Analysis
-
max time kernel
26s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 05:06
Behavioral task
behavioral1
Sample
88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe
Resource
win10-20220812-en
General
-
Target
88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe
-
Size
1.3MB
-
MD5
087ec94d7adc88df60aa78bb8def7548
-
SHA1
e6bfda2c1b9159104cdb61834aeb8f37adb432e0
-
SHA256
88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2
-
SHA512
a045878121fad3960916f9f77d13dd9f07b94955e7e6cf39f950793e9895526b67e054d0d08389829993d21d77673fb2a79417381a5f3b4bfd7766c8c735a684
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3936 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3940 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4488 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 696 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3212 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5036 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4972 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4104 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4696 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 4728 schtasks.exe 70 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3364 4728 schtasks.exe 70 -
resource yara_rule behavioral1/files/0x000800000001ac0e-282.dat dcrat behavioral1/files/0x000800000001ac0e-283.dat dcrat behavioral1/memory/3952-284-0x0000000000F70000-0x0000000001080000-memory.dmp dcrat behavioral1/files/0x000800000001ac0e-425.dat dcrat behavioral1/files/0x000600000001ac2d-567.dat dcrat behavioral1/files/0x000600000001ac2d-566.dat dcrat behavioral1/files/0x000600000001ac2d-589.dat dcrat behavioral1/files/0x000600000001ac2d-595.dat dcrat -
Executes dropped EXE 2 IoCs
pid Process 3952 DllCommonsvc.exe 4720 DllCommonsvc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe DllCommonsvc.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\a76d7bf15d8370 DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CbsTemp\RuntimeBroker.exe DllCommonsvc.exe File created C:\Windows\CbsTemp\9e8d7a4ca61bd9 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3212 schtasks.exe 4052 schtasks.exe 4028 schtasks.exe 2588 schtasks.exe 3364 schtasks.exe 4972 schtasks.exe 1920 schtasks.exe 3004 schtasks.exe 4104 schtasks.exe 3940 schtasks.exe 4488 schtasks.exe 696 schtasks.exe 5036 schtasks.exe 4696 schtasks.exe 4688 schtasks.exe 3936 schtasks.exe 2248 schtasks.exe 4092 schtasks.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings 88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings DllCommonsvc.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3952 DllCommonsvc.exe 3952 DllCommonsvc.exe 3952 DllCommonsvc.exe 3952 DllCommonsvc.exe 4960 powershell.exe 4864 powershell.exe 4984 powershell.exe 4232 powershell.exe 4864 powershell.exe 4864 powershell.exe 4960 powershell.exe 4984 powershell.exe 4232 powershell.exe 4960 powershell.exe 4984 powershell.exe 4232 powershell.exe 4720 DllCommonsvc.exe 4720 DllCommonsvc.exe 4720 DllCommonsvc.exe 4720 DllCommonsvc.exe 4720 DllCommonsvc.exe 4720 DllCommonsvc.exe 4720 DllCommonsvc.exe 3452 powershell.exe 4844 powershell.exe 4160 powershell.exe 4396 powershell.exe 4844 powershell.exe 4396 powershell.exe 4160 powershell.exe 3452 powershell.exe 4844 powershell.exe 4396 powershell.exe 4160 powershell.exe 3452 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3952 DllCommonsvc.exe Token: SeDebugPrivilege 4960 powershell.exe Token: SeDebugPrivilege 4864 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 4232 powershell.exe Token: SeIncreaseQuotaPrivilege 4864 powershell.exe Token: SeSecurityPrivilege 4864 powershell.exe Token: SeTakeOwnershipPrivilege 4864 powershell.exe Token: SeLoadDriverPrivilege 4864 powershell.exe Token: SeSystemProfilePrivilege 4864 powershell.exe Token: SeSystemtimePrivilege 4864 powershell.exe Token: SeProfSingleProcessPrivilege 4864 powershell.exe Token: SeIncBasePriorityPrivilege 4864 powershell.exe Token: SeCreatePagefilePrivilege 4864 powershell.exe Token: SeBackupPrivilege 4864 powershell.exe Token: SeRestorePrivilege 4864 powershell.exe Token: SeShutdownPrivilege 4864 powershell.exe Token: SeDebugPrivilege 4864 powershell.exe Token: SeSystemEnvironmentPrivilege 4864 powershell.exe Token: SeRemoteShutdownPrivilege 4864 powershell.exe Token: SeUndockPrivilege 4864 powershell.exe Token: SeManageVolumePrivilege 4864 powershell.exe Token: 33 4864 powershell.exe Token: 34 4864 powershell.exe Token: 35 4864 powershell.exe Token: 36 4864 powershell.exe Token: SeIncreaseQuotaPrivilege 4960 powershell.exe Token: SeSecurityPrivilege 4960 powershell.exe Token: SeTakeOwnershipPrivilege 4960 powershell.exe Token: SeLoadDriverPrivilege 4960 powershell.exe Token: SeSystemProfilePrivilege 4960 powershell.exe Token: SeSystemtimePrivilege 4960 powershell.exe Token: SeProfSingleProcessPrivilege 4960 powershell.exe Token: SeIncBasePriorityPrivilege 4960 powershell.exe Token: SeCreatePagefilePrivilege 4960 powershell.exe Token: SeBackupPrivilege 4960 powershell.exe Token: SeRestorePrivilege 4960 powershell.exe Token: SeShutdownPrivilege 4960 powershell.exe Token: SeDebugPrivilege 4960 powershell.exe Token: SeSystemEnvironmentPrivilege 4960 powershell.exe Token: SeRemoteShutdownPrivilege 4960 powershell.exe Token: SeUndockPrivilege 4960 powershell.exe Token: SeManageVolumePrivilege 4960 powershell.exe Token: 33 4960 powershell.exe Token: 34 4960 powershell.exe Token: 35 4960 powershell.exe Token: 36 4960 powershell.exe Token: SeIncreaseQuotaPrivilege 4984 powershell.exe Token: SeSecurityPrivilege 4984 powershell.exe Token: SeTakeOwnershipPrivilege 4984 powershell.exe Token: SeLoadDriverPrivilege 4984 powershell.exe Token: SeSystemProfilePrivilege 4984 powershell.exe Token: SeSystemtimePrivilege 4984 powershell.exe Token: SeProfSingleProcessPrivilege 4984 powershell.exe Token: SeIncBasePriorityPrivilege 4984 powershell.exe Token: SeCreatePagefilePrivilege 4984 powershell.exe Token: SeBackupPrivilege 4984 powershell.exe Token: SeRestorePrivilege 4984 powershell.exe Token: SeShutdownPrivilege 4984 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeSystemEnvironmentPrivilege 4984 powershell.exe Token: SeRemoteShutdownPrivilege 4984 powershell.exe Token: SeUndockPrivilege 4984 powershell.exe Token: SeManageVolumePrivilege 4984 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2344 wrote to memory of 4056 2344 88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe 66 PID 2344 wrote to memory of 4056 2344 88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe 66 PID 2344 wrote to memory of 4056 2344 88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe 66 PID 4056 wrote to memory of 4088 4056 WScript.exe 67 PID 4056 wrote to memory of 4088 4056 WScript.exe 67 PID 4056 wrote to memory of 4088 4056 WScript.exe 67 PID 4088 wrote to memory of 3952 4088 cmd.exe 69 PID 4088 wrote to memory of 3952 4088 cmd.exe 69 PID 3952 wrote to memory of 4960 3952 DllCommonsvc.exe 80 PID 3952 wrote to memory of 4960 3952 DllCommonsvc.exe 80 PID 3952 wrote to memory of 4864 3952 DllCommonsvc.exe 81 PID 3952 wrote to memory of 4864 3952 DllCommonsvc.exe 81 PID 3952 wrote to memory of 4984 3952 DllCommonsvc.exe 86 PID 3952 wrote to memory of 4984 3952 DllCommonsvc.exe 86 PID 3952 wrote to memory of 4232 3952 DllCommonsvc.exe 83 PID 3952 wrote to memory of 4232 3952 DllCommonsvc.exe 83 PID 3952 wrote to memory of 588 3952 DllCommonsvc.exe 88 PID 3952 wrote to memory of 588 3952 DllCommonsvc.exe 88 PID 588 wrote to memory of 216 588 cmd.exe 90 PID 588 wrote to memory of 216 588 cmd.exe 90 PID 588 wrote to memory of 4720 588 cmd.exe 92 PID 588 wrote to memory of 4720 588 cmd.exe 92 PID 4720 wrote to memory of 4844 4720 DllCommonsvc.exe 108 PID 4720 wrote to memory of 4844 4720 DllCommonsvc.exe 108 PID 4720 wrote to memory of 3452 4720 DllCommonsvc.exe 102 PID 4720 wrote to memory of 3452 4720 DllCommonsvc.exe 102 PID 4720 wrote to memory of 4160 4720 DllCommonsvc.exe 104 PID 4720 wrote to memory of 4160 4720 DllCommonsvc.exe 104 PID 4720 wrote to memory of 4396 4720 DllCommonsvc.exe 106 PID 4720 wrote to memory of 4396 4720 DllCommonsvc.exe 106 PID 4720 wrote to memory of 3940 4720 DllCommonsvc.exe 110 PID 4720 wrote to memory of 3940 4720 DllCommonsvc.exe 110 PID 3940 wrote to memory of 4536 3940 cmd.exe 112 PID 3940 wrote to memory of 4536 3940 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe"C:\Users\Admin\AppData\Local\Temp\88a89f51b09a9707a5e4ac9e60e076dc588cd32a5ef52180dbab5a44103cd2a2.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\CbsTemp\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5SvqQxpu4Q.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:216
-
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\wininit.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\OfficeClickToRun.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\conhost.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zTR87A5U1o.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:4536
-
-
C:\odt\conhost.exe"C:\odt\conhost.exe"8⤵PID:384
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wUBsuxMZs4.bat"9⤵PID:4816
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:3004
-
-
C:\odt\conhost.exe"C:\odt\conhost.exe"10⤵PID:4796
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hiVaTihpWK.bat"11⤵PID:3516
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:4588
-
-
C:\odt\conhost.exe"C:\odt\conhost.exe"12⤵PID:4596
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\providercommon\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\odt\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b4268d8ae66fdd920476b97a1776bf85
SHA1f920de54f7467f0970eccc053d3c6c8dd181d49a
SHA25661d17affcc8d91ecb1858e710c455186f9d0ccfc4d8ae17a1145d87bc7317879
SHA51203b6b90641837f9efb6065698602220d6c5ad263d51d7b7714747c2a3c3c618bd3d94add206b034d6fa2b8e43cbd1ac4a1741cfa1c2b1c1fc8589ae0b0c89516
-
Filesize
1KB
MD5d63ff49d7c92016feb39812e4db10419
SHA12307d5e35ca9864ffefc93acf8573ea995ba189b
SHA256375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12
SHA51200f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
1KB
MD56f8354e79919b551d8803ba9253ae50c
SHA15741db9a2c9cb3dde4b1cb2f39ca455dd0126ec9
SHA256b3778c84888ab7b22473919cce130e7a4b1a41032c8752d94fc9c822006678aa
SHA512a996e666bae609ee88f8e3e2c6a422b8cf5f0cf56e0128dc5b5da8dd8a6d5a15165580714181492969a97e07ad64a3edadc511397b1ccb2bd587909b2747cbfd
-
Filesize
1KB
MD582b121db90d0f124fab8f375aa635169
SHA115b75b162b1547d786abcb0ac03c0b4587d06ac1
SHA25609f859cdb7f7838f108d6ba2f542cd13a17563c69e62f082e84ed0de0ab785fa
SHA5120d74a67f56949314d689cd1663c86fd97ca7974dcb7f9b28a766e61fd4fcd283163aefdab1700babc457cc053257a66460d22790c57be1e70a71d261dba76ff5
-
Filesize
1KB
MD5407b61ec11a020ec7accd0dbdda6ea61
SHA1f1a237280f123abac60e4ee503fd07e6f9bed711
SHA2566de2fbcdc254cf8aae24466cccf88c6fb0f972b38f53cd79398669123a808846
SHA512b6c61975dcbd75a004a01aaea18ce493bdbd1fd4feae78c988bcb5eb48b9b7ca9d7b80af9d8098efb4c73aee28e07fbf0ae336ba8ebd3aab947d627cd607b02b
-
Filesize
1KB
MD570c6580c8d3f72ad0e2a6ddb979df075
SHA185db16f836bbb4ac4b93ede022385adacd3154c4
SHA256660dbb63a402108d59718e286ffc62dad78928386584560710c02f2e16b0ba2b
SHA512ea35aa52c9775952f0c847d68983318e465608a5bb904948e448407b2c59a6a49107a092991077a16bdd88f2aa7067cf67b07686f5f3ea3cd97249476e813c73
-
Filesize
1KB
MD591481f12aabf4281c70a4c021d394fce
SHA1f80242317d997c130ac1575147232d84fb148ab0
SHA25660562bc49975a547b33c20ad9d6e08df9d0b15bddc417ec1a8c1f39c36a88bc5
SHA512f96221f33a3a5923cd857a9982a4070335e9582a09a1e0d406380dee4ecfa6f74a2c815a0c1b6208d917ffd8f9d0c3afc1adc536589e019344986947e6b46536
-
Filesize
1KB
MD5ccd2146b2dfb237e08168123dd84867c
SHA1d00d8eec54a0a591b816f2b71c3e0884c4444d13
SHA2567e2e33b333d3177966b08c9ca010acb9aedf82d1b249d96a10db303c7cbbd1d0
SHA512c09f3df76128ebd3e21b1316b2d56ab5e3a75fe693afbfff4825612f657bc3f2657c0dc29fd7580242477c6fb4c6493ebf067a1d772e9cc5e7368cb8de4baf38
-
Filesize
1KB
MD5ccd2146b2dfb237e08168123dd84867c
SHA1d00d8eec54a0a591b816f2b71c3e0884c4444d13
SHA2567e2e33b333d3177966b08c9ca010acb9aedf82d1b249d96a10db303c7cbbd1d0
SHA512c09f3df76128ebd3e21b1316b2d56ab5e3a75fe693afbfff4825612f657bc3f2657c0dc29fd7580242477c6fb4c6493ebf067a1d772e9cc5e7368cb8de4baf38
-
Filesize
199B
MD5567d4875fbc236b16ccf0eb3382987d6
SHA19feee2da418a4a4fdb1000fb2f170a27de02f2fb
SHA25650d3c50dc47c3b8373d7074c6594aaa609fdc0d73e995d38dee24f0c1613f7cf
SHA512b3dbe91425a85bf296f525306c62744298331787ac89fa42cbe1e38a525adca763eb21cc31e040ada348c94d519cca0e88cff85186410c354c06eca27bccde56
-
Filesize
183B
MD59a0e67d77cbf30ffaa0c32d0522e1b07
SHA192b268656195cb724042ca327dc0ce93db91af99
SHA256e8a39b7142038253dd376221cb130e622525e0ae3b8eaddae00f4e51429f30ab
SHA512d237b15027076eecb776dedbae73d8565d0360fcd37de2a10072a8e3ee478603649ea27cec265a5dc7946670c370a0e28b20033b521cf078c88997db06e14ee0
-
Filesize
183B
MD55c756cdf033b1ced3cfd626f60fb47aa
SHA1287c39d76410a82b9e011f02c5b43dcbf9f8a2c2
SHA256bdf8decf3ce49b1ad52c65a95a9b0da02b333b04d065a7626b39b034777e09a7
SHA512179ba5246ffe33120af9ca37e9263b37d3f5bcb043b39ffd22df5b01c31645e0f07cf58fe660dc10d94ce0fc924577aae23f30a21ccda3ed507b40dbf79e3000
-
Filesize
183B
MD5429d82e778099a874a661299d6e26000
SHA1cd396ca0873847c935eaa2875d308d2efb064809
SHA2562afa5eb0e7891e32bc80709a3ae3fcd471e51ee27af54f4ee7a0c4485c6615f2
SHA512082899dc01eb301521a8ce1e5659421cd25ec54dd5f3b6651055f9132ef446147cfb7253f994c78812fa33878481eb8781977e4c3b7d4a0351cce7ac10cbed7d
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478