Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:15

General

  • Target

    123123123123212132.exe

  • Size

    377KB

  • MD5

    ecdd3ea3b8a4f725f9062ab8858ecca7

  • SHA1

    239fc6d7ad2be57d0d67c5dd827a21776acdfae5

  • SHA256

    c36199992b094393c6ad3905dde59a5a484e82648c2ab0aaacc85ee2264c68aa

  • SHA512

    3a2242492ba9c53f49d3ba9033b37744f8bd7e1b5fe7948ab136a50b07663f9b1d1df86b77eb25ac892faa271570ae560cb4d40d7323166faac4acdde7eda443

  • SSDEEP

    6144:pH2dNCgWu23+ppotfme6VlWT8b9IKxeMlr/y01bae6Szm/X:JCxPppguPVle8IMle0ke6+A

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Loads dropped DLL 48 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\123123123123212132.exe
    "C:\Users\Admin\AppData\Local\Temp\123123123123212132.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:32
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Luna Cheat" /tr "C:\Windows\Sage 50.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Luna Cheat" /tr "C:\Windows\Sage 50.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4892
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1056
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft PowerPoint Host" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Autodesk AutoCAD Update.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft PowerPoint Host" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Autodesk AutoCAD Update.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1364
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2232
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5760
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5828
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2912
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5820
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5484
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4724
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:6020
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2072
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5456
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5776
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1536
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:812
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3092
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5644
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4760
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
      2⤵
        PID:5700
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1516
      • C:\Windows\SYSTEM32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
        2⤵
          PID:3012
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:5760
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
          2⤵
            PID:4524
            • C:\Windows\system32\schtasks.exe
              SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:3724
          • C:\Windows\SYSTEM32\CMD.exe
            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
            2⤵
              PID:2720
              • C:\Windows\system32\schtasks.exe
                SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1808
            • C:\Windows\SYSTEM32\CMD.exe
              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
              2⤵
                PID:5692
                • C:\Windows\system32\schtasks.exe
                  SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                  3⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:776
              • C:\Windows\SYSTEM32\CMD.exe
                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                2⤵
                  PID:2604
                  • C:\Windows\system32\schtasks.exe
                    SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1748
                • C:\Windows\SYSTEM32\CMD.exe
                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                  2⤵
                    PID:5448
                    • C:\Windows\system32\schtasks.exe
                      SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                      3⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:3148
                  • C:\Windows\SYSTEM32\CMD.exe
                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                    2⤵
                      PID:5760
                      • C:\Windows\system32\schtasks.exe
                        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                        3⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:5788
                    • C:\Windows\SYSTEM32\CMD.exe
                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                      2⤵
                        PID:2308
                        • C:\Windows\system32\schtasks.exe
                          SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:5888
                      • C:\Windows\SYSTEM32\CMD.exe
                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                        2⤵
                          PID:5724
                          • C:\Windows\system32\schtasks.exe
                            SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:5680
                        • C:\Windows\SYSTEM32\CMD.exe
                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                          2⤵
                            PID:1872
                            • C:\Windows\system32\schtasks.exe
                              SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                              3⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:4148
                          • C:\Windows\SYSTEM32\CMD.exe
                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                            2⤵
                              PID:5508
                              • C:\Windows\system32\schtasks.exe
                                SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                3⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:5040
                            • C:\Windows\SYSTEM32\CMD.exe
                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                              2⤵
                                PID:1456
                                • C:\Windows\system32\schtasks.exe
                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1812
                              • C:\Windows\SYSTEM32\CMD.exe
                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                2⤵
                                  PID:5752
                                  • C:\Windows\system32\schtasks.exe
                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2000
                                • C:\Windows\SYSTEM32\CMD.exe
                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                  2⤵
                                    PID:4928
                                    • C:\Windows\system32\schtasks.exe
                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                      3⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5180
                                  • C:\Windows\SYSTEM32\CMD.exe
                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                    2⤵
                                      PID:1144
                                      • C:\Windows\system32\schtasks.exe
                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3820
                                    • C:\Windows\SYSTEM32\CMD.exe
                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                      2⤵
                                        PID:3680
                                        • C:\Windows\system32\schtasks.exe
                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                          3⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2412
                                      • C:\Windows\SYSTEM32\CMD.exe
                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                        2⤵
                                          PID:2232
                                          • C:\Windows\system32\schtasks.exe
                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3896
                                        • C:\Windows\SYSTEM32\CMD.exe
                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                          2⤵
                                            PID:3644
                                            • C:\Windows\system32\schtasks.exe
                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                              3⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4276
                                          • C:\Windows\SYSTEM32\CMD.exe
                                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                            2⤵
                                              PID:4536
                                              • C:\Windows\system32\schtasks.exe
                                                SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                                3⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4004
                                            • C:\Windows\SYSTEM32\CMD.exe
                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                              2⤵
                                                PID:2140
                                                • C:\Windows\system32\schtasks.exe
                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                                  3⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:4396
                                              • C:\Windows\SYSTEM32\CMD.exe
                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                                2⤵
                                                  PID:3992
                                                  • C:\Windows\system32\schtasks.exe
                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                                    3⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:5284
                                                • C:\Windows\SYSTEM32\CMD.exe
                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                                  2⤵
                                                    PID:4652
                                                    • C:\Windows\system32\schtasks.exe
                                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                                      3⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:5608
                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                                    2⤵
                                                      PID:5948
                                                      • C:\Windows\system32\schtasks.exe
                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                                        3⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:3908
                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                                      2⤵
                                                        PID:3100
                                                        • C:\Windows\system32\schtasks.exe
                                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                                          3⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2700
                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST & exit
                                                        2⤵
                                                          PID:2192
                                                          • C:\Windows\system32\schtasks.exe
                                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Access Update" /tr "C:\Windows\Sage 50.exe" /RL HIGHEST
                                                            3⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:220
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Autodesk AutoCAD Update.exe
                                                        1⤵
                                                          PID:2412
                                                        • C:\Windows\system32\taskmgr.exe
                                                          "C:\Windows\system32\taskmgr.exe" /4
                                                          1⤵
                                                          • Loads dropped DLL
                                                          • Checks SCSI registry key(s)
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:3700
                                                        • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                          "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ResizeMerge.docx" /o ""
                                                          1⤵
                                                          • Loads dropped DLL
                                                          • Checks processor information in registry
                                                          • Enumerates system info in registry
                                                          • Suspicious behavior: AddClipboardFormatListener
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4392
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\RenameClose.bat" "
                                                          1⤵
                                                            PID:4108
                                                          • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                            "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
                                                            1⤵
                                                            • Enumerates connected drives
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:5968
                                                            • C:\Windows\SysWOW64\unregmp2.exe
                                                              "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1036
                                                              • C:\Windows\system32\unregmp2.exe
                                                                "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                                                                3⤵
                                                                • Loads dropped DLL
                                                                • Enumerates connected drives
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2716
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5968 -s 2736
                                                              2⤵
                                                              • Program crash
                                                              PID:756
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                                                            1⤵
                                                            • Loads dropped DLL
                                                            • Drops file in Windows directory
                                                            PID:5484
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 5968 -ip 5968
                                                            1⤵
                                                              PID:4012

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                              Filesize

                                                              576KB

                                                              MD5

                                                              a2b17841edbe5dfbd1d0ad1060f6b7e8

                                                              SHA1

                                                              dc3e148daccd6f4d0038150e8d94001ace8f602a

                                                              SHA256

                                                              061adfc9e0f55a16ae9c20fe89f6aa195f7cd6f5fca43f25e8fbd6fc601fe09f

                                                              SHA512

                                                              01a6512316cfe2cd1e44b50f6291a2ce00dfdb8aa330aab15c6d21d158bedfaad038055836f29b937aeea59dda86702acc85c54f990007232f01d9a23a06c708

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                              Filesize

                                                              1024KB

                                                              MD5

                                                              86dace645a37cfd357ca8979fbaf980a

                                                              SHA1

                                                              9ad7c0b8e1c3b24db6f8f292f6c7068321f09316

                                                              SHA256

                                                              71694f2a4d4f5bd7e8c852128cd06944ff09a4aab8a4dd79e5987f22b8f415d7

                                                              SHA512

                                                              7aed1a9dcc19ac278e06718b966e12619e83360e660272e0c8d398941c2622a647b7de4a4fa725e76c234455cac4af46162f4f8281d96dde79d2a99d1122a118

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

                                                              Filesize

                                                              498B

                                                              MD5

                                                              90be2701c8112bebc6bd58a7de19846e

                                                              SHA1

                                                              a95be407036982392e2e684fb9ff6602ecad6f1e

                                                              SHA256

                                                              644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

                                                              SHA512

                                                              d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              7050d5ae8acfbe560fa11073fef8185d

                                                              SHA1

                                                              5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                              SHA256

                                                              cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                              SHA512

                                                              a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                            • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              e4aab327374bf7b6fad5b31b5cff9d08

                                                              SHA1

                                                              11fc0ce0fcd33c94b0006c7eb8199e22ec529ddb

                                                              SHA256

                                                              cb581d9ffca03e1e647a69054a3aaaac4fe5d36d2bd2945d61f8b98aa27f1712

                                                              SHA512

                                                              9253919e108edbc8ef6432793a07f3d24dee57cb46d19fd09b805eb4dc85c2c32d9a4bc713b7848e54a9bc25b82fe972d73bd38a089f0dcb518ba3b4b03c3e10

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                              Filesize

                                                              337B

                                                              MD5

                                                              3c88d6eeac285b6111913daaaed0ec91

                                                              SHA1

                                                              55d2ced6b779471044ed3ed24c43a02d712e8fee

                                                              SHA256

                                                              ca6bf6e701f7816e63e26f45ddd163aeba04ba9bd427edeb474ab68c1a2de165

                                                              SHA512

                                                              2373ccc1417a0e025c64245816483ea6ad73127b0c008e883d3641a2cca2217c350d57c36b7eff8cc44aeb129ae83c502efd106ea99a44a72f42ac93a3d9167f

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                                              Filesize

                                                              2B

                                                              MD5

                                                              f3b25701fe362ec84616a93a45ce9998

                                                              SHA1

                                                              d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                              SHA256

                                                              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                              SHA512

                                                              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              9a4388024c65305d90ea00efe8b9b8b3

                                                              SHA1

                                                              347fd7496ee8481f39b50a3c33620aa385f4c69d

                                                              SHA256

                                                              6fed818051dec3d2fe85885215bfe3bb72df88c09281f03ac11dc38dc2bf9153

                                                              SHA512

                                                              bf7ce806ad1becc6596c0880495fd949d8a952f82534a1c3605ea38e1e9e1cb187ef5235d9fd9e67643ac458caa51ad834c02b8a9ffc14e1520af3f3d9ef484c

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

                                                              Filesize

                                                              3KB

                                                              MD5

                                                              0367b5d4cb2c685272697ee5ea961151

                                                              SHA1

                                                              a7b96168b5f75f3a9d99a0d16985363e69e5615f

                                                              SHA256

                                                              ae0a5ca3654f924719ab824950577b00df0a494337e39a1b68e701426389309c

                                                              SHA512

                                                              0b7de8266dd314344bf2e5ae1eb580a8d7d6cf7bb0f3aa429e2c51c5867fc49f750ee20e98f94c8218c7cfaceed3d1429eef971e1281ad842b17aca9a340bcaf

                                                            • C:\Windows\xdwd.dll

                                                              Filesize

                                                              136KB

                                                              MD5

                                                              16e5a492c9c6ae34c59683be9c51fa31

                                                              SHA1

                                                              97031b41f5c56f371c28ae0d62a2df7d585adaba

                                                              SHA256

                                                              35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                                                              SHA512

                                                              20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                                                            • memory/32-105-0x000000001BA60000-0x000000001BB62000-memory.dmp

                                                              Filesize

                                                              1.0MB

                                                            • memory/32-150-0x00007FFBC21B0000-0x00007FFBC2C71000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/32-53-0x00007FFBC21B0000-0x00007FFBC2C71000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/32-2-0x00007FFBC21B3000-0x00007FFBC21B5000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/32-1-0x0000000000670000-0x00000000006D4000-memory.dmp

                                                              Filesize

                                                              400KB

                                                            • memory/32-0-0x00007FFBC21B3000-0x00007FFBC21B5000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/3700-108-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-112-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-113-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-114-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-115-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-116-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-117-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-118-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-106-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3700-107-0x000001CF19CC0000-0x000001CF19CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4392-450-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-560-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-559-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-558-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-561-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-470-0x00007FFB9D8D0000-0x00007FFB9D8E0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-465-0x00007FFB9D8D0000-0x00007FFB9D8E0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-453-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-452-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-451-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4392-449-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

                                                              Filesize

                                                              64KB