Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
107ea3b64868...cf.exe
windows7-x64
107ea3b64868...cf.exe
windows10-2004-x64
107ebaf99c04...24.exe
windows7-x64
67ebaf99c04...24.exe
windows10-2004-x64
67ee13560bd...12.exe
windows7-x64
107ee13560bd...12.exe
windows10-2004-x64
107ef695e2eb...8f.exe
windows7-x64
107ef695e2eb...8f.exe
windows10-2004-x64
107f08f6ad11...70.exe
windows7-x64
107f08f6ad11...70.exe
windows10-2004-x64
107f0a89c07b...88.exe
windows7-x64
17f0a89c07b...88.exe
windows10-2004-x64
17f4990caad...07.exe
windows7-x64
107f4990caad...07.exe
windows10-2004-x64
107f584766e9...23.exe
windows7-x64
107f584766e9...23.exe
windows10-2004-x64
107f653aa47f...d4.exe
windows7-x64
107f653aa47f...d4.exe
windows10-2004-x64
107f99ce9b97...e0.exe
windows7-x64
107f99ce9b97...e0.exe
windows10-2004-x64
107fa6bf4f19...ab.exe
windows7-x64
107fa6bf4f19...ab.exe
windows10-2004-x64
107fb245795f...72.exe
windows7-x64
107fb245795f...72.exe
windows10-2004-x64
107fb519a181...1c.exe
windows7-x64
107fb519a181...1c.exe
windows10-2004-x64
108017678d87...da.exe
windows7-x64
108017678d87...da.exe
windows10-2004-x64
108032ddd614...62.exe
windows7-x64
98032ddd614...62.exe
windows10-2004-x64
9805bf5f6bd...de.exe
windows7-x64
10805bf5f6bd...de.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:13
Behavioral task
behavioral1
Sample
7ea3b6486807ad0e5d5a6a107de8eb0a27457170ebb23b480f566e125f0a1dcf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ea3b6486807ad0e5d5a6a107de8eb0a27457170ebb23b480f566e125f0a1dcf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
7ebaf99c04948dfae45c2a85cbd1b9e4620aa618976501eb0b984ceabb223d24.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7ebaf99c04948dfae45c2a85cbd1b9e4620aa618976501eb0b984ceabb223d24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
7ee13560bd2ed5c9f36e497acfc28012.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
7ee13560bd2ed5c9f36e497acfc28012.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
7ef695e2eb00583acd7c520cf107188f.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
7ef695e2eb00583acd7c520cf107188f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
7f08f6ad11231c5a9fe72a1c6cc9cbb44affebd845449fcd79be82945de53170.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7f08f6ad11231c5a9fe72a1c6cc9cbb44affebd845449fcd79be82945de53170.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
7f0a89c07b9469213af04a10fe708088.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
7f0a89c07b9469213af04a10fe708088.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
7f584766e94303d6696bd25553d1af482a2c92f9a51dceb6a4159f9c82d06c23.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7f584766e94303d6696bd25553d1af482a2c92f9a51dceb6a4159f9c82d06c23.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
7f653aa47f3ef4d091f38ed9e5dcc6d4.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
7f653aa47f3ef4d091f38ed9e5dcc6d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
7f99ce9b97f5e577b97470637c426ee0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7f99ce9b97f5e577b97470637c426ee0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
7fa6bf4f199a845715d9f5807a98d9ab.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
7fa6bf4f199a845715d9f5807a98d9ab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
7fb245795f7540f7ab7dbf23fdb5ee72.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7fb245795f7540f7ab7dbf23fdb5ee72.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
7fb519a181f51d55be0957d1753891e1071649a1689db7752d9d0c64707f031c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
7fb519a181f51d55be0957d1753891e1071649a1689db7752d9d0c64707f031c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
8032ddd61456915a71fc5f5f409f6190321e3b74630fcec428612f9ba0995262.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
8032ddd61456915a71fc5f5f409f6190321e3b74630fcec428612f9ba0995262.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
805bf5f6bd7c02b7949531ed13029fde.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
805bf5f6bd7c02b7949531ed13029fde.exe
Resource
win10v2004-20250314-en
General
-
Target
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
-
Size
28.7MB
-
MD5
e1fab30f7a0dfbdc2a055e46529c46c0
-
SHA1
d582f641b44910227d748ae07e4ffc2a096a65ea
-
SHA256
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda
-
SHA512
0bf8882961deb2876aa86ffe409c3f0e459bd5a8b4020273e39c51c1b790a29db9a8af87305c79eb71241019de5b5643c7afb8c12325e24d4d35a494cb7a657e
-
SSDEEP
6144:78AVcrit0NZuJl1e6VlWT8b9vb+zE1P78doDbG5/4/1V1hQ:78A+GhPVle8Ezbdoup4tV1hQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Program Files\\xdwdMATLAB.exe" 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 40 IoCs
pid Process 3400 Process not Found 2604 Process not Found 6012 Process not Found 1916 Process not Found 3944 Process not Found 1856 Process not Found 5552 Process not Found 736 Process not Found 1304 Process not Found 5240 Process not Found 1992 Process not Found 1392 Process not Found 1376 Process not Found 3976 Process not Found 1988 Process not Found 5856 Process not Found 1556 Process not Found 4256 Process not Found 4516 Process not Found 3512 Process not Found 2504 Process not Found 5536 Process not Found 4048 Process not Found 2560 Process not Found 5752 Process not Found 1456 Process not Found 1436 Process not Found 5416 Process not Found 5580 Process not Found 5500 Process not Found 4552 Process not Found 2496 Process not Found 2504 Process not Found 4860 Process not Found 3052 Process not Found 4372 Process not Found 2736 Process not Found 3516 Process not Found 2280 Process not Found 2036 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skkjkjjoiooi = "C:\\Users\\Admin\\Videos\\xdwdLightroom.exe" 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\xdwdMATLAB.exe 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe File opened for modification C:\Program Files\xdwdMATLAB.exe 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4984 schtasks.exe 5088 schtasks.exe 3772 schtasks.exe 1536 schtasks.exe 4144 schtasks.exe 5068 schtasks.exe 440 schtasks.exe 1660 schtasks.exe 4340 schtasks.exe 5296 schtasks.exe 4948 schtasks.exe 5444 schtasks.exe 380 schtasks.exe 396 schtasks.exe 4944 schtasks.exe 5436 schtasks.exe 5752 schtasks.exe 2836 schtasks.exe 764 schtasks.exe 4448 schtasks.exe 3400 schtasks.exe 4712 schtasks.exe 3616 schtasks.exe 3080 schtasks.exe 3720 schtasks.exe 4236 schtasks.exe 5900 schtasks.exe 3416 schtasks.exe 4908 schtasks.exe 5280 schtasks.exe 5440 schtasks.exe 1456 schtasks.exe 4040 schtasks.exe 3472 schtasks.exe 5204 schtasks.exe 4136 schtasks.exe 1304 schtasks.exe 5664 schtasks.exe 2088 schtasks.exe 964 schtasks.exe 5344 schtasks.exe 968 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 668 wrote to memory of 4688 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 94 PID 668 wrote to memory of 4688 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 94 PID 4688 wrote to memory of 3416 4688 CMD.exe 96 PID 4688 wrote to memory of 3416 4688 CMD.exe 96 PID 668 wrote to memory of 6008 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 97 PID 668 wrote to memory of 6008 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 97 PID 6008 wrote to memory of 396 6008 CMD.exe 99 PID 6008 wrote to memory of 396 6008 CMD.exe 99 PID 668 wrote to memory of 3740 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 100 PID 668 wrote to memory of 3740 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 100 PID 3740 wrote to memory of 5068 3740 CMD.exe 102 PID 3740 wrote to memory of 5068 3740 CMD.exe 102 PID 668 wrote to memory of 3428 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 103 PID 668 wrote to memory of 3428 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 103 PID 3428 wrote to memory of 4984 3428 CMD.exe 105 PID 3428 wrote to memory of 4984 3428 CMD.exe 105 PID 668 wrote to memory of 5684 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 106 PID 668 wrote to memory of 5684 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 106 PID 5684 wrote to memory of 2836 5684 CMD.exe 108 PID 5684 wrote to memory of 2836 5684 CMD.exe 108 PID 668 wrote to memory of 4876 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 109 PID 668 wrote to memory of 4876 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 109 PID 4876 wrote to memory of 764 4876 CMD.exe 111 PID 4876 wrote to memory of 764 4876 CMD.exe 111 PID 668 wrote to memory of 2636 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 112 PID 668 wrote to memory of 2636 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 112 PID 2636 wrote to memory of 3472 2636 CMD.exe 114 PID 2636 wrote to memory of 3472 2636 CMD.exe 114 PID 668 wrote to memory of 5992 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 117 PID 668 wrote to memory of 5992 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 117 PID 5992 wrote to memory of 440 5992 CMD.exe 119 PID 5992 wrote to memory of 440 5992 CMD.exe 119 PID 668 wrote to memory of 5036 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 122 PID 668 wrote to memory of 5036 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 122 PID 5036 wrote to memory of 3720 5036 CMD.exe 124 PID 5036 wrote to memory of 3720 5036 CMD.exe 124 PID 668 wrote to memory of 5940 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 129 PID 668 wrote to memory of 5940 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 129 PID 5940 wrote to memory of 5204 5940 CMD.exe 131 PID 5940 wrote to memory of 5204 5940 CMD.exe 131 PID 668 wrote to memory of 4640 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 132 PID 668 wrote to memory of 4640 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 132 PID 4640 wrote to memory of 4908 4640 CMD.exe 134 PID 4640 wrote to memory of 4908 4640 CMD.exe 134 PID 668 wrote to memory of 1052 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 135 PID 668 wrote to memory of 1052 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 135 PID 1052 wrote to memory of 2088 1052 CMD.exe 137 PID 1052 wrote to memory of 2088 1052 CMD.exe 137 PID 668 wrote to memory of 4200 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 138 PID 668 wrote to memory of 4200 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 138 PID 4200 wrote to memory of 5088 4200 CMD.exe 140 PID 4200 wrote to memory of 5088 4200 CMD.exe 140 PID 668 wrote to memory of 1608 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 141 PID 668 wrote to memory of 1608 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 141 PID 1608 wrote to memory of 964 1608 CMD.exe 143 PID 1608 wrote to memory of 964 1608 CMD.exe 143 PID 668 wrote to memory of 1664 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 144 PID 668 wrote to memory of 1664 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 144 PID 1664 wrote to memory of 4136 1664 CMD.exe 146 PID 1664 wrote to memory of 4136 1664 CMD.exe 146 PID 668 wrote to memory of 1072 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 147 PID 668 wrote to memory of 1072 668 8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe 147 PID 1072 wrote to memory of 4944 1072 CMD.exe 149 PID 1072 wrote to memory of 4944 1072 CMD.exe 149 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe"C:\Users\Admin\AppData\Local\Temp\8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Visual Studio Code" /tr "C:\Program Files\xdwdMATLAB.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3416
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:6008 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:396
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Hyper-V" /tr "C:\Users\Admin\Videos\xdwdLightroom.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4984
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5684 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2836
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:764
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3472
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5992 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:440
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3720
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5204
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4908
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5088
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:964
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4136
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4944
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5200
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1660
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4392
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5280
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1536
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4448
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5500
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5436
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4472
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1304
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4100
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3400
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2416
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5664
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1772
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:380
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5168
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5344
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5000
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4040
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4944
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4340
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1108
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4144
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:3076
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5296
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2556
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3772
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5928
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1536
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:3416
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4948
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1576
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4712
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4152
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3616
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:1260
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3080
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2964
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4236
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4048
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5440
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:5768
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5444
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:6040
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5752
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:2772
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1456
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:3720
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5900
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST & exit2⤵PID:4248
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Visio Host" /tr "C:\Program Files\xdwdMATLAB.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:968
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6