Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/10/2022, 18:56
Behavioral task
behavioral1
Sample
cb54fe9938168c64ee9dbdc0982a9917.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cb54fe9938168c64ee9dbdc0982a9917.exe
Resource
win10v2004-20220812-en
General
-
Target
cb54fe9938168c64ee9dbdc0982a9917.exe
-
Size
1.1MB
-
MD5
cb54fe9938168c64ee9dbdc0982a9917
-
SHA1
9b9e8e726a5b85e4e5dd1393f6d7492715ff51e5
-
SHA256
08b960976b9ab83018f62874758a07d07031182b60a682141bce7599e34e5981
-
SHA512
170c95d305a9e4a0fb855d2f84cd501551eaa6424a5a56110c4e10f092278833df670ea0cb3f8362263ebf56e513aa1bcc662dab7e616849bf876e512fcbf28f
-
SSDEEP
12288:qDNE5BggCqq44nBH9IB5SxyU6UD7/MoAhxEkNiwZG7Tn5jnv/7uTi3X1enGQtxRH:qDNb/JBH9e7mEhxFfGnNa/RABVKIDNG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\", \"C:\\Users\\Public\\Documents\\smss.exe\", \"C:\\MSOCache\\All Users\\taskhost.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\dwm.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\", \"C:\\Users\\Public\\Documents\\smss.exe\", \"C:\\MSOCache\\All Users\\taskhost.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\dwm.exe\", \"C:\\Program Files\\Google\\wininit.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\", \"C:\\Users\\Public\\Documents\\smss.exe\", \"C:\\MSOCache\\All Users\\taskhost.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\dwm.exe\", \"C:\\Program Files\\Google\\wininit.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\taskhost.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\", \"C:\\Users\\Public\\Documents\\smss.exe\", \"C:\\MSOCache\\All Users\\taskhost.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\dwm.exe\", \"C:\\Program Files\\Google\\wininit.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\taskhost.exe\", \"C:\\Program Files (x86)\\Common Files\\SpeechEngines\\Microsoft\\smss.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\", \"C:\\Users\\Public\\Documents\\smss.exe\", \"C:\\MSOCache\\All Users\\taskhost.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\dwm.exe\", \"C:\\Program Files\\Google\\wininit.exe\", \"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\taskhost.exe\", \"C:\\Program Files (x86)\\Common Files\\SpeechEngines\\Microsoft\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\services.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\", \"C:\\Users\\Public\\Documents\\smss.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\PCHEALTH\\System.exe\", \"C:\\Users\\Public\\Documents\\smss.exe\", \"C:\\MSOCache\\All Users\\taskhost.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe -
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1356 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 616 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 436 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 884 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 1212 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 1212 schtasks.exe 27 -
resource yara_rule behavioral1/memory/1324-54-0x0000000000340000-0x000000000044C000-memory.dmp dcrat behavioral1/memory/2216-96-0x0000000001250000-0x000000000135C000-memory.dmp dcrat behavioral1/files/0x00060000000143a3-93.dat dcrat behavioral1/files/0x00060000000143a3-90.dat dcrat -
Executes dropped EXE 1 IoCs
pid Process 2216 services.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\PCHEALTH\\System.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\taskhost.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files\\Google\\wininit.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Common Files\\SpeechEngines\\Microsoft\\smss.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\PCHEALTH\\System.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Public\\Documents\\smss.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\taskhost.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\dwm.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\dwm.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files\\Google\\wininit.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\services.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Public\\Documents\\smss.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\taskhost.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Recovery\\31001cc2-2a3d-11ed-9244-9c23e66b04e4\\taskhost.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Common Files\\SpeechEngines\\Microsoft\\smss.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\services.exe\"" cb54fe9938168c64ee9dbdc0982a9917.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Google\wininit.exe cb54fe9938168c64ee9dbdc0982a9917.exe File created C:\Program Files\Google\56085415360792 cb54fe9938168c64ee9dbdc0982a9917.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\smss.exe cb54fe9938168c64ee9dbdc0982a9917.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\69ddcba757bf72 cb54fe9938168c64ee9dbdc0982a9917.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\PCHEALTH\System.exe cb54fe9938168c64ee9dbdc0982a9917.exe File opened for modification C:\Windows\PCHEALTH\System.exe cb54fe9938168c64ee9dbdc0982a9917.exe File created C:\Windows\PCHEALTH\27d1bcfc3c54e0 cb54fe9938168c64ee9dbdc0982a9917.exe -
Creates scheduled task(s) 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1148 schtasks.exe 1728 schtasks.exe 1256 schtasks.exe 1020 schtasks.exe 1516 schtasks.exe 436 schtasks.exe 972 schtasks.exe 1904 schtasks.exe 1708 schtasks.exe 1832 schtasks.exe 1356 schtasks.exe 616 schtasks.exe 1964 schtasks.exe 1500 schtasks.exe 1848 schtasks.exe 884 schtasks.exe 1900 schtasks.exe 1776 schtasks.exe 1300 schtasks.exe 1620 schtasks.exe 1140 schtasks.exe 1056 schtasks.exe 1700 schtasks.exe 1552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 2216 services.exe 820 powershell.exe 1512 powershell.exe 1600 powershell.exe 988 powershell.exe 1188 powershell.exe 1744 powershell.exe 1460 powershell.exe 2020 powershell.exe 1348 powershell.exe 948 powershell.exe 1336 powershell.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2216 services.exe 2032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1324 cb54fe9938168c64ee9dbdc0982a9917.exe Token: SeDebugPrivilege 2216 services.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 988 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 1336 powershell.exe Token: SeBackupPrivilege 2064 vssvc.exe Token: SeRestorePrivilege 2064 vssvc.exe Token: SeAuditPrivilege 2064 vssvc.exe Token: SeDebugPrivilege 2032 powershell.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2032 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 52 PID 1324 wrote to memory of 2032 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 52 PID 1324 wrote to memory of 2032 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 52 PID 1324 wrote to memory of 988 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 53 PID 1324 wrote to memory of 988 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 53 PID 1324 wrote to memory of 988 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 53 PID 1324 wrote to memory of 1188 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 54 PID 1324 wrote to memory of 1188 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 54 PID 1324 wrote to memory of 1188 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 54 PID 1324 wrote to memory of 1348 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 56 PID 1324 wrote to memory of 1348 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 56 PID 1324 wrote to memory of 1348 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 56 PID 1324 wrote to memory of 1336 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 58 PID 1324 wrote to memory of 1336 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 58 PID 1324 wrote to memory of 1336 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 58 PID 1324 wrote to memory of 1512 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 61 PID 1324 wrote to memory of 1512 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 61 PID 1324 wrote to memory of 1512 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 61 PID 1324 wrote to memory of 1460 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 62 PID 1324 wrote to memory of 1460 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 62 PID 1324 wrote to memory of 1460 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 62 PID 1324 wrote to memory of 820 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 64 PID 1324 wrote to memory of 820 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 64 PID 1324 wrote to memory of 820 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 64 PID 1324 wrote to memory of 2020 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 66 PID 1324 wrote to memory of 2020 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 66 PID 1324 wrote to memory of 2020 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 66 PID 1324 wrote to memory of 948 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 68 PID 1324 wrote to memory of 948 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 68 PID 1324 wrote to memory of 948 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 68 PID 1324 wrote to memory of 1600 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 71 PID 1324 wrote to memory of 1600 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 71 PID 1324 wrote to memory of 1600 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 71 PID 1324 wrote to memory of 1744 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 72 PID 1324 wrote to memory of 1744 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 72 PID 1324 wrote to memory of 1744 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 72 PID 1324 wrote to memory of 2216 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 76 PID 1324 wrote to memory of 2216 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 76 PID 1324 wrote to memory of 2216 1324 cb54fe9938168c64ee9dbdc0982a9917.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb54fe9938168c64ee9dbdc0982a9917.exe"C:\Users\Admin\AppData\Local\Temp\cb54fe9938168c64ee9dbdc0982a9917.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe"C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\PCHEALTH\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\PCHEALTH\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\PCHEALTH\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Documents\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\Documents\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Documents\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Google\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1552
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5cb54fe9938168c64ee9dbdc0982a9917
SHA19b9e8e726a5b85e4e5dd1393f6d7492715ff51e5
SHA25608b960976b9ab83018f62874758a07d07031182b60a682141bce7599e34e5981
SHA512170c95d305a9e4a0fb855d2f84cd501551eaa6424a5a56110c4e10f092278833df670ea0cb3f8362263ebf56e513aa1bcc662dab7e616849bf876e512fcbf28f
-
Filesize
1.1MB
MD5cb54fe9938168c64ee9dbdc0982a9917
SHA19b9e8e726a5b85e4e5dd1393f6d7492715ff51e5
SHA25608b960976b9ab83018f62874758a07d07031182b60a682141bce7599e34e5981
SHA512170c95d305a9e4a0fb855d2f84cd501551eaa6424a5a56110c4e10f092278833df670ea0cb3f8362263ebf56e513aa1bcc662dab7e616849bf876e512fcbf28f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5195af26d1a1df87432af970ff5fe1860
SHA1e5e80bf5fa202054315d08628b9b684f4c0ef203
SHA256aad59acc80ee2078ddd3789094fd7cb6716e7be9b7dba13832b96e69e9e4eb16
SHA512dac6f1f5a0baefcd1139b6fb8d208aae0cec89bfd9f6287f1630ad88dda5d68e55e709186338c7d42f31702a68fa27772e5d41011ea9b804ec80f9eacde09954