108032ddd614...62.exe
windows7-x64
98032ddd614...62.exe
windows10-2004-x64
9805bf5f6bd...de.exe
windows7-x64
10805bf5f6bd...de.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:13
Behavioral task
behavioral1
Sample
7ea3b6486807ad0e5d5a6a107de8eb0a27457170ebb23b480f566e125f0a1dcf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ea3b6486807ad0e5d5a6a107de8eb0a27457170ebb23b480f566e125f0a1dcf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
7ebaf99c04948dfae45c2a85cbd1b9e4620aa618976501eb0b984ceabb223d24.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7ebaf99c04948dfae45c2a85cbd1b9e4620aa618976501eb0b984ceabb223d24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
7ee13560bd2ed5c9f36e497acfc28012.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
7ee13560bd2ed5c9f36e497acfc28012.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
7ef695e2eb00583acd7c520cf107188f.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
7ef695e2eb00583acd7c520cf107188f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
7f08f6ad11231c5a9fe72a1c6cc9cbb44affebd845449fcd79be82945de53170.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7f08f6ad11231c5a9fe72a1c6cc9cbb44affebd845449fcd79be82945de53170.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
7f0a89c07b9469213af04a10fe708088.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
7f0a89c07b9469213af04a10fe708088.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
7f584766e94303d6696bd25553d1af482a2c92f9a51dceb6a4159f9c82d06c23.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7f584766e94303d6696bd25553d1af482a2c92f9a51dceb6a4159f9c82d06c23.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
7f653aa47f3ef4d091f38ed9e5dcc6d4.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
7f653aa47f3ef4d091f38ed9e5dcc6d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
7f99ce9b97f5e577b97470637c426ee0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7f99ce9b97f5e577b97470637c426ee0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
7fa6bf4f199a845715d9f5807a98d9ab.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
7fa6bf4f199a845715d9f5807a98d9ab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
7fb245795f7540f7ab7dbf23fdb5ee72.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7fb245795f7540f7ab7dbf23fdb5ee72.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
7fb519a181f51d55be0957d1753891e1071649a1689db7752d9d0c64707f031c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
7fb519a181f51d55be0957d1753891e1071649a1689db7752d9d0c64707f031c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
8032ddd61456915a71fc5f5f409f6190321e3b74630fcec428612f9ba0995262.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
8032ddd61456915a71fc5f5f409f6190321e3b74630fcec428612f9ba0995262.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
805bf5f6bd7c02b7949531ed13029fde.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
805bf5f6bd7c02b7949531ed13029fde.exe
Resource
win10v2004-20250314-en
General
-
Target
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
-
Size
28.7MB
-
MD5
e1fab30f7a0dfbdc2a055e46529c46c0
-
SHA1
d582f641b44910227d748ae07e4ffc2a096a65ea
-
SHA256
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda
-
SHA512
0bf8882961deb2876aa86ffe409c3f0e459bd5a8b4020273e39c51c1b790a29db9a8af87305c79eb71241019de5b5643c7afb8c12325e24d4d35a494cb7a657e
-
SSDEEP
6144:78AVcrit0NZuJl1e6VlWT8b9vb+zE1P78doDbG5/4/1V1hQ:78A+GhPVle8Ezbdoup4tV1hQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Program Files\\xdwdMATLAB.exe" 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\skkjkjjoiooi = "C:\\Users\\Admin\\Videos\\xdwdLightroom.exe" 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\xdwdMATLAB.exe 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe File opened for modification C:\Program Files\xdwdMATLAB.exe 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 41 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 692 schtasks.exe 3036 schtasks.exe 2224 schtasks.exe 2400 schtasks.exe 292 schtasks.exe 2100 schtasks.exe 2304 schtasks.exe 868 schtasks.exe 568 schtasks.exe 2016 schtasks.exe 2712 schtasks.exe 916 schtasks.exe 1956 schtasks.exe 2740 schtasks.exe 2112 schtasks.exe 2332 schtasks.exe 3000 schtasks.exe 2888 schtasks.exe 2064 schtasks.exe 2816 schtasks.exe 2572 schtasks.exe 2260 schtasks.exe 1828 schtasks.exe 2044 schtasks.exe 2424 schtasks.exe 1940 schtasks.exe 2216 schtasks.exe 3016 schtasks.exe 2868 schtasks.exe 1060 schtasks.exe 3056 schtasks.exe 2856 schtasks.exe 2916 schtasks.exe 772 schtasks.exe 2872 schtasks.exe 2712 schtasks.exe 2888 schtasks.exe 2416 schtasks.exe 2740 schtasks.exe 2112 schtasks.exe 3008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3028 CMD.exe 292 schtasks.exe 1944 CMD.exe 2044 schtasks.exe 2056 CMD.exe 2064 schtasks.exe 356 CMD.exe 2100 schtasks.exe 2284 CMD.exe 2304 schtasks.exe 1868 CMD.exe 2424 schtasks.exe 2120 CMD.exe 2816 schtasks.exe 2824 CMD.exe 2740 schtasks.exe 1768 CMD.exe 2888 schtasks.exe 2612 CMD.exe 1940 schtasks.exe 2452 CMD.exe 2112 schtasks.exe 2300 CMD.exe 2332 schtasks.exe 620 CMD.exe 868 schtasks.exe 2240 CMD.exe 1060 schtasks.exe 1736 CMD.exe 2216 schtasks.exe 2976 CMD.exe 3008 schtasks.exe 1172 CMD.exe 2416 schtasks.exe 2812 CMD.exe 568 schtasks.exe 2004 CMD.exe 2016 schtasks.exe 556 CMD.exe 692 schtasks.exe 1572 CMD.exe 2572 schtasks.exe 2352 CMD.exe 3036 schtasks.exe 2792 CMD.exe 3000 schtasks.exe 1868 CMD.exe 2856 schtasks.exe 2884 CMD.exe 2740 schtasks.exe 2416 CMD.exe 2888 schtasks.exe 2768 CMD.exe 2916 schtasks.exe 2016 CMD.exe 2112 schtasks.exe 408 CMD.exe 3016 schtasks.exe 1284 CMD.exe 2260 schtasks.exe 2720 CMD.exe 2224 schtasks.exe 3000 CMD.exe 3056 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2148 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 32 PID 1732 wrote to memory of 2148 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 32 PID 1732 wrote to memory of 2148 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 32 PID 2148 wrote to memory of 2872 2148 CMD.exe 34 PID 2148 wrote to memory of 2872 2148 CMD.exe 34 PID 2148 wrote to memory of 2872 2148 CMD.exe 34 PID 1732 wrote to memory of 2972 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 35 PID 1732 wrote to memory of 2972 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 35 PID 1732 wrote to memory of 2972 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 35 PID 2972 wrote to memory of 2712 2972 CMD.exe 37 PID 2972 wrote to memory of 2712 2972 CMD.exe 37 PID 2972 wrote to memory of 2712 2972 CMD.exe 37 PID 1732 wrote to memory of 2140 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 38 PID 1732 wrote to memory of 2140 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 38 PID 1732 wrote to memory of 2140 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 38 PID 2140 wrote to memory of 1956 2140 CMD.exe 40 PID 2140 wrote to memory of 1956 2140 CMD.exe 40 PID 2140 wrote to memory of 1956 2140 CMD.exe 40 PID 1732 wrote to memory of 3028 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 69 PID 1732 wrote to memory of 3028 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 69 PID 1732 wrote to memory of 3028 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 69 PID 3028 wrote to memory of 292 3028 CMD.exe 43 PID 3028 wrote to memory of 292 3028 CMD.exe 43 PID 3028 wrote to memory of 292 3028 CMD.exe 43 PID 1732 wrote to memory of 1944 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 44 PID 1732 wrote to memory of 1944 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 44 PID 1732 wrote to memory of 1944 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 44 PID 1944 wrote to memory of 2044 1944 CMD.exe 46 PID 1944 wrote to memory of 2044 1944 CMD.exe 46 PID 1944 wrote to memory of 2044 1944 CMD.exe 46 PID 1732 wrote to memory of 2056 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 47 PID 1732 wrote to memory of 2056 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 47 PID 1732 wrote to memory of 2056 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 47 PID 2056 wrote to memory of 2064 2056 CMD.exe 49 PID 2056 wrote to memory of 2064 2056 CMD.exe 49 PID 2056 wrote to memory of 2064 2056 CMD.exe 49 PID 1732 wrote to memory of 356 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 50 PID 1732 wrote to memory of 356 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 50 PID 1732 wrote to memory of 356 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 50 PID 356 wrote to memory of 2100 356 CMD.exe 52 PID 356 wrote to memory of 2100 356 CMD.exe 52 PID 356 wrote to memory of 2100 356 CMD.exe 52 PID 1732 wrote to memory of 2284 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 53 PID 1732 wrote to memory of 2284 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 53 PID 1732 wrote to memory of 2284 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 53 PID 2284 wrote to memory of 2304 2284 CMD.exe 55 PID 2284 wrote to memory of 2304 2284 CMD.exe 55 PID 2284 wrote to memory of 2304 2284 CMD.exe 55 PID 1732 wrote to memory of 1868 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 56 PID 1732 wrote to memory of 1868 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 56 PID 1732 wrote to memory of 1868 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 56 PID 1868 wrote to memory of 2424 1868 CMD.exe 58 PID 1868 wrote to memory of 2424 1868 CMD.exe 58 PID 1868 wrote to memory of 2424 1868 CMD.exe 58 PID 1732 wrote to memory of 2120 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 59 PID 1732 wrote to memory of 2120 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 59 PID 1732 wrote to memory of 2120 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 59 PID 2120 wrote to memory of 2816 2120 CMD.exe 61 PID 2120 wrote to memory of 2816 2120 CMD.exe 61 PID 2120 wrote to memory of 2816 2120 CMD.exe 61 PID 1732 wrote to memory of 2824 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 62 PID 1732 wrote to memory of 2824 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 62 PID 1732 wrote to memory of 2824 1732 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 62 PID 2824 wrote to memory of 2740 2824 CMD.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe"C:\Users\Admin\AppData\Local\Temp\8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2872
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1956
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:292
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:620 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:568
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:556 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:692
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2632
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2492
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2344
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:772
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1276
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1828
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2076
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2400
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:768
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:916
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "598789124-348928217-1808467318-211395876520649001351446823171231413741969081835"1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6