Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-09-2022 07:51
Static task
static1
Behavioral task
behavioral1
Sample
AE40B1604E91A796697711123B511B4404635B7297C4E.exe
Resource
win7-20220812-en
General
-
Target
AE40B1604E91A796697711123B511B4404635B7297C4E.exe
-
Size
4.9MB
-
MD5
1ec352f87b2a0f057fad1a1d8fdb4fb0
-
SHA1
6fde03bf354eb22766eeda3063c5513257723ee6
-
SHA256
ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc
-
SHA512
047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f
-
SSDEEP
98304:I+m3o+rxVmA8OM6KPigiaFfqw1crsT/e3Le7dqc:It42VmhOM6KPNiSqw1cwTu+l
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 272 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 608 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 688 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 1180 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 1180 schtasks.exe -
Processes:
resource yara_rule behavioral1/memory/1500-55-0x000000001C080000-0x000000001C318000-memory.dmp dcrat -
Executes dropped EXE 3 IoCs
Processes:
tmp7ACC.tmp.exewinlogon.exetmp203E.tmp.exepid process 1480 tmp7ACC.tmp.exe 2244 winlogon.exe 2352 tmp203E.tmp.exe -
Loads dropped DLL 11 IoCs
Processes:
WerFault.execmd.exeWerFault.exepid process 1340 WerFault.exe 1340 WerFault.exe 1340 WerFault.exe 1340 WerFault.exe 1340 WerFault.exe 2188 cmd.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ipinfo.io 7 ipinfo.io -
Drops file in Program Files directory 12 IoCs
Processes:
AE40B1604E91A796697711123B511B4404635B7297C4E.exedescription ioc process File created C:\Program Files\Reference Assemblies\Microsoft\Idle.exe AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\cc11b995f2a76d AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files\Microsoft Office\Office14\1033\taskhost.exe AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\6203df4a6bafc7 AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files\Microsoft Office\Office14\1033\b75386f1303e64 AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files\Reference Assemblies\Microsoft\6ccacd8608530f AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files\Windows Mail\ja-JP\WMIADAP.exe AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files\Windows Mail\ja-JP\75a57c1bdf437c AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files\Windows Portable Devices\csrss.exe AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files\Windows Portable Devices\886983d96e3d3e AE40B1604E91A796697711123B511B4404635B7297C4E.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\lsass.exe AE40B1604E91A796697711123B511B4404635B7297C4E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1340 1480 WerFault.exe tmp7ACC.tmp.exe 2368 2352 WerFault.exe tmp203E.tmp.exe -
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1760 schtasks.exe 1044 schtasks.exe 1484 schtasks.exe 1616 schtasks.exe 524 schtasks.exe 316 schtasks.exe 844 schtasks.exe 272 schtasks.exe 940 schtasks.exe 1712 schtasks.exe 968 schtasks.exe 560 schtasks.exe 1888 schtasks.exe 2096 schtasks.exe 1888 schtasks.exe 1692 schtasks.exe 608 schtasks.exe 432 schtasks.exe 1164 schtasks.exe 1924 schtasks.exe 580 schtasks.exe 932 schtasks.exe 672 schtasks.exe 2044 schtasks.exe 688 schtasks.exe 1808 schtasks.exe 2076 schtasks.exe 1400 schtasks.exe 1972 schtasks.exe 1460 schtasks.exe 1496 schtasks.exe 1736 schtasks.exe 1948 schtasks.exe 1112 schtasks.exe 1144 schtasks.exe 1624 schtasks.exe 1252 schtasks.exe 1672 schtasks.exe 2160 schtasks.exe 1948 schtasks.exe 1704 schtasks.exe 1072 schtasks.exe 2120 schtasks.exe 2140 schtasks.exe 1736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AE40B1604E91A796697711123B511B4404635B7297C4E.exepid process 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AE40B1604E91A796697711123B511B4404635B7297C4E.exewinlogon.exedescription pid process Token: SeDebugPrivilege 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe Token: SeDebugPrivilege 2244 winlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
winlogon.exepid process 2244 winlogon.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
AE40B1604E91A796697711123B511B4404635B7297C4E.exetmp7ACC.tmp.execmd.exewinlogon.exetmp203E.tmp.exedescription pid process target process PID 1500 wrote to memory of 1480 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe tmp7ACC.tmp.exe PID 1500 wrote to memory of 1480 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe tmp7ACC.tmp.exe PID 1500 wrote to memory of 1480 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe tmp7ACC.tmp.exe PID 1500 wrote to memory of 1480 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe tmp7ACC.tmp.exe PID 1480 wrote to memory of 1340 1480 tmp7ACC.tmp.exe WerFault.exe PID 1480 wrote to memory of 1340 1480 tmp7ACC.tmp.exe WerFault.exe PID 1480 wrote to memory of 1340 1480 tmp7ACC.tmp.exe WerFault.exe PID 1480 wrote to memory of 1340 1480 tmp7ACC.tmp.exe WerFault.exe PID 1500 wrote to memory of 2188 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe cmd.exe PID 1500 wrote to memory of 2188 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe cmd.exe PID 1500 wrote to memory of 2188 1500 AE40B1604E91A796697711123B511B4404635B7297C4E.exe cmd.exe PID 2188 wrote to memory of 2220 2188 cmd.exe w32tm.exe PID 2188 wrote to memory of 2220 2188 cmd.exe w32tm.exe PID 2188 wrote to memory of 2220 2188 cmd.exe w32tm.exe PID 2188 wrote to memory of 2244 2188 cmd.exe winlogon.exe PID 2188 wrote to memory of 2244 2188 cmd.exe winlogon.exe PID 2188 wrote to memory of 2244 2188 cmd.exe winlogon.exe PID 2244 wrote to memory of 2352 2244 winlogon.exe tmp203E.tmp.exe PID 2244 wrote to memory of 2352 2244 winlogon.exe tmp203E.tmp.exe PID 2244 wrote to memory of 2352 2244 winlogon.exe tmp203E.tmp.exe PID 2244 wrote to memory of 2352 2244 winlogon.exe tmp203E.tmp.exe PID 2352 wrote to memory of 2368 2352 tmp203E.tmp.exe WerFault.exe PID 2352 wrote to memory of 2368 2352 tmp203E.tmp.exe WerFault.exe PID 2352 wrote to memory of 2368 2352 tmp203E.tmp.exe WerFault.exe PID 2352 wrote to memory of 2368 2352 tmp203E.tmp.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AE40B1604E91A796697711123B511B4404635B7297C4E.exe"C:\Users\Admin\AppData\Local\Temp\AE40B1604E91A796697711123B511B4404635B7297C4E.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 443⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mXwt0TPAcq.bat"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe"C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 445⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 8 /tr "'C:\Recovery\c11c4da2-1a8a-11ed-8505-e0b24281b398\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\c11c4da2-1a8a-11ed-8505-e0b24281b398\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 8 /tr "'C:\Recovery\c11c4da2-1a8a-11ed-8505-e0b24281b398\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\Office14\1033\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\Office14\1033\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Documents\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Documents\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Documents\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Recovery\c11c4da2-1a8a-11ed-8505-e0b24281b398\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\c11c4da2-1a8a-11ed-8505-e0b24281b398\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Recovery\c11c4da2-1a8a-11ed-8505-e0b24281b398\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\ja-JP\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\ja-JP\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Mail\ja-JP\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Start Menu\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Start Menu\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "tmp7ACC.tmpt" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Downloads\tmp7ACC.tmp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "tmp7ACC.tmp" /sc ONLOGON /tr "'C:\Users\Public\Downloads\tmp7ACC.tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "tmp7ACC.tmpt" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Downloads\tmp7ACC.tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exeFilesize
4.9MB
MD51ec352f87b2a0f057fad1a1d8fdb4fb0
SHA16fde03bf354eb22766eeda3063c5513257723ee6
SHA256ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc
SHA512047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f
-
C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exeFilesize
4.9MB
MD51ec352f87b2a0f057fad1a1d8fdb4fb0
SHA16fde03bf354eb22766eeda3063c5513257723ee6
SHA256ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc
SHA512047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f
-
C:\Users\Admin\AppData\Local\Temp\mXwt0TPAcq.batFilesize
231B
MD5767359e2c88451bfcd8817ab5d5b208b
SHA10fc22eff36c749465bb706fbf172239a15c2ff21
SHA2567594514bf045fc2d93f34ef5f411f11d764608836e0d8a28204ea33fe47518cd
SHA512534635a7eb8c2009b81121d2eb26ab52f89a825313cc837645a319abbb6df1a62cfdfa6b531ba747e66e7ce3ae641369fd994db89d33eb4a1c9c88654f975291
-
C:\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
C:\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exeFilesize
4.9MB
MD51ec352f87b2a0f057fad1a1d8fdb4fb0
SHA16fde03bf354eb22766eeda3063c5513257723ee6
SHA256ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc
SHA512047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f
-
\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp203E.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
\Users\Admin\AppData\Local\Temp\tmp7ACC.tmp.exeFilesize
52KB
MD5d8e1495b46cded57eb1423b8bb789834
SHA1db64bc20550e51c602dbb92d07c8f02842efebcc
SHA256aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8
SHA5128b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb
-
memory/1340-58-0x0000000000000000-mapping.dmp
-
memory/1480-56-0x0000000000000000-mapping.dmp
-
memory/1500-72-0x0000000002180000-0x000000000218E000-memory.dmpFilesize
56KB
-
memory/1500-66-0x0000000000600000-0x0000000000612000-memory.dmpFilesize
72KB
-
memory/1500-54-0x000000013F500000-0x000000013F9E6000-memory.dmpFilesize
4.9MB
-
memory/1500-55-0x000000001C080000-0x000000001C318000-memory.dmpFilesize
2.6MB
-
memory/1500-71-0x0000000002170000-0x000000000217E000-memory.dmpFilesize
56KB
-
memory/1500-70-0x0000000002120000-0x0000000002132000-memory.dmpFilesize
72KB
-
memory/1500-64-0x00000000005C0000-0x00000000005DC000-memory.dmpFilesize
112KB
-
memory/1500-69-0x0000000002110000-0x000000000211C000-memory.dmpFilesize
48KB
-
memory/1500-65-0x00000000005E0000-0x00000000005F6000-memory.dmpFilesize
88KB
-
memory/1500-67-0x0000000000610000-0x0000000000620000-memory.dmpFilesize
64KB
-
memory/1500-68-0x0000000000810000-0x0000000000866000-memory.dmpFilesize
344KB
-
memory/2188-73-0x0000000000000000-mapping.dmp
-
memory/2220-75-0x0000000000000000-mapping.dmp
-
memory/2244-80-0x000000013FFD0000-0x00000001404B6000-memory.dmpFilesize
4.9MB
-
memory/2244-77-0x0000000000000000-mapping.dmp
-
memory/2244-89-0x0000000000580000-0x0000000000592000-memory.dmpFilesize
72KB
-
memory/2244-90-0x000000001A7E0000-0x000000001A836000-memory.dmpFilesize
344KB
-
memory/2244-91-0x0000000002060000-0x0000000002072000-memory.dmpFilesize
72KB
-
memory/2352-81-0x0000000000000000-mapping.dmp
-
memory/2368-83-0x0000000000000000-mapping.dmp