Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1090ed1454b8...38.exe
windows7-x64
1090ed1454b8...38.exe
windows10-2004-x64
1091570920da...cf.exe
windows7-x64
1091570920da...cf.exe
windows10-2004-x64
7915c452bf2...b6.exe
windows7-x64
10915c452bf2...b6.exe
windows10-2004-x64
10916cd92d3a...38.exe
windows7-x64
10916cd92d3a...38.exe
windows10-2004-x64
10916fbe67a7...e3.exe
windows7-x64
10916fbe67a7...e3.exe
windows10-2004-x64
1091cce1a9f4...6a.exe
windows7-x64
1091cce1a9f4...6a.exe
windows10-2004-x64
1091d2e3f758...f6.exe
windows7-x64
1091d2e3f758...f6.exe
windows10-2004-x64
1091d7fa8d89...52.exe
windows7-x64
1091d7fa8d89...52.exe
windows10-2004-x64
1091e6d47bd8...cc.exe
windows7-x64
791e6d47bd8...cc.exe
windows10-2004-x64
792105c7a3b...24.exe
windows7-x64
792105c7a3b...24.exe
windows10-2004-x64
7921421b7f5...09.exe
windows7-x64
10921421b7f5...09.exe
windows10-2004-x64
109221b9eea3...3c.exe
windows7-x64
19221b9eea3...3c.exe
windows10-2004-x64
1092324d5776...05.exe
windows7-x64
192324d5776...05.exe
windows10-2004-x64
1927cd0bd1a...b8.exe
windows7-x64
3927cd0bd1a...b8.exe
windows10-2004-x64
392efd55895...78.exe
windows7-x64
1092efd55895...78.exe
windows10-2004-x64
10932a9096cd...eb.exe
windows7-x64
10932a9096cd...eb.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:14
Behavioral task
behavioral1
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
90ed1454b881cba4ecd9b651325d4638.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
91570920daa6ee3c5d03da7664cb620ac5be5038ac64a295811ed8349b5d3dcf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
915c452bf258459048ef8813fe2586a7b3c85ae7438fcd9bfa6da3a4017a08b6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
916cd92d3ac28dded1335ac06764e138.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
916fbe67a7968d2b65d54ae3ce72f3e3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
91cce1a9f4562b0cd73d60203cebb76a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
91d2e3f758fbb2c6c8e7b069bd3ac7a4d68e4f9dea0e71ff60bdbcd2ac9dd4f6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
91d7fa8d891f603b35c77da7fcc4c552.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
91e6d47bd804e58a4e160993dfdfc3cc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
92105c7a3b72655063939b49b38e6567d6703ed95f694cab2247bd9832706524.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
921421b7f5be88eb661517835c090cd8a2fdcdfc69154d129c70ffa36da54809.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
9221b9eea367a2434dacd850f7b30b3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
92324d5776518f262a2ce8bfd8c6856500a9c454b9a8b688810f604111532e05.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
927cd0bd1a26a2158a18e48e682ba3b8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
92efd55895cd60b5057f3fb06ad84c78.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
932a9096cd16630970f2bdc5e6cb9aeb.exe
Resource
win10v2004-20250314-en
General
-
Target
932a9096cd16630970f2bdc5e6cb9aeb.exe
-
Size
5.9MB
-
MD5
932a9096cd16630970f2bdc5e6cb9aeb
-
SHA1
52d4a032ac5cbdbb8bed5b401283c1b49201ca92
-
SHA256
79edf19412f95a9de108ec3ccdbaa450eab559c421768ff53a184da9563fc190
-
SHA512
5fd9f0de72eb989d27c3a46a6ff1e79a61576bf24089437d73e0c2eead05f3a14a326966d9176a993f2b7289bbfe70206ea001742517e24e23e108577694aaeb
-
SSDEEP
98304:xyeUxPQ0JMLyWIvqrhH05I8TderKjHDFUh9HkEXJfw4y:xyeU11Rvqmu8TWKnF6N/1wX
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 324 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1228 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1428 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2912 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 264 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1360 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 620 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 2636 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 852 2636 schtasks.exe 30 -
UAC bypass 3 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 932a9096cd16630970f2bdc5e6cb9aeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 932a9096cd16630970f2bdc5e6cb9aeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 932a9096cd16630970f2bdc5e6cb9aeb.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1152 powershell.exe 556 powershell.exe 2656 powershell.exe 1696 powershell.exe 2940 powershell.exe 2168 powershell.exe 1632 powershell.exe 2712 powershell.exe 1864 powershell.exe 2144 powershell.exe 3064 powershell.exe 2028 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 932a9096cd16630970f2bdc5e6cb9aeb.exe -
Executes dropped EXE 3 IoCs
pid Process 620 OSPPSVC.exe 2264 OSPPSVC.exe 2376 OSPPSVC.exe -
Checks whether UAC is enabled 1 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 932a9096cd16630970f2bdc5e6cb9aeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 932a9096cd16630970f2bdc5e6cb9aeb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 2264 OSPPSVC.exe 2264 OSPPSVC.exe 2376 OSPPSVC.exe 2376 OSPPSVC.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\Idle.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\6ccacd8608530f 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\services.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\c5b4cb5e9653cc 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\services.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\System.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files (x86)\Microsoft Office\42af1c969fbb7b 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\RCXA78C.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\RCXB2CC.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\RCXB2CD.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\audiodg.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\RCXA78B.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\Idle.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\27d1bcfc3c54e0 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files (x86)\Microsoft Office\audiodg.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCXA279.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\RCXA9A0.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files\Windows NT\Accessories\RCXBC17.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files\Windows NT\Accessories\lsass.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File created C:\Program Files\Windows NT\Accessories\6203df4a6bafc7 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\System.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\RCXA9A1.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files\Windows NT\Accessories\RCXBC18.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files\Windows NT\Accessories\lsass.exe 932a9096cd16630970f2bdc5e6cb9aeb.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCXA2A8.tmp 932a9096cd16630970f2bdc5e6cb9aeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe 2788 schtasks.exe 2912 schtasks.exe 1284 schtasks.exe 1812 schtasks.exe 1228 schtasks.exe 264 schtasks.exe 2064 schtasks.exe 620 schtasks.exe 2604 schtasks.exe 2264 schtasks.exe 2496 schtasks.exe 2416 schtasks.exe 1748 schtasks.exe 2140 schtasks.exe 2424 schtasks.exe 1520 schtasks.exe 2712 schtasks.exe 324 schtasks.exe 2688 schtasks.exe 1428 schtasks.exe 572 schtasks.exe 852 schtasks.exe 2332 schtasks.exe 2972 schtasks.exe 2008 schtasks.exe 2000 schtasks.exe 1084 schtasks.exe 1432 schtasks.exe 2528 schtasks.exe 1360 schtasks.exe 1676 schtasks.exe 1508 schtasks.exe 2700 schtasks.exe 1140 schtasks.exe 3032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 2028 powershell.exe 2712 powershell.exe 2940 powershell.exe 1696 powershell.exe 2168 powershell.exe 1864 powershell.exe 3064 powershell.exe 2144 powershell.exe 556 powershell.exe 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 1152 powershell.exe 1632 powershell.exe 2656 powershell.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe 620 OSPPSVC.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 556 powershell.exe Token: SeDebugPrivilege 1152 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 620 OSPPSVC.exe Token: SeDebugPrivilege 2264 OSPPSVC.exe Token: SeDebugPrivilege 2376 OSPPSVC.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3064 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 67 PID 2384 wrote to memory of 3064 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 67 PID 2384 wrote to memory of 3064 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 67 PID 2384 wrote to memory of 2028 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 68 PID 2384 wrote to memory of 2028 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 68 PID 2384 wrote to memory of 2028 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 68 PID 2384 wrote to memory of 2940 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 70 PID 2384 wrote to memory of 2940 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 70 PID 2384 wrote to memory of 2940 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 70 PID 2384 wrote to memory of 1696 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 71 PID 2384 wrote to memory of 1696 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 71 PID 2384 wrote to memory of 1696 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 71 PID 2384 wrote to memory of 1152 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 73 PID 2384 wrote to memory of 1152 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 73 PID 2384 wrote to memory of 1152 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 73 PID 2384 wrote to memory of 2144 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 75 PID 2384 wrote to memory of 2144 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 75 PID 2384 wrote to memory of 2144 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 75 PID 2384 wrote to memory of 1864 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 76 PID 2384 wrote to memory of 1864 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 76 PID 2384 wrote to memory of 1864 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 76 PID 2384 wrote to memory of 2656 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 77 PID 2384 wrote to memory of 2656 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 77 PID 2384 wrote to memory of 2656 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 77 PID 2384 wrote to memory of 2712 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 78 PID 2384 wrote to memory of 2712 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 78 PID 2384 wrote to memory of 2712 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 78 PID 2384 wrote to memory of 1632 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 79 PID 2384 wrote to memory of 1632 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 79 PID 2384 wrote to memory of 1632 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 79 PID 2384 wrote to memory of 556 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 80 PID 2384 wrote to memory of 556 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 80 PID 2384 wrote to memory of 556 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 80 PID 2384 wrote to memory of 2168 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 81 PID 2384 wrote to memory of 2168 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 81 PID 2384 wrote to memory of 2168 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 81 PID 2384 wrote to memory of 620 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 91 PID 2384 wrote to memory of 620 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 91 PID 2384 wrote to memory of 620 2384 932a9096cd16630970f2bdc5e6cb9aeb.exe 91 PID 620 wrote to memory of 1912 620 OSPPSVC.exe 93 PID 620 wrote to memory of 1912 620 OSPPSVC.exe 93 PID 620 wrote to memory of 1912 620 OSPPSVC.exe 93 PID 620 wrote to memory of 324 620 OSPPSVC.exe 94 PID 620 wrote to memory of 324 620 OSPPSVC.exe 94 PID 620 wrote to memory of 324 620 OSPPSVC.exe 94 PID 1912 wrote to memory of 2264 1912 WScript.exe 95 PID 1912 wrote to memory of 2264 1912 WScript.exe 95 PID 1912 wrote to memory of 2264 1912 WScript.exe 95 PID 2264 wrote to memory of 1724 2264 OSPPSVC.exe 96 PID 2264 wrote to memory of 1724 2264 OSPPSVC.exe 96 PID 2264 wrote to memory of 1724 2264 OSPPSVC.exe 96 PID 2264 wrote to memory of 548 2264 OSPPSVC.exe 97 PID 2264 wrote to memory of 548 2264 OSPPSVC.exe 97 PID 2264 wrote to memory of 548 2264 OSPPSVC.exe 97 PID 1724 wrote to memory of 2376 1724 WScript.exe 98 PID 1724 wrote to memory of 2376 1724 WScript.exe 98 PID 1724 wrote to memory of 2376 1724 WScript.exe 98 PID 2376 wrote to memory of 1932 2376 OSPPSVC.exe 99 PID 2376 wrote to memory of 1932 2376 OSPPSVC.exe 99 PID 2376 wrote to memory of 1932 2376 OSPPSVC.exe 99 PID 2376 wrote to memory of 2760 2376 OSPPSVC.exe 100 PID 2376 wrote to memory of 2760 2376 OSPPSVC.exe 100 PID 2376 wrote to memory of 2760 2376 OSPPSVC.exe 100 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 932a9096cd16630970f2bdc5e6cb9aeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 932a9096cd16630970f2bdc5e6cb9aeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 932a9096cd16630970f2bdc5e6cb9aeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" OSPPSVC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" OSPPSVC.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\932a9096cd16630970f2bdc5e6cb9aeb.exe"C:\Users\Admin\AppData\Local\Temp\932a9096cd16630970f2bdc5e6cb9aeb.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Users\Default User\OSPPSVC.exe"C:\Users\Default User\OSPPSVC.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:620 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\43e91807-cbfd-4b7d-8601-faeb2f12caea.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Default User\OSPPSVC.exe"C:\Users\Default User\OSPPSVC.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2264 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e894d5d9-e725-424d-a04f-f4221990c73f.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Default User\OSPPSVC.exe"C:\Users\Default User\OSPPSVC.exe"6⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2376 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\09b1ace2-83e0-4970-8b42-bb46ec11bd93.vbs"7⤵PID:1932
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6bde0c4d-1d42-4e43-baf7-86a79304eb0b.vbs"7⤵PID:2760
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\24c0dbf6-22ca-4dcd-b1d7-1bc8ba7715af.vbs"5⤵PID:548
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dc39733d-a041-4fa1-a86a-61e1537220df.vbs"3⤵PID:324
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Default User\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\microsoft shared\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\microsoft shared\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\microsoft shared\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Downloads\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Default\Downloads\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Downloads\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Office\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Office\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "932a9096cd16630970f2bdc5e6cb9aeb9" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\932a9096cd16630970f2bdc5e6cb9aeb.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "932a9096cd16630970f2bdc5e6cb9aeb" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\932a9096cd16630970f2bdc5e6cb9aeb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "932a9096cd16630970f2bdc5e6cb9aeb9" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\932a9096cd16630970f2bdc5e6cb9aeb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows NT\Accessories\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\Accessories\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:852
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD57084ad0e9c3b3be0bc773a3fa8088d6d
SHA13f4ac8d10a46b79bfd0925de0f6ca13345a2db2e
SHA2562479012c1246f12a3972b0932f4ae106d9845113827dcf10578daec8e74cd5c2
SHA512669e53162882d2ff4fe4c1a69bcc8f641a290db5c1f6b75015908095cbef7da9c9faf097a12e9cd4974c5b7c036765d455a43caf55702c69f3d956a606baaee8
-
Filesize
5.9MB
MD56f78f89587300a0e88e09926fc3f14bf
SHA1bbaec380475f42c51e562459f36e94cb7fad33f8
SHA25679912ddfef7923991e737a7780d597431ff143e31538129b464d942882d2a295
SHA5127ce86227e43b201e3953fbac1360025ce490db0aea3302b3325cbd5cb88eb30545574e856f54be53e4db323f30ac76e4871103aa18ea02df9ac5d74234220045
-
Filesize
5.9MB
MD5f2f05a167c3336cf2115f78d542b4811
SHA11b05162275145c9ffcd8cfe4885228fa08c5d844
SHA256ffbccd4be1ddb6f6c78a346132c691a604681c7d672dc082984e8adafd95570a
SHA512586cd64a80acbf39bfe0696bd848e26b0d3079a96047c1db93d6bb7f0d90353a3e8c8dbb62b6eb7c8928f5f2edb75b76c127b61b901a644b60f0730fe56fc4cb
-
Filesize
709B
MD5e1bb5417715d051455f9492c5641688d
SHA19b58fe8f2859b09cfe4fa97da671eb86520d8610
SHA256fd2d89308bde1723869b4af6a870add5c8f632cf8cfe4c2aa84485f024611013
SHA51231c32a4755df5de8e225e8781c9600aaf7d8aceb7f8575ee7917cf4f49f5e4deeeaa5e9621c98ed06ebaafe3c983442e04e1b3bab038a496e81e08681b6675d9
-
Filesize
708B
MD509fc7e2abfac3f453e15337fa0d76d9d
SHA1c8c8403c575d32708ac7c5f638912c244370db2e
SHA256afa7e199a66c034b104592ea1636c00711c458892b137b7315531644154a56c5
SHA5120f9a41e3fbbfcaea466db19532f3cdbfd0a00a0c737d4ed0329874b3e2df1349d4609d4ec595c4156f0d4b7e37e0e0d350d3e6a0b8a66e1990ff749c909a688b
-
Filesize
485B
MD5724da140bceb166739047d0bc4fa85c8
SHA1763bef33542e445537f462f9395b319f4c694cda
SHA256b8b18b7e78627fb3532cdddd049b2aee817170b77a8afa590bd8b151e08414ce
SHA5127a06c0eae6ac8241349add78bacfcb6abfa1162ec0ab5ec4dd7f62e604eb5714d79eeaa7790dca9ca8bc9caf85692ac47a696aa1b876d0baed18bf04540c3be8
-
Filesize
709B
MD5fd9017fdfe9d41f421c89700a74192ea
SHA1a794e576803a57299fdfe4e39ec91b7b949707ef
SHA2567614aa8b6c519b768a907c50a5eb3a89cdc0494ede793a7fbbedbc257f951bdd
SHA5121e2c93d7ff2fff784a7363255ba497a2ee20d7b398d00e3c9b04e485c3c018be1344be2264ad5cf120e6929ddc1206137017423e982aa15be407a3e0172d96a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50aceeb49de8006f7848a172c0f84dac0
SHA1b8fcb71853e16ab1a25080bf0297387cb1aae4eb
SHA2569a7a34f677c6ab3c8109559b144c6956d7db1698e7386618cbed625d01f0421c
SHA51270e8b48c7e1379bde58689821b4e0f7fc608ea83a2058d93c64582f48ead2638ad05eba5b2951b12092391c467460ab2195bf9d45f91640056853ab028b306ae
-
Filesize
5.9MB
MD5932a9096cd16630970f2bdc5e6cb9aeb
SHA152d4a032ac5cbdbb8bed5b401283c1b49201ca92
SHA25679edf19412f95a9de108ec3ccdbaa450eab559c421768ff53a184da9563fc190
SHA5125fd9f0de72eb989d27c3a46a6ff1e79a61576bf24089437d73e0c2eead05f3a14a326966d9176a993f2b7289bbfe70206ea001742517e24e23e108577694aaeb
-
Filesize
5.9MB
MD52c9ece563b0ae805be4fe0f55fe80c6c
SHA14856edf6d7bf14b226171c2625429dd99ae11998
SHA256465cd037dc21843ac63eb514f3c31b20f8ad93e8d17d5d9e89ac7de5e54c94c5
SHA51271bab20b03b34f5110baac914e7ba8eb1faf991908d34f6e5d068f0a11d2ca48836238b532756b711d033f450903ab326dcc919a0aefdb1585085a237209b04c