Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15/10/2022, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
37aa26e9208b0930fb1068d718d2e32e.exe
Resource
win7-20220812-en
General
-
Target
37aa26e9208b0930fb1068d718d2e32e.exe
-
Size
4.9MB
-
MD5
37aa26e9208b0930fb1068d718d2e32e
-
SHA1
89a3c8a1f0288b0cb6797d0e17ddaa7961d65acc
-
SHA256
1a93d204cd4bf9b77434af18be074c47ad7fcebdd109ecc87f77d6b78a9ff2b3
-
SHA512
5c2645f16f8a0ba54c31128fc5f0f8b7b5e81ce208f42798904d39fd6de08e6f1378f9665e70412f5ba6b575dd90ca90191a8cbcdbf24511337a0ecf422d7fc8
-
SSDEEP
49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 656 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 704 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 804 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 988 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 788 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 1488 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 1488 schtasks.exe 27 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 37aa26e9208b0930fb1068d718d2e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 37aa26e9208b0930fb1068d718d2e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 37aa26e9208b0930fb1068d718d2e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" explorer.exe -
resource yara_rule behavioral1/memory/1196-55-0x000000001BAF0000-0x000000001BC1E000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2212 explorer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 37aa26e9208b0930fb1068d718d2e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 37aa26e9208b0930fb1068d718d2e32e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ipinfo.io 8 ipinfo.io -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Policies\7a0fd90576e088 37aa26e9208b0930fb1068d718d2e32e.exe File created C:\Program Files\Windows Media Player\de-DE\smss.exe 37aa26e9208b0930fb1068d718d2e32e.exe File created C:\Program Files\Windows Media Player\de-DE\69ddcba757bf72 37aa26e9208b0930fb1068d718d2e32e.exe File opened for modification C:\Program Files (x86)\Google\Policies\RCX193F.tmp 37aa26e9208b0930fb1068d718d2e32e.exe File opened for modification C:\Program Files (x86)\Google\Policies\explorer.exe 37aa26e9208b0930fb1068d718d2e32e.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\RCX21B9.tmp 37aa26e9208b0930fb1068d718d2e32e.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\smss.exe 37aa26e9208b0930fb1068d718d2e32e.exe File created C:\Program Files (x86)\Google\Policies\explorer.exe 37aa26e9208b0930fb1068d718d2e32e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1232 schtasks.exe 1040 schtasks.exe 1888 schtasks.exe 988 schtasks.exe 788 schtasks.exe 2004 schtasks.exe 1932 schtasks.exe 1724 schtasks.exe 968 schtasks.exe 1556 schtasks.exe 972 schtasks.exe 656 schtasks.exe 1796 schtasks.exe 1516 schtasks.exe 1976 schtasks.exe 1668 schtasks.exe 704 schtasks.exe 804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1196 37aa26e9208b0930fb1068d718d2e32e.exe 1196 37aa26e9208b0930fb1068d718d2e32e.exe 1196 37aa26e9208b0930fb1068d718d2e32e.exe 1196 37aa26e9208b0930fb1068d718d2e32e.exe 1196 37aa26e9208b0930fb1068d718d2e32e.exe 2212 explorer.exe 964 powershell.exe 1940 powershell.exe 1960 powershell.exe 820 powershell.exe 752 powershell.exe 1704 powershell.exe 1064 powershell.exe 696 powershell.exe 616 powershell.exe 632 powershell.exe 1992 powershell.exe 1744 powershell.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe 2212 explorer.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1196 37aa26e9208b0930fb1068d718d2e32e.exe Token: SeDebugPrivilege 2212 explorer.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeDebugPrivilege 616 powershell.exe Token: SeDebugPrivilege 632 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2212 explorer.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1704 1196 37aa26e9208b0930fb1068d718d2e32e.exe 46 PID 1196 wrote to memory of 1704 1196 37aa26e9208b0930fb1068d718d2e32e.exe 46 PID 1196 wrote to memory of 1704 1196 37aa26e9208b0930fb1068d718d2e32e.exe 46 PID 1196 wrote to memory of 752 1196 37aa26e9208b0930fb1068d718d2e32e.exe 47 PID 1196 wrote to memory of 752 1196 37aa26e9208b0930fb1068d718d2e32e.exe 47 PID 1196 wrote to memory of 752 1196 37aa26e9208b0930fb1068d718d2e32e.exe 47 PID 1196 wrote to memory of 820 1196 37aa26e9208b0930fb1068d718d2e32e.exe 50 PID 1196 wrote to memory of 820 1196 37aa26e9208b0930fb1068d718d2e32e.exe 50 PID 1196 wrote to memory of 820 1196 37aa26e9208b0930fb1068d718d2e32e.exe 50 PID 1196 wrote to memory of 1744 1196 37aa26e9208b0930fb1068d718d2e32e.exe 52 PID 1196 wrote to memory of 1744 1196 37aa26e9208b0930fb1068d718d2e32e.exe 52 PID 1196 wrote to memory of 1744 1196 37aa26e9208b0930fb1068d718d2e32e.exe 52 PID 1196 wrote to memory of 1992 1196 37aa26e9208b0930fb1068d718d2e32e.exe 53 PID 1196 wrote to memory of 1992 1196 37aa26e9208b0930fb1068d718d2e32e.exe 53 PID 1196 wrote to memory of 1992 1196 37aa26e9208b0930fb1068d718d2e32e.exe 53 PID 1196 wrote to memory of 632 1196 37aa26e9208b0930fb1068d718d2e32e.exe 54 PID 1196 wrote to memory of 632 1196 37aa26e9208b0930fb1068d718d2e32e.exe 54 PID 1196 wrote to memory of 632 1196 37aa26e9208b0930fb1068d718d2e32e.exe 54 PID 1196 wrote to memory of 696 1196 37aa26e9208b0930fb1068d718d2e32e.exe 56 PID 1196 wrote to memory of 696 1196 37aa26e9208b0930fb1068d718d2e32e.exe 56 PID 1196 wrote to memory of 696 1196 37aa26e9208b0930fb1068d718d2e32e.exe 56 PID 1196 wrote to memory of 1940 1196 37aa26e9208b0930fb1068d718d2e32e.exe 58 PID 1196 wrote to memory of 1940 1196 37aa26e9208b0930fb1068d718d2e32e.exe 58 PID 1196 wrote to memory of 1940 1196 37aa26e9208b0930fb1068d718d2e32e.exe 58 PID 1196 wrote to memory of 616 1196 37aa26e9208b0930fb1068d718d2e32e.exe 59 PID 1196 wrote to memory of 616 1196 37aa26e9208b0930fb1068d718d2e32e.exe 59 PID 1196 wrote to memory of 616 1196 37aa26e9208b0930fb1068d718d2e32e.exe 59 PID 1196 wrote to memory of 1960 1196 37aa26e9208b0930fb1068d718d2e32e.exe 60 PID 1196 wrote to memory of 1960 1196 37aa26e9208b0930fb1068d718d2e32e.exe 60 PID 1196 wrote to memory of 1960 1196 37aa26e9208b0930fb1068d718d2e32e.exe 60 PID 1196 wrote to memory of 964 1196 37aa26e9208b0930fb1068d718d2e32e.exe 65 PID 1196 wrote to memory of 964 1196 37aa26e9208b0930fb1068d718d2e32e.exe 65 PID 1196 wrote to memory of 964 1196 37aa26e9208b0930fb1068d718d2e32e.exe 65 PID 1196 wrote to memory of 1064 1196 37aa26e9208b0930fb1068d718d2e32e.exe 68 PID 1196 wrote to memory of 1064 1196 37aa26e9208b0930fb1068d718d2e32e.exe 68 PID 1196 wrote to memory of 1064 1196 37aa26e9208b0930fb1068d718d2e32e.exe 68 PID 1196 wrote to memory of 2212 1196 37aa26e9208b0930fb1068d718d2e32e.exe 70 PID 1196 wrote to memory of 2212 1196 37aa26e9208b0930fb1068d718d2e32e.exe 70 PID 1196 wrote to memory of 2212 1196 37aa26e9208b0930fb1068d718d2e32e.exe 70 PID 2212 wrote to memory of 2616 2212 explorer.exe 71 PID 2212 wrote to memory of 2616 2212 explorer.exe 71 PID 2212 wrote to memory of 2616 2212 explorer.exe 71 PID 2212 wrote to memory of 2636 2212 explorer.exe 72 PID 2212 wrote to memory of 2636 2212 explorer.exe 72 PID 2212 wrote to memory of 2636 2212 explorer.exe 72 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 37aa26e9208b0930fb1068d718d2e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 37aa26e9208b0930fb1068d718d2e32e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 37aa26e9208b0930fb1068d718d2e32e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37aa26e9208b0930fb1068d718d2e32e.exe"C:\Users\Admin\AppData\Local\Temp\37aa26e9208b0930fb1068d718d2e32e.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Program Files (x86)\Google\Policies\explorer.exe"C:\Program Files (x86)\Google\Policies\explorer.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2212 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3f8e6773-a8cc-45c3-9153-7068cfa0f40b.vbs"3⤵PID:2616
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7876fa1a-e8c5-4649-ba1c-840ed3130ee5.vbs"3⤵PID:2636
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Local Settings\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Local Settings\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\Policies\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Policies\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Policies\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\de-DE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\de-DE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Media Player\de-DE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Recorded TV\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Public\Recorded TV\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Recorded TV\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 13 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5f1cbc48ff46dd3e0705a20dedf8b377b
SHA1b427eee6450f9b1fb5e0df7a96659cde25340a26
SHA256de2742b8ca406eae90e4ce50bca961edcafb5f61e2df21362a59f12216880679
SHA5125d9fd4c70a016ebd80f398ae837b205595bfe71d56c4d77b0afa0e3911cdf826e403ba6f696f5e4bd6fc7e4b1e5cd45e37e449138f0b0764078329eb40548586
-
Filesize
4.9MB
MD5f1cbc48ff46dd3e0705a20dedf8b377b
SHA1b427eee6450f9b1fb5e0df7a96659cde25340a26
SHA256de2742b8ca406eae90e4ce50bca961edcafb5f61e2df21362a59f12216880679
SHA5125d9fd4c70a016ebd80f398ae837b205595bfe71d56c4d77b0afa0e3911cdf826e403ba6f696f5e4bd6fc7e4b1e5cd45e37e449138f0b0764078329eb40548586
-
Filesize
727B
MD5095b37ea376cf0f3ba9a1b18c818af79
SHA12b6718d70304f0b1b77a50bf1b0aac4ed35a02f3
SHA256c55c738d8bad2e2e5d76ba23b72bb76642ff9b44da5de79037f8224af6496cfc
SHA51207618dba8adaa44f53d61db7250c7632d80c9d4cdae8d638f7f3036d57ddfa3449fef51242271620a3deab41bd4a79533e01d69cdbbb78b8ec677c6d269f6f26
-
Filesize
503B
MD5579068cdfeb484ffb953bd412329cd53
SHA1d7bcfc457889298e91bcc079eb5b98457fbccaba
SHA25647350408841c090ce9534707fbc92135051709e23485ef4d6ef08d620ee4602f
SHA512c439632c14e1afe88cf343fc86ffa0f8da7715c53d59b212b9d639176d17440e7e743b3c3dadbff77bcbdfb9b2203a23638e70760cb2e2010f737425266f2ba9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ece50daa6f8820eada3c764ad11b117
SHA193550e1b4bf98f98eaedee8055a64744323d614f
SHA2568adeb1e24dcf5968a84859c5dc324b9b1a34d446a3f5557f3ff7e3f0a6c09d57
SHA51276a66fbb5077732f05f9582e9d41f571ccc4e1e657712f9bc7dac3ac21671940b21d7619158264eab39ced1e2cbcfa5da4798c47b04ae24704bdea7b581d9beb