Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    30/03/2025, 21:01

General

  • Target

    neratochka.exe

  • Size

    790KB

  • MD5

    926f11c3cd1b5536cfa92670df6221a5

  • SHA1

    906b8b341d8ee28f391f1af2ba96afc2bc9fd4a7

  • SHA256

    084a3386e4ed78fa71b3bc04ab39060e17649d322b66291000811b848c1732fb

  • SHA512

    4d81c2542c583289a1bcf160d15df6fa1f631945b6324964a3cd47ab3088cdfb3f8a65b9d385a86fb954c9d54cff442c4049be5158dc66a9624ad0110b3f1722

  • SSDEEP

    12288:7+LfLwZHZl6Rbxmk5CIqYn5+iNTXSfiyIh+r7s6AjZ+silrV:6LMNZio5I5FSPg++4

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 47 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\neratochka.exe
    "C:\Users\Admin\AppData\Local\Temp\neratochka.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "IntelliJ IDEA Host" /tr "C:\Users\Admin\Documents\aops.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "IntelliJ IDEA Host" /tr "C:\Users\Admin\Documents\aops.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4876
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4880
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "PnkbstrA" /tr "C:\Program Files\aop.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo 5 /tn "PnkbstrA" /tr "C:\Program Files\aop.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4868
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4736
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5684
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5752
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2320
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2328
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:6120
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4160
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5992
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5544
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4220
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5712
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4624
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3972
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3332
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5576
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
      2⤵
        PID:1624
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2688
      • C:\Windows\SYSTEM32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
        2⤵
          PID:1740
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1564
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
          2⤵
            PID:4656
            • C:\Windows\system32\schtasks.exe
              SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:1952
          • C:\Windows\SYSTEM32\CMD.exe
            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
            2⤵
              PID:3488
              • C:\Windows\system32\schtasks.exe
                SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2080
            • C:\Windows\SYSTEM32\CMD.exe
              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
              2⤵
                PID:4460
                • C:\Windows\system32\schtasks.exe
                  SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                  3⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:2692
              • C:\Windows\SYSTEM32\CMD.exe
                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                2⤵
                  PID:6104
                  • C:\Windows\system32\schtasks.exe
                    SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2724
                • C:\Windows\SYSTEM32\CMD.exe
                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                  2⤵
                    PID:3276
                    • C:\Windows\system32\schtasks.exe
                      SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                      3⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:4424
                  • C:\Windows\SYSTEM32\CMD.exe
                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                    2⤵
                      PID:2592
                      • C:\Windows\system32\schtasks.exe
                        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                        3⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:2156
                    • C:\Windows\SYSTEM32\CMD.exe
                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                      2⤵
                        PID:2540
                        • C:\Windows\system32\schtasks.exe
                          SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:5280
                      • C:\Windows\SYSTEM32\CMD.exe
                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                        2⤵
                          PID:876
                          • C:\Windows\system32\schtasks.exe
                            SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:4672
                        • C:\Windows\SYSTEM32\CMD.exe
                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                          2⤵
                            PID:1232
                            • C:\Windows\system32\schtasks.exe
                              SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                              3⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:3208
                          • C:\Windows\SYSTEM32\CMD.exe
                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                            2⤵
                              PID:1028
                              • C:\Windows\system32\schtasks.exe
                                SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                3⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:324
                            • C:\Windows\SYSTEM32\CMD.exe
                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                              2⤵
                                PID:3512
                                • C:\Windows\system32\schtasks.exe
                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1140
                              • C:\Windows\SYSTEM32\CMD.exe
                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                2⤵
                                  PID:2580
                                  • C:\Windows\system32\schtasks.exe
                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:872
                                • C:\Windows\SYSTEM32\CMD.exe
                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                  2⤵
                                    PID:3096
                                    • C:\Windows\system32\schtasks.exe
                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                      3⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1964
                                  • C:\Windows\SYSTEM32\CMD.exe
                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                    2⤵
                                      PID:5636
                                      • C:\Windows\system32\schtasks.exe
                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:4896
                                    • C:\Windows\SYSTEM32\CMD.exe
                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                      2⤵
                                        PID:4828
                                        • C:\Windows\system32\schtasks.exe
                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                          3⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4916
                                      • C:\Windows\SYSTEM32\CMD.exe
                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                        2⤵
                                          PID:4848
                                          • C:\Windows\system32\schtasks.exe
                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4644
                                        • C:\Windows\SYSTEM32\CMD.exe
                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                          2⤵
                                            PID:4936
                                            • C:\Windows\system32\schtasks.exe
                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                              3⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4464
                                          • C:\Windows\SYSTEM32\CMD.exe
                                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                            2⤵
                                              PID:1508
                                              • C:\Windows\system32\schtasks.exe
                                                SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                3⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5088
                                            • C:\Windows\SYSTEM32\CMD.exe
                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                              2⤵
                                                PID:5068
                                                • C:\Windows\system32\schtasks.exe
                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                  3⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1752
                                              • C:\Windows\SYSTEM32\CMD.exe
                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                2⤵
                                                  PID:4236
                                                  • C:\Windows\system32\schtasks.exe
                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                    3⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:5556
                                                • C:\Windows\SYSTEM32\CMD.exe
                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                  2⤵
                                                    PID:1644
                                                    • C:\Windows\system32\schtasks.exe
                                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                      3⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:6124
                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                    2⤵
                                                      PID:976
                                                      • C:\Windows\system32\schtasks.exe
                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                        3⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:5220
                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                      2⤵
                                                        PID:1368
                                                        • C:\Windows\system32\schtasks.exe
                                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                          3⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1768
                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                        2⤵
                                                          PID:4428
                                                          • C:\Windows\system32\schtasks.exe
                                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                            3⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4924
                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                          2⤵
                                                            PID:712
                                                            • C:\Windows\system32\schtasks.exe
                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:5604
                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                            2⤵
                                                              PID:4984
                                                              • C:\Windows\system32\schtasks.exe
                                                                SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                                3⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:3772
                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                              2⤵
                                                                PID:5272
                                                                • C:\Windows\system32\schtasks.exe
                                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                                  3⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:2700
                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                                2⤵
                                                                  PID:2892
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                                    3⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:3852
                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST & exit
                                                                  2⤵
                                                                    PID:2752
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Outposts" /tr "C:\Users\Admin\Documents\aops.exe" /RL HIGHEST
                                                                      3⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:5180

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\Documents\aops.exe

                                                                  Filesize

                                                                  790KB

                                                                  MD5

                                                                  926f11c3cd1b5536cfa92670df6221a5

                                                                  SHA1

                                                                  906b8b341d8ee28f391f1af2ba96afc2bc9fd4a7

                                                                  SHA256

                                                                  084a3386e4ed78fa71b3bc04ab39060e17649d322b66291000811b848c1732fb

                                                                  SHA512

                                                                  4d81c2542c583289a1bcf160d15df6fa1f631945b6324964a3cd47ab3088cdfb3f8a65b9d385a86fb954c9d54cff442c4049be5158dc66a9624ad0110b3f1722

                                                                • memory/4544-0-0x00007FFE28BE3000-0x00007FFE28BE5000-memory.dmp

                                                                  Filesize

                                                                  8KB

                                                                • memory/4544-1-0x00000000001A0000-0x000000000026C000-memory.dmp

                                                                  Filesize

                                                                  816KB

                                                                • memory/4544-2-0x00007FFE28BE3000-0x00007FFE28BE5000-memory.dmp

                                                                  Filesize

                                                                  8KB

                                                                • memory/4544-5-0x00007FFE28BE0000-0x00007FFE296A2000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/4544-12-0x00007FFE28BE0000-0x00007FFE296A2000-memory.dmp

                                                                  Filesize

                                                                  10.8MB