Analysis
-
max time kernel
123s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 03:55
Behavioral task
behavioral1
Sample
1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe
Resource
win10v2004-20220812-en
General
-
Target
1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe
-
Size
1.2MB
-
MD5
f9d2c2af142780d56f0949bc70c9d527
-
SHA1
418c50d37d67303d10618b471b8184d4e49f6a46
-
SHA256
1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7
-
SHA512
b45f4329cf966c51febcf495364be4f63ce955d3ebe11ebdf1d65846f4b7b06279a2cce875c6385b38b2637b7be9617dbf71b3c62326ca518b3fcc923a584957
-
SSDEEP
24576:linPXeVB3y6h9Q7T3UlJkbuIkpcJwOUP49sV:ry6XxkbnEP1
Malware Config
Signatures
-
DcRat 46 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1772 schtasks.exe 832 schtasks.exe 2160 schtasks.exe 2244 schtasks.exe 2260 schtasks.exe 1600 schtasks.exe 548 schtasks.exe 1784 schtasks.exe 596 schtasks.exe 1924 schtasks.exe 1304 schtasks.exe 2064 schtasks.exe 1152 schtasks.exe 1948 schtasks.exe 360 schtasks.exe 1164 schtasks.exe 1932 schtasks.exe 848 schtasks.exe 1724 schtasks.exe 2088 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 1396 schtasks.exe 680 schtasks.exe 2132 schtasks.exe 1580 schtasks.exe 928 schtasks.exe 2000 schtasks.exe 1512 schtasks.exe 1800 schtasks.exe 1012 schtasks.exe 1716 schtasks.exe 680 schtasks.exe 2176 schtasks.exe 1520 schtasks.exe 1544 schtasks.exe 1108 schtasks.exe 2200 schtasks.exe 976 schtasks.exe 2112 schtasks.exe 2220 schtasks.exe 108 schtasks.exe 2024 schtasks.exe 1388 schtasks.exe 1836 schtasks.exe 1624 schtasks.exe 268 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\", \"C:\\Windows\\ja-JP\\smss.exe\", \"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\", \"C:\\Windows\\es-ES\\lsm.exe\", \"C:\\Program Files\\Windows Sidebar\\de-DE\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\", \"C:\\Windows\\ja-JP\\smss.exe\", \"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\", \"C:\\Windows\\es-ES\\lsm.exe\", \"C:\\Program Files\\Windows Sidebar\\de-DE\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Mail\\ja-JP\\lsass.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\", \"C:\\Windows\\ja-JP\\smss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\", \"C:\\Windows\\ja-JP\\smss.exe\", \"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\", \"C:\\Windows\\ja-JP\\smss.exe\", \"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\", \"C:\\Windows\\es-ES\\lsm.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\", \"C:\\Windows\\ja-JP\\smss.exe\", \"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\", \"C:\\Windows\\es-ES\\lsm.exe\", \"C:\\Program Files\\Windows Sidebar\\de-DE\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\lsass.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\", \"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\", \"C:\\Windows\\ja-JP\\smss.exe\", \"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\", \"C:\\Windows\\es-ES\\lsm.exe\", \"C:\\Program Files\\Windows Sidebar\\de-DE\\csrss.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Mail\\ja-JP\\lsass.exe\", \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.en\\WmiPrvSE.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Desktop\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\", \"C:\\Windows\\Web\\taskhost.exe\", \"C:\\Users\\Default\\Downloads\\WMIADAP.exe\", \"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\", \"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe -
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1772 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1152 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1836 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 108 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 848 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 268 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 360 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 548 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2244 1720 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 1720 schtasks.exe 28 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe -
resource yara_rule behavioral1/memory/1680-54-0x0000000000090000-0x00000000001C6000-memory.dmp dcrat behavioral1/files/0x00090000000126c7-113.dat dcrat behavioral1/files/0x00090000000126c7-114.dat dcrat behavioral1/memory/2236-115-0x0000000000C40000-0x0000000000D76000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2236 smss.exe -
Adds Run key to start application 2 TTPs 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\Downloaded Program Files\\spoolsv.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.en\\WmiPrvSE.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\Web\\taskhost.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Sidebar\\de-DE\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\ja-JP\\smss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\es-ES\\lsm.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\lsass.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Mail\\ja-JP\\lsass.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Users\\All Users\\Desktop\\taskhost.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\smss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.en\\WmiPrvSE.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Mail\\ja-JP\\lsass.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\de-DE\\dwm.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Users\\Default\\Downloads\\WMIADAP.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\es-ES\\lsm.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Sidebar\\de-DE\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Users\\All Users\\Desktop\\taskhost.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Internet Explorer\\ja-JP\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Common Files\\System\\ado\\de-DE\\csrss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Mail\\fr-FR\\lsass.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\Web\\taskhost.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Users\\Default\\Downloads\\WMIADAP.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\ja-JP\\smss.exe\"" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\ja-JP\RCX5814.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\RCX4388.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\RCX73A4.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\6cb0b6c459d5d3 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files\Common Files\System\ado\de-DE\csrss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files\Windows Sidebar\de-DE\csrss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files\Windows Sidebar\de-DE\886983d96e3d3e 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\6203df4a6bafc7 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\de-DE\RCXFB75.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\de-DE\dwm.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\RCX400E.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files\Common Files\System\ado\de-DE\886983d96e3d3e 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files\Internet Explorer\ja-JP\csrss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files\Internet Explorer\ja-JP\886983d96e3d3e 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\lsass.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\lsass.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\6203df4a6bafc7 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\csrss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\RCX701B.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\RCX7FA8.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\RCX5B8E.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Program Files (x86)\Windows NT\Accessories\de-DE\dwm.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\de-DE\RCXF7FA.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\csrss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\csrss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\lsass.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\RCX8831.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\RCX7C2D.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\RCX8BAB.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\lsass.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File created C:\Windows\Web\taskhost.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Windows\Web\b75386f1303e64 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Windows\ja-JP\smss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Windows\es-ES\101b941d020240 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\Web\taskhost.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\Downloaded Program Files\spoolsv.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Windows\Downloaded Program Files\spoolsv.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Windows\ja-JP\69ddcba757bf72 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\Web\RCX1001.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\ja-JP\RCX4F8B.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Windows\Downloaded Program Files\f3b6ecef712a24 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File created C:\Windows\es-ES\lsm.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\Downloaded Program Files\RCX2807.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\Downloaded Program Files\RCX2B82.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\es-ES\RCX6417.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\Web\RCX137B.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\ja-JP\RCX4C11.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\ja-JP\smss.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\es-ES\RCX6792.tmp 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe File opened for modification C:\Windows\es-ES\lsm.exe 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 928 schtasks.exe 2000 schtasks.exe 680 schtasks.exe 1724 schtasks.exe 1304 schtasks.exe 2064 schtasks.exe 1948 schtasks.exe 1108 schtasks.exe 976 schtasks.exe 2160 schtasks.exe 2200 schtasks.exe 2244 schtasks.exe 596 schtasks.exe 1716 schtasks.exe 1800 schtasks.exe 848 schtasks.exe 1580 schtasks.exe 1836 schtasks.exe 680 schtasks.exe 1784 schtasks.exe 108 schtasks.exe 1388 schtasks.exe 1512 schtasks.exe 548 schtasks.exe 1924 schtasks.exe 2112 schtasks.exe 1520 schtasks.exe 360 schtasks.exe 1544 schtasks.exe 1164 schtasks.exe 1624 schtasks.exe 2088 schtasks.exe 2260 schtasks.exe 1152 schtasks.exe 1396 schtasks.exe 1012 schtasks.exe 1600 schtasks.exe 268 schtasks.exe 2132 schtasks.exe 2220 schtasks.exe 1772 schtasks.exe 2024 schtasks.exe 2176 schtasks.exe 1932 schtasks.exe 832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 2912 powershell.exe 2372 powershell.exe 2448 powershell.exe 2336 powershell.exe 2404 powershell.exe 2612 powershell.exe 2556 powershell.exe 2984 powershell.exe 2300 powershell.exe 2768 powershell.exe 2856 powershell.exe 2476 powershell.exe 2496 powershell.exe 2356 powershell.exe 2320 powershell.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Token: SeDebugPrivilege 2236 smss.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2404 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 2300 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2320 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2300 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 75 PID 1680 wrote to memory of 2300 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 75 PID 1680 wrote to memory of 2300 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 75 PID 1680 wrote to memory of 2320 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 77 PID 1680 wrote to memory of 2320 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 77 PID 1680 wrote to memory of 2320 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 77 PID 1680 wrote to memory of 2336 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 78 PID 1680 wrote to memory of 2336 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 78 PID 1680 wrote to memory of 2336 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 78 PID 1680 wrote to memory of 2356 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 80 PID 1680 wrote to memory of 2356 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 80 PID 1680 wrote to memory of 2356 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 80 PID 1680 wrote to memory of 2372 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 82 PID 1680 wrote to memory of 2372 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 82 PID 1680 wrote to memory of 2372 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 82 PID 1680 wrote to memory of 2404 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 83 PID 1680 wrote to memory of 2404 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 83 PID 1680 wrote to memory of 2404 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 83 PID 1680 wrote to memory of 2416 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 85 PID 1680 wrote to memory of 2416 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 85 PID 1680 wrote to memory of 2416 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 85 PID 1680 wrote to memory of 2448 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 87 PID 1680 wrote to memory of 2448 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 87 PID 1680 wrote to memory of 2448 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 87 PID 1680 wrote to memory of 2476 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 88 PID 1680 wrote to memory of 2476 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 88 PID 1680 wrote to memory of 2476 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 88 PID 1680 wrote to memory of 2496 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 92 PID 1680 wrote to memory of 2496 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 92 PID 1680 wrote to memory of 2496 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 92 PID 1680 wrote to memory of 2556 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 100 PID 1680 wrote to memory of 2556 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 100 PID 1680 wrote to memory of 2556 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 100 PID 1680 wrote to memory of 2612 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 94 PID 1680 wrote to memory of 2612 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 94 PID 1680 wrote to memory of 2612 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 94 PID 1680 wrote to memory of 2768 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 97 PID 1680 wrote to memory of 2768 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 97 PID 1680 wrote to memory of 2768 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 97 PID 1680 wrote to memory of 2856 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 99 PID 1680 wrote to memory of 2856 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 99 PID 1680 wrote to memory of 2856 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 99 PID 1680 wrote to memory of 2912 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 102 PID 1680 wrote to memory of 2912 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 102 PID 1680 wrote to memory of 2912 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 102 PID 1680 wrote to memory of 2984 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 103 PID 1680 wrote to memory of 2984 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 103 PID 1680 wrote to memory of 2984 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 103 PID 1680 wrote to memory of 2236 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 107 PID 1680 wrote to memory of 2236 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 107 PID 1680 wrote to memory of 2236 1680 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe 107 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe"C:\Users\Admin\AppData\Local\Temp\1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1eb103ff7cb38fac0cd822ceed53ed7cc5ebc4646fe739049f1ca1de9156aed7.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Desktop\taskhost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\Accessories\de-DE\dwm.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\smss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Web\taskhost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Downloads\WMIADAP.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Downloaded Program Files\spoolsv.exe'2⤵PID:2416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\System\ado\de-DE\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ja-JP\smss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\es-ES\lsm.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\de-DE\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\fr-FR\lsass.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\ja-JP\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\ja-JP\lsass.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WmiPrvSE.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\smss.exe"C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\smss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Desktop\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Desktop\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\Accessories\de-DE\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\de-DE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\de-DE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Windows\Web\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Web\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Windows\Web\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Downloads\WMIADAP.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Users\Default\Downloads\WMIADAP.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Downloads\WMIADAP.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\Downloaded Program Files\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\Downloaded Program Files\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\c0f67622-1a8a-11ed-ae9f-b21da26d38ed\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\System\ado\de-DE\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\ado\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\System\ado\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Windows\ja-JP\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Windows\ja-JP\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\ja-JP\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Windows\es-ES\lsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\es-ES\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Windows\es-ES\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\de-DE\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\fr-FR\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c5e53f7ad387b7ed01c6dcb483e1c646
SHA16283492194ff610f2adb699bcefac9958166fbd2
SHA256848c3ebf7ab6fa1c7a6bfd66b28ccfdf57cabeeb812749efcb4a6a8daa6daf20
SHA5126177ee740f3c5ed8fa40bc0d4439679070678bc241b86502cfe55b0706c9df6d0242c72920f18a4d7a556fe809e338ccc93266245f8c9e923e866a6d98e0b14a
-
Filesize
1.2MB
MD5c5e53f7ad387b7ed01c6dcb483e1c646
SHA16283492194ff610f2adb699bcefac9958166fbd2
SHA256848c3ebf7ab6fa1c7a6bfd66b28ccfdf57cabeeb812749efcb4a6a8daa6daf20
SHA5126177ee740f3c5ed8fa40bc0d4439679070678bc241b86502cfe55b0706c9df6d0242c72920f18a4d7a556fe809e338ccc93266245f8c9e923e866a6d98e0b14a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50924d34e221887f38b81d5ce818e1d02
SHA10ee5b3d4255e193c7dd0749f7a2a167cf3ce5e54
SHA256751e8e4fc40bd23a78f9283d317847278cc3dc578b8afc6bf53818061acb8efa
SHA512d5ea856fe8b542ad1e97912847bb28f1de8337bb954b510ab3726aa9f26dd2254a457ba6cee64497864fcdf1f58c8e42fa71b6f6971514554ced9dc4de6c3b72