Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
107ea3b64868...cf.exe
windows7-x64
107ea3b64868...cf.exe
windows10-2004-x64
107ebaf99c04...24.exe
windows7-x64
67ebaf99c04...24.exe
windows10-2004-x64
67ee13560bd...12.exe
windows7-x64
107ee13560bd...12.exe
windows10-2004-x64
107ef695e2eb...8f.exe
windows7-x64
107ef695e2eb...8f.exe
windows10-2004-x64
107f08f6ad11...70.exe
windows7-x64
107f08f6ad11...70.exe
windows10-2004-x64
107f0a89c07b...88.exe
windows7-x64
17f0a89c07b...88.exe
windows10-2004-x64
17f4990caad...07.exe
windows7-x64
107f4990caad...07.exe
windows10-2004-x64
107f584766e9...23.exe
windows7-x64
107f584766e9...23.exe
windows10-2004-x64
107f653aa47f...d4.exe
windows7-x64
107f653aa47f...d4.exe
windows10-2004-x64
107f99ce9b97...e0.exe
windows7-x64
107f99ce9b97...e0.exe
windows10-2004-x64
107fa6bf4f19...ab.exe
windows7-x64
107fa6bf4f19...ab.exe
windows10-2004-x64
107fb245795f...72.exe
windows7-x64
107fb245795f...72.exe
windows10-2004-x64
107fb519a181...1c.exe
windows7-x64
107fb519a181...1c.exe
windows10-2004-x64
108017678d87...da.exe
windows7-x64
108017678d87...da.exe
windows10-2004-x64
108032ddd614...62.exe
windows7-x64
98032ddd614...62.exe
windows10-2004-x64
9805bf5f6bd...de.exe
windows7-x64
10805bf5f6bd...de.exe
windows10-2004-x64
10Analysis
-
max time kernel
153s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:13
Behavioral task
behavioral1
Sample
7ea3b6486807ad0e5d5a6a107de8eb0a27457170ebb23b480f566e125f0a1dcf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ea3b6486807ad0e5d5a6a107de8eb0a27457170ebb23b480f566e125f0a1dcf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
7ebaf99c04948dfae45c2a85cbd1b9e4620aa618976501eb0b984ceabb223d24.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7ebaf99c04948dfae45c2a85cbd1b9e4620aa618976501eb0b984ceabb223d24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
7ee13560bd2ed5c9f36e497acfc28012.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
7ee13560bd2ed5c9f36e497acfc28012.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
7ef695e2eb00583acd7c520cf107188f.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
7ef695e2eb00583acd7c520cf107188f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
7f08f6ad11231c5a9fe72a1c6cc9cbb44affebd845449fcd79be82945de53170.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7f08f6ad11231c5a9fe72a1c6cc9cbb44affebd845449fcd79be82945de53170.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
7f0a89c07b9469213af04a10fe708088.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
7f0a89c07b9469213af04a10fe708088.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
7f4990caad41dd3228d704682f251b6144a6e406233c1e3003548230e2243907.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
7f584766e94303d6696bd25553d1af482a2c92f9a51dceb6a4159f9c82d06c23.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7f584766e94303d6696bd25553d1af482a2c92f9a51dceb6a4159f9c82d06c23.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
7f653aa47f3ef4d091f38ed9e5dcc6d4.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
7f653aa47f3ef4d091f38ed9e5dcc6d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
7f99ce9b97f5e577b97470637c426ee0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7f99ce9b97f5e577b97470637c426ee0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
7fa6bf4f199a845715d9f5807a98d9ab.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
7fa6bf4f199a845715d9f5807a98d9ab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
7fb245795f7540f7ab7dbf23fdb5ee72.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7fb245795f7540f7ab7dbf23fdb5ee72.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
7fb519a181f51d55be0957d1753891e1071649a1689db7752d9d0c64707f031c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
7fb519a181f51d55be0957d1753891e1071649a1689db7752d9d0c64707f031c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
8017678d87051c2e45053b891cb418b179422465541ebeeb8bbbd6cf24dc1dda.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
8032ddd61456915a71fc5f5f409f6190321e3b74630fcec428612f9ba0995262.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
8032ddd61456915a71fc5f5f409f6190321e3b74630fcec428612f9ba0995262.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
805bf5f6bd7c02b7949531ed13029fde.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
805bf5f6bd7c02b7949531ed13029fde.exe
Resource
win10v2004-20250314-en
General
-
Target
805bf5f6bd7c02b7949531ed13029fde.exe
-
Size
1.9MB
-
MD5
805bf5f6bd7c02b7949531ed13029fde
-
SHA1
5b05c1ba4b97b104772e683a75fe25ff527b6f57
-
SHA256
6a208a1038733f97141f540e04a2cd5a2f364191c341ef5c5bfdaa7e39f995f1
-
SHA512
bef22c52bc45b96377bdaaaacba0f623bf1b505fb75bd8c1352f873a30da76e78fb90ccd693a4f184365ff2818857ca386acbccd367318fd9063d188e52b3a69
-
SSDEEP
24576:0z4T3bMX0/0ZqSEaa3OVFu8VQTo8Ia29MSVyAXmFPf87ptY60/YYhdbh7JRj:0OMX0/08SVYTcxMXPxthD
Malware Config
Signatures
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 3004 schtasks.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 3004 schtasks.exe 29 -
UAC bypass 3 TTPs 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 805bf5f6bd7c02b7949531ed13029fde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 805bf5f6bd7c02b7949531ed13029fde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 805bf5f6bd7c02b7949531ed13029fde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1600 powershell.exe 2168 powershell.exe 976 powershell.exe 2580 powershell.exe 600 powershell.exe 932 powershell.exe 1272 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 805bf5f6bd7c02b7949531ed13029fde.exe -
Executes dropped EXE 9 IoCs
pid Process 2428 dllhost.exe 2308 dllhost.exe 1944 dllhost.exe 2724 dllhost.exe 928 dllhost.exe 828 dllhost.exe 2308 dllhost.exe 864 dllhost.exe 308 dllhost.exe -
Checks whether UAC is enabled 1 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 805bf5f6bd7c02b7949531ed13029fde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 805bf5f6bd7c02b7949531ed13029fde.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\RCX630C.tmp 805bf5f6bd7c02b7949531ed13029fde.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\5940a34987c991 805bf5f6bd7c02b7949531ed13029fde.exe File created C:\Program Files\Uninstall Information\69ddcba757bf72 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RCX60F8.tmp 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files\Uninstall Information\smss.exe 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\wininit.exe 805bf5f6bd7c02b7949531ed13029fde.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\56085415360792 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RCX60E7.tmp 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RCX683D.tmp 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RCX684E.tmp 805bf5f6bd7c02b7949531ed13029fde.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe 805bf5f6bd7c02b7949531ed13029fde.exe File created C:\Program Files\Uninstall Information\smss.exe 805bf5f6bd7c02b7949531ed13029fde.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\wininit.exe 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Program Files\Uninstall Information\RCX62FB.tmp 805bf5f6bd7c02b7949531ed13029fde.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\ehome\es-ES\wininit.exe 805bf5f6bd7c02b7949531ed13029fde.exe File created C:\Windows\ehome\es-ES\56085415360792 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Windows\ehome\es-ES\RCX6CF2.tmp 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Windows\ehome\es-ES\RCX6D70.tmp 805bf5f6bd7c02b7949531ed13029fde.exe File opened for modification C:\Windows\ehome\es-ES\wininit.exe 805bf5f6bd7c02b7949531ed13029fde.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe 2176 schtasks.exe 2564 schtasks.exe 1396 schtasks.exe 1580 schtasks.exe 2920 schtasks.exe 3040 schtasks.exe 2212 schtasks.exe 2748 schtasks.exe 2312 schtasks.exe 972 schtasks.exe 2924 schtasks.exe 2628 schtasks.exe 2664 schtasks.exe 2792 schtasks.exe 2600 schtasks.exe 2928 schtasks.exe 872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2304 805bf5f6bd7c02b7949531ed13029fde.exe 2168 powershell.exe 976 powershell.exe 2580 powershell.exe 600 powershell.exe 932 powershell.exe 1272 powershell.exe 1600 powershell.exe 2428 dllhost.exe 2308 dllhost.exe 1944 dllhost.exe 2724 dllhost.exe 928 dllhost.exe 828 dllhost.exe 2308 dllhost.exe 864 dllhost.exe 308 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2304 805bf5f6bd7c02b7949531ed13029fde.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 976 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 600 powershell.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeDebugPrivilege 1272 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 2428 dllhost.exe Token: SeDebugPrivilege 2308 dllhost.exe Token: SeDebugPrivilege 1944 dllhost.exe Token: SeDebugPrivilege 2724 dllhost.exe Token: SeDebugPrivilege 928 dllhost.exe Token: SeDebugPrivilege 828 dllhost.exe Token: SeDebugPrivilege 2308 dllhost.exe Token: SeDebugPrivilege 864 dllhost.exe Token: SeDebugPrivilege 308 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2580 2304 805bf5f6bd7c02b7949531ed13029fde.exe 48 PID 2304 wrote to memory of 2580 2304 805bf5f6bd7c02b7949531ed13029fde.exe 48 PID 2304 wrote to memory of 2580 2304 805bf5f6bd7c02b7949531ed13029fde.exe 48 PID 2304 wrote to memory of 600 2304 805bf5f6bd7c02b7949531ed13029fde.exe 49 PID 2304 wrote to memory of 600 2304 805bf5f6bd7c02b7949531ed13029fde.exe 49 PID 2304 wrote to memory of 600 2304 805bf5f6bd7c02b7949531ed13029fde.exe 49 PID 2304 wrote to memory of 976 2304 805bf5f6bd7c02b7949531ed13029fde.exe 50 PID 2304 wrote to memory of 976 2304 805bf5f6bd7c02b7949531ed13029fde.exe 50 PID 2304 wrote to memory of 976 2304 805bf5f6bd7c02b7949531ed13029fde.exe 50 PID 2304 wrote to memory of 2168 2304 805bf5f6bd7c02b7949531ed13029fde.exe 51 PID 2304 wrote to memory of 2168 2304 805bf5f6bd7c02b7949531ed13029fde.exe 51 PID 2304 wrote to memory of 2168 2304 805bf5f6bd7c02b7949531ed13029fde.exe 51 PID 2304 wrote to memory of 1600 2304 805bf5f6bd7c02b7949531ed13029fde.exe 53 PID 2304 wrote to memory of 1600 2304 805bf5f6bd7c02b7949531ed13029fde.exe 53 PID 2304 wrote to memory of 1600 2304 805bf5f6bd7c02b7949531ed13029fde.exe 53 PID 2304 wrote to memory of 1272 2304 805bf5f6bd7c02b7949531ed13029fde.exe 55 PID 2304 wrote to memory of 1272 2304 805bf5f6bd7c02b7949531ed13029fde.exe 55 PID 2304 wrote to memory of 1272 2304 805bf5f6bd7c02b7949531ed13029fde.exe 55 PID 2304 wrote to memory of 932 2304 805bf5f6bd7c02b7949531ed13029fde.exe 56 PID 2304 wrote to memory of 932 2304 805bf5f6bd7c02b7949531ed13029fde.exe 56 PID 2304 wrote to memory of 932 2304 805bf5f6bd7c02b7949531ed13029fde.exe 56 PID 2304 wrote to memory of 2428 2304 805bf5f6bd7c02b7949531ed13029fde.exe 62 PID 2304 wrote to memory of 2428 2304 805bf5f6bd7c02b7949531ed13029fde.exe 62 PID 2304 wrote to memory of 2428 2304 805bf5f6bd7c02b7949531ed13029fde.exe 62 PID 2428 wrote to memory of 3036 2428 dllhost.exe 63 PID 2428 wrote to memory of 3036 2428 dllhost.exe 63 PID 2428 wrote to memory of 3036 2428 dllhost.exe 63 PID 2428 wrote to memory of 2940 2428 dllhost.exe 64 PID 2428 wrote to memory of 2940 2428 dllhost.exe 64 PID 2428 wrote to memory of 2940 2428 dllhost.exe 64 PID 3036 wrote to memory of 2308 3036 WScript.exe 65 PID 3036 wrote to memory of 2308 3036 WScript.exe 65 PID 3036 wrote to memory of 2308 3036 WScript.exe 65 PID 2308 wrote to memory of 2480 2308 dllhost.exe 66 PID 2308 wrote to memory of 2480 2308 dllhost.exe 66 PID 2308 wrote to memory of 2480 2308 dllhost.exe 66 PID 2308 wrote to memory of 2596 2308 dllhost.exe 67 PID 2308 wrote to memory of 2596 2308 dllhost.exe 67 PID 2308 wrote to memory of 2596 2308 dllhost.exe 67 PID 2480 wrote to memory of 1944 2480 WScript.exe 68 PID 2480 wrote to memory of 1944 2480 WScript.exe 68 PID 2480 wrote to memory of 1944 2480 WScript.exe 68 PID 1944 wrote to memory of 1816 1944 dllhost.exe 69 PID 1944 wrote to memory of 1816 1944 dllhost.exe 69 PID 1944 wrote to memory of 1816 1944 dllhost.exe 69 PID 1944 wrote to memory of 1716 1944 dllhost.exe 70 PID 1944 wrote to memory of 1716 1944 dllhost.exe 70 PID 1944 wrote to memory of 1716 1944 dllhost.exe 70 PID 1816 wrote to memory of 2724 1816 WScript.exe 71 PID 1816 wrote to memory of 2724 1816 WScript.exe 71 PID 1816 wrote to memory of 2724 1816 WScript.exe 71 PID 2724 wrote to memory of 2528 2724 dllhost.exe 72 PID 2724 wrote to memory of 2528 2724 dllhost.exe 72 PID 2724 wrote to memory of 2528 2724 dllhost.exe 72 PID 2724 wrote to memory of 2072 2724 dllhost.exe 73 PID 2724 wrote to memory of 2072 2724 dllhost.exe 73 PID 2724 wrote to memory of 2072 2724 dllhost.exe 73 PID 2528 wrote to memory of 928 2528 WScript.exe 74 PID 2528 wrote to memory of 928 2528 WScript.exe 74 PID 2528 wrote to memory of 928 2528 WScript.exe 74 PID 928 wrote to memory of 2816 928 dllhost.exe 75 PID 928 wrote to memory of 2816 928 dllhost.exe 75 PID 928 wrote to memory of 2816 928 dllhost.exe 75 PID 928 wrote to memory of 1736 928 dllhost.exe 76 -
System policy modification 1 TTPs 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 805bf5f6bd7c02b7949531ed13029fde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 805bf5f6bd7c02b7949531ed13029fde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 805bf5f6bd7c02b7949531ed13029fde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\805bf5f6bd7c02b7949531ed13029fde.exe"C:\Users\Admin\AppData\Local\Temp\805bf5f6bd7c02b7949531ed13029fde.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\805bf5f6bd7c02b7949531ed13029fde.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\smss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\805bf5f6bd7c02b7949531ed13029fde.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Favorites\explorer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ehome\es-ES\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2428 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\88cf853c-b4e6-4a27-ad7f-9b3a394eb30e.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2308 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e1bca25e-7e20-4636-bf12-fef7b2701d1f.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"6⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1944 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f311373a-4e9a-4fa3-ab15-ab99dad9efe7.vbs"7⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"8⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2724 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\83e1ea9e-70d1-4c5a-88c9-af9cc0b66cf9.vbs"9⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"10⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:928 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\706446a0-e8d7-4aff-a1ff-e77a92f69230.vbs"11⤵PID:2816
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"12⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:828 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9483bc9a-765e-4dc1-a29f-aa93f6442353.vbs"13⤵PID:2232
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"14⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2308 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\66f8d05b-0b45-440c-bb26-9e331057c94a.vbs"15⤵PID:1852
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"16⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:864 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7341a8f0-5279-4d25-a7eb-f7fd9469931c.vbs"17⤵PID:600
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe"18⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:308 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7770afd2-8b1f-4c6a-a315-5a78ca1ffa5b.vbs"19⤵PID:2416
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c3b9f55d-1e71-41fe-bd27-fce3e7448f43.vbs"19⤵PID:1696
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dda0df1e-5f80-4e17-9aa3-3232d03caa10.vbs"17⤵PID:1776
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\26bd08d7-fad9-47fd-a703-f6bfe22b0af2.vbs"15⤵PID:1384
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\921e4132-df02-4d50-9397-745453a55598.vbs"13⤵PID:2408
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\632c0dbb-9dc9-4fb5-940e-ca7404ebeecf.vbs"11⤵PID:1736
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3e11dfed-37cd-412d-a28b-f07d6228f2cf.vbs"9⤵PID:2072
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7ea96a42-ad65-4626-8d21-dac6998f7bb4.vbs"7⤵PID:1716
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1464dab2-42d0-4c0c-9d21-216fd1d0fe79.vbs"5⤵PID:2596
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fc41295d-9d51-43d7-aa5a-3866ab1b77c7.vbs"3⤵PID:2940
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files\Uninstall Information\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files\Uninstall Information\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "805bf5f6bd7c02b7949531ed13029fde8" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\805bf5f6bd7c02b7949531ed13029fde.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "805bf5f6bd7c02b7949531ed13029fde" /sc ONLOGON /tr "'C:\Users\Default User\805bf5f6bd7c02b7949531ed13029fde.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "805bf5f6bd7c02b7949531ed13029fde8" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\805bf5f6bd7c02b7949531ed13029fde.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Favorites\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Favorites\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Windows\ehome\es-ES\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\ehome\es-ES\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\ehome\es-ES\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759B
MD5a832c8e36f2ef45c9595e120e964b342
SHA14d4bbf54c1cd5512ca9b16777bd397994170398c
SHA256842d4b918d87c9ae0ef1e31019f442e5dda7081b68bdf21f55be46d9d69c0a3f
SHA5125030b66dbc4a41b798b1cbe69c4d773383007cd7fac09b6b3da03065bbe0803c599ccd942982fb49b60fe68893fe27dd90412c67a0219c792ab5e165bc2e8ff4
-
Filesize
759B
MD5b08e6d9cccfee3c0041278c2749f308b
SHA15c84d6675321809c8420a209a4e1948bce461239
SHA256254a734666e8de5a58e3c29af8980ab69b2b2b03d03892fe303046c45b2da487
SHA512a6f2a9ad893737ec04fb0aed96c113eafdff2da8a67b21352fcd0716265002ff04cfd5a6cbf0f54c58844bf0c419bf24456744d874264bc484c67b72a1eddb06
-
Filesize
759B
MD50b63e871fe8fe8f3d04f59d899c0fff7
SHA103a22acb1d3d5eeb3bc3ac5366a9fccd6cb5adf7
SHA256e1bdb762b484392479d5c12487062abe932427bf4709dbd44342d220bc89a436
SHA5125209b58b2ca4108658f2c2525b3cc1be3fdb30d1b6053b0b49d2af9f900fd2bd96b8061ba0cf9c0e3825334d4d380954365764235010a66545da1cd35f635da0
-
Filesize
760B
MD5b8ea58f1ca402c3250ed91cc8fccb34d
SHA1cc8b0ca46a7b4070f57684659eafbf8d6d275153
SHA2563357635c91d5b0ef64d5cb26061bbdb06a36e547dd351c4bb2c2a61dcca0ec25
SHA51254920d55e3554c0312d1b3559f72a96c7241fd7512464f52ead2b358ddbe07daf5a27044d6fcf44509a6eb5910afcc11947b05a9ab51a63922d5157f982fd1dc
-
Filesize
760B
MD55cccc33dc8274e1b6a98ee0cf0d36c3e
SHA14555dcdbea40ab43979ebfd5b3935217597a1e61
SHA256d1890f816e309b0ef0cc1aef10510534ea192643c2d63f0758b4fb6060a56561
SHA5126ef03cbf97604bd410e9f5815a8fac087c154460370113e0b98feb674af20ebd5b4e744920b43859ea7d5ea37d1a9aa88ba333983523cb89ed4b5aaad0027463
-
Filesize
759B
MD5fbce40e20dbfc07449f58aa169faabf3
SHA14405302202fba950b27e594ca122545e4f6c7d6a
SHA2568336208273026a24a6409e3ff18aefdd565469d5a6f703403cbc9f759f69acdf
SHA512f58f7ca4b9f2c6fc4435c9868ac397a9025b9aa5f91419ec5905d66e1e60826a751091f5d6f3ff29aab9854aeb7228a23a7c1094d142404c40ac6962304a6af6
-
Filesize
760B
MD5ec66723bbc1df2136a50932e3d8782ef
SHA13a11d155db3fe27e909186a3a0e0b2194c7b9929
SHA256d2808d392b49407665646b9cc2bc2e382eae1f70872af2a99d8896e637f2690e
SHA512e87c6e5be9a65616ddc43a521376d4c4d1453b4e80187c47ffeea52e229469a0712f359eccd155955ce9bf86898e3b11b016337eeef64a794794b0b6686fadb1
-
Filesize
760B
MD55d9c725caea0159319eb6553378e04e8
SHA1ed0cc78721495bccde198ca19d8a4a96ca62bdfb
SHA256551fd072f987c28df8ca16f75a2c002e434b617f0ad2538a470425ee77288788
SHA512efea7132501f3186bf4de85d6d33aab68b8224c7c44e2c37f79417450cfe3715d06d1cb9cf988301714a0d8c0bc1becb1145024915883e59854b6e15dcd6a733
-
Filesize
536B
MD5651a2297b46c67a536d3e9783e5cf535
SHA1bd6b68c069f9718d3ba7847879de1ff16271d1f4
SHA256acd7778c862fc32f9002e99ca780e997e7ed2a14a098a3f978a60aefc03b7dce
SHA512b27ca6bce1f950fdc400e46e436d7a02cd8fc06f02affbca5ee3b470c74e6e6e321c62238926b82f1440554ded258219a2b3ab063ed44af6ed5d27dc591a154a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56d7eeb1133f5bf0bcbe8443873ca7f0a
SHA13c22046255639b73be9b2bab56e302e2e2ad5fca
SHA2566396d12c0702a04b5934269442ab2e141365ac99d91252a7d117e3b92795c3f4
SHA51244e6092a96f99ba99abc3dae2aebf67bc1d533fc5c986e6cf6d83f1ab1f96de4488768f7045303dafe763b6ee142f8140c195186886a210c82658fb74257e25b
-
Filesize
1.9MB
MD535e2dda149d9b60a0d9f0a301121e991
SHA1371611d26fd2a2a7085edd002331ae531a2a3f25
SHA256d6df0392e9341dc0db66854c9d9d21ed35aabe9bfdd6abfa9f218c7855345b94
SHA512e9abc2ea6a720ae5041acafccdd103f2750a345284f1965003a33ab832ebdae015a59dcedfc52efbaec6a1813a8acc4ef5dded29d0501727afafd73c8059b492
-
Filesize
1.9MB
MD5805bf5f6bd7c02b7949531ed13029fde
SHA15b05c1ba4b97b104772e683a75fe25ff527b6f57
SHA2566a208a1038733f97141f540e04a2cd5a2f364191c341ef5c5bfdaa7e39f995f1
SHA512bef22c52bc45b96377bdaaaacba0f623bf1b505fb75bd8c1352f873a30da76e78fb90ccd693a4f184365ff2818857ca386acbccd367318fd9063d188e52b3a69
-
Filesize
1.9MB
MD505091d6fc48b4e1d3e7568c1d6262b5e
SHA18ea44ec8aaf1c9b4f90094a6cb81b4cc77cb7b44
SHA256f692d06d0d3fd82637df823dfb794c0f6dfc82c9fab1b8e556c5b9d052d6dcd0
SHA512156ee50888a2b963ec6c8f5a2c96ed555b107584768db8d680e0c02cdc276493ae8481055b6661ab7ffc068bd6587fc9869c0d56a74bc2dbe683569b9da29843