Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 13:52
Behavioral task
behavioral1
Sample
3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe
Resource
win10v2004-20220812-en
General
-
Target
3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe
-
Size
1.3MB
-
MD5
c900e0035b464eb2bf306fb7df30a929
-
SHA1
3a191623d8fa97348d5e969d8fcb88d294463d55
-
SHA256
3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd
-
SHA512
fa7ce17cd3d36273bd73b595aa1d111162ff50c611513cfef18472943756a034601a826b954143db5ff649d7e57f1384d93fb06728e1023618abf8186bcfe8a0
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1272 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 64 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4996 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 3800 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 3800 schtasks.exe 71 -
resource yara_rule behavioral1/files/0x0006000000022e0b-137.dat dcrat behavioral1/files/0x0006000000022e0b-138.dat dcrat behavioral1/memory/5052-139-0x00000000002A0000-0x00000000003B0000-memory.dmp dcrat behavioral1/files/0x0006000000022e13-146.dat dcrat behavioral1/files/0x0006000000022e13-147.dat dcrat behavioral1/files/0x0006000000022e13-166.dat dcrat behavioral1/files/0x0006000000022e13-175.dat dcrat behavioral1/files/0x0006000000022e13-182.dat dcrat behavioral1/files/0x0006000000022e13-189.dat dcrat behavioral1/files/0x0006000000022e13-196.dat dcrat behavioral1/files/0x0006000000022e13-203.dat dcrat behavioral1/files/0x0006000000022e13-210.dat dcrat behavioral1/files/0x0006000000022e13-217.dat dcrat behavioral1/files/0x0006000000022e13-224.dat dcrat behavioral1/files/0x0006000000022e13-228.dat dcrat behavioral1/files/0x0006000000022e13-235.dat dcrat -
Executes dropped EXE 13 IoCs
pid Process 5052 DllCommonsvc.exe 4292 dllhost.exe 4568 dllhost.exe 708 dllhost.exe 1700 dllhost.exe 1984 dllhost.exe 2876 dllhost.exe 4244 dllhost.exe 3492 dllhost.exe 2104 dllhost.exe 3984 dllhost.exe 4776 dllhost.exe 1868 dllhost.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\es-ES\fontdrvhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\5b884080fd4f94 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe 984 schtasks.exe 1864 schtasks.exe 1760 schtasks.exe 64 schtasks.exe 4996 schtasks.exe 1056 schtasks.exe 3464 schtasks.exe 1272 schtasks.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings dllhost.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 5052 DllCommonsvc.exe 5052 DllCommonsvc.exe 5052 DllCommonsvc.exe 5052 DllCommonsvc.exe 5052 DllCommonsvc.exe 5052 DllCommonsvc.exe 5052 DllCommonsvc.exe 1116 powershell.exe 1392 powershell.exe 4224 powershell.exe 3088 powershell.exe 4224 powershell.exe 4292 dllhost.exe 1392 powershell.exe 1116 powershell.exe 3088 powershell.exe 4568 dllhost.exe 708 dllhost.exe 1700 dllhost.exe 1984 dllhost.exe 2876 dllhost.exe 4244 dllhost.exe 3492 dllhost.exe 2104 dllhost.exe 3984 dllhost.exe 4776 dllhost.exe 1868 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 5052 DllCommonsvc.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 4292 dllhost.exe Token: SeDebugPrivilege 4224 powershell.exe Token: SeDebugPrivilege 3088 powershell.exe Token: SeDebugPrivilege 4568 dllhost.exe Token: SeDebugPrivilege 708 dllhost.exe Token: SeDebugPrivilege 1700 dllhost.exe Token: SeDebugPrivilege 1984 dllhost.exe Token: SeDebugPrivilege 2876 dllhost.exe Token: SeDebugPrivilege 4244 dllhost.exe Token: SeDebugPrivilege 3492 dllhost.exe Token: SeDebugPrivilege 2104 dllhost.exe Token: SeDebugPrivilege 3984 dllhost.exe Token: SeDebugPrivilege 4776 dllhost.exe Token: SeDebugPrivilege 1868 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4380 4888 3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe 81 PID 4888 wrote to memory of 4380 4888 3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe 81 PID 4888 wrote to memory of 4380 4888 3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe 81 PID 4380 wrote to memory of 4820 4380 WScript.exe 85 PID 4380 wrote to memory of 4820 4380 WScript.exe 85 PID 4380 wrote to memory of 4820 4380 WScript.exe 85 PID 4820 wrote to memory of 5052 4820 cmd.exe 87 PID 4820 wrote to memory of 5052 4820 cmd.exe 87 PID 5052 wrote to memory of 3088 5052 DllCommonsvc.exe 97 PID 5052 wrote to memory of 3088 5052 DllCommonsvc.exe 97 PID 5052 wrote to memory of 1116 5052 DllCommonsvc.exe 98 PID 5052 wrote to memory of 1116 5052 DllCommonsvc.exe 98 PID 5052 wrote to memory of 1392 5052 DllCommonsvc.exe 99 PID 5052 wrote to memory of 1392 5052 DllCommonsvc.exe 99 PID 5052 wrote to memory of 4224 5052 DllCommonsvc.exe 102 PID 5052 wrote to memory of 4224 5052 DllCommonsvc.exe 102 PID 5052 wrote to memory of 4292 5052 DllCommonsvc.exe 104 PID 5052 wrote to memory of 4292 5052 DllCommonsvc.exe 104 PID 4292 wrote to memory of 388 4292 dllhost.exe 109 PID 4292 wrote to memory of 388 4292 dllhost.exe 109 PID 388 wrote to memory of 4616 388 cmd.exe 110 PID 388 wrote to memory of 4616 388 cmd.exe 110 PID 388 wrote to memory of 4568 388 cmd.exe 112 PID 388 wrote to memory of 4568 388 cmd.exe 112 PID 4568 wrote to memory of 3404 4568 dllhost.exe 113 PID 4568 wrote to memory of 3404 4568 dllhost.exe 113 PID 3404 wrote to memory of 3988 3404 cmd.exe 115 PID 3404 wrote to memory of 3988 3404 cmd.exe 115 PID 3404 wrote to memory of 708 3404 cmd.exe 117 PID 3404 wrote to memory of 708 3404 cmd.exe 117 PID 708 wrote to memory of 4840 708 dllhost.exe 118 PID 708 wrote to memory of 4840 708 dllhost.exe 118 PID 4840 wrote to memory of 1868 4840 cmd.exe 120 PID 4840 wrote to memory of 1868 4840 cmd.exe 120 PID 4840 wrote to memory of 1700 4840 cmd.exe 121 PID 4840 wrote to memory of 1700 4840 cmd.exe 121 PID 1700 wrote to memory of 5076 1700 dllhost.exe 122 PID 1700 wrote to memory of 5076 1700 dllhost.exe 122 PID 5076 wrote to memory of 4256 5076 cmd.exe 124 PID 5076 wrote to memory of 4256 5076 cmd.exe 124 PID 5076 wrote to memory of 1984 5076 cmd.exe 125 PID 5076 wrote to memory of 1984 5076 cmd.exe 125 PID 1984 wrote to memory of 4820 1984 dllhost.exe 126 PID 1984 wrote to memory of 4820 1984 dllhost.exe 126 PID 4820 wrote to memory of 5012 4820 cmd.exe 128 PID 4820 wrote to memory of 5012 4820 cmd.exe 128 PID 4820 wrote to memory of 2876 4820 cmd.exe 129 PID 4820 wrote to memory of 2876 4820 cmd.exe 129 PID 2876 wrote to memory of 3540 2876 dllhost.exe 130 PID 2876 wrote to memory of 3540 2876 dllhost.exe 130 PID 3540 wrote to memory of 4536 3540 cmd.exe 132 PID 3540 wrote to memory of 4536 3540 cmd.exe 132 PID 3540 wrote to memory of 4244 3540 cmd.exe 133 PID 3540 wrote to memory of 4244 3540 cmd.exe 133 PID 4244 wrote to memory of 2356 4244 dllhost.exe 134 PID 4244 wrote to memory of 2356 4244 dllhost.exe 134 PID 2356 wrote to memory of 4020 2356 cmd.exe 136 PID 2356 wrote to memory of 4020 2356 cmd.exe 136 PID 2356 wrote to memory of 3492 2356 cmd.exe 137 PID 2356 wrote to memory of 3492 2356 cmd.exe 137 PID 3492 wrote to memory of 4788 3492 dllhost.exe 138 PID 3492 wrote to memory of 4788 3492 dllhost.exe 138 PID 4788 wrote to memory of 4756 4788 cmd.exe 140 PID 4788 wrote to memory of 4756 4788 cmd.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe"C:\Users\Admin\AppData\Local\Temp\3223b05524a6c8de662b0505d23266c5e7407c9dde82392afc10e413e6dba9fd.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\es-ES\fontdrvhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HZWv28qLDz.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4616
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JbtrqXgYk1.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:3988
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hD3D8PLBZ9.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:1868
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"11⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cU7BGbiaqd.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:4256
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\s1KW4B7p45.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:5012
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"15⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fBgHK1Vy37.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:4536
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"17⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\voEVGuhWUp.bat"18⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:4020
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"19⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HZWv28qLDz.bat"20⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:4756
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"21⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\00vfQAbtTV.bat"22⤵PID:4024
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2184
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"23⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0rnbwo7iYS.bat"24⤵PID:1528
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:1492
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"25⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uxMZkGAiOs.bat"26⤵PID:4856
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:3120
-
-
C:\providercommon\dllhost.exe"C:\providercommon\dllhost.exe"27⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BcIiUXCUMc.bat"28⤵PID:1444
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:229⤵PID:3428
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\providercommon\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:64
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\providercommon\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\providercommon\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\providercommon\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
194B
MD5376b459e91ca3b0de531f9e8231139bf
SHA14ea313aec4676617a2dbe0b2e89deecb4d1b650d
SHA2565aad90b2000ce640df3586a0888444b0ecdac3a689f6475e412fc1d0865f3e1a
SHA51241be02bb3e89e7fc25f13080a99bb5377592adb29ac7266554195902b0c92ee5839d7cdd374094cd0832e8ee59abe19ab623a4847b5c376e954da20abe875e55
-
Filesize
194B
MD5b3cb7941adb0a848525bf8c600db715d
SHA10dcecc82de85e3a3228db41a9f760bb41453052d
SHA256a33eb1ccc5b991bfa1d593579e5adde590d1cb6c7135b0942a9d436707ad45b7
SHA5128b6d935cfd376ef1de1ee50c2d19b23f815ae7b3306a5e61ec59003df148f121e2e50629301f12fd39ae1cfe5bb400b5b022b478e4d53f2fd0f18c7be6a89148
-
Filesize
194B
MD5adb2a1b3f1fdb68431d3d21eff0f9d1e
SHA1f4ea840891dc8c764506ce81827dda354b2a0dea
SHA256e210b5e150b34e6d438b024b19f61c79d766f00e80db0a8b131ed38df4d593da
SHA512f739783aade9ad8f90b7131a2741c2e865b62cde0bfd22e47325d7c42e68bbf89bcf06fba98d922bb97100c40a0963b2b6b0b2d493e13c0195f06029c624d57a
-
Filesize
194B
MD5adb2a1b3f1fdb68431d3d21eff0f9d1e
SHA1f4ea840891dc8c764506ce81827dda354b2a0dea
SHA256e210b5e150b34e6d438b024b19f61c79d766f00e80db0a8b131ed38df4d593da
SHA512f739783aade9ad8f90b7131a2741c2e865b62cde0bfd22e47325d7c42e68bbf89bcf06fba98d922bb97100c40a0963b2b6b0b2d493e13c0195f06029c624d57a
-
Filesize
194B
MD5d2be0c008a033cccea1c8f286d28e026
SHA10ab9c7b64cadb2147fd8fe27f8a2e8a2148c593b
SHA25615b7dc2d9ef6ad4a6d0c9345e625a80bdc7781ef8e89c4e9fb22ec236941f0b7
SHA512a57bad56303ec640cf06d00b3bfb539a4b6f25e0148b3584d1aea40e7d373e4ece56ad77ad9e78b669bcf41904375f3bf12570b59913adf45d876a9cfda1ca0b
-
Filesize
194B
MD564542efa447961aeb924fde88fcced3c
SHA1665959873484f774f97b5eabd19f56c09ab3bfb3
SHA256e0bec8e71163550f534689abe0b0dce4898305c6d0e002995710ad8f8a656e63
SHA512bb807d9a15e7c8fd73677489ebb5f1efeb9f4accef7c50619ac74d1c9bb75dd34036842b9cc155d1a27f1393f78f83847c52adfbd2b36b2d2d60034009b791c1
-
Filesize
194B
MD5789374b4993023aa3b7db9d43b5ed677
SHA157a880c564c395154a23f9552b588fd3e9d66a58
SHA2568b8d504d8417b11d2910059e4cfdc35c6c99a19288b8d8ce759fe9bc1546a33f
SHA512add650997fd77c210bc896225f715ab720cab800b025cf54974e4f8190c9b13f13ac76fd4be2936c6f577181211981a71836d26fb8f7fa838638ef5e9f83fd1b
-
Filesize
194B
MD55aa99da14f053b3d90ba8c441bcf2d90
SHA1e0f2be711f55dc222135214e7dd94858ccc24e78
SHA256e8022d1bf92e66ebd8bd3c12b611d14059d40c96c0a55e94ee8efd3d36c5a064
SHA512467e5a02c785ab67bb60d1cc32887f828c6d490bc24e4ce99f6c38eeede00751fd9f529db2511174208c6e50176b59b73597a4ca9b0097559f7ea1c806bd23af
-
Filesize
194B
MD5ecb1cd5159b606ecb2230dcd1ce374ae
SHA1ad401b188f200ed3eb6bdaab24be67631856bfab
SHA25679fda7f6e82a196c0db29cd7c8715dea1fda0b797618083934cc6b7e8d223da6
SHA5126804c242253560f11dd7821f9bc564edb06201ff6e29a83a16b1ae506aa50587e78b5cc783708d49240213ec9bafe4c05693449eff89f8906b80919da050642a
-
Filesize
194B
MD55083439d27e8307d2cbaa3418c203c48
SHA1642cafad934810c6c45490a4e54d3591f223ff65
SHA256d25e707c3be37eaeb2da6e1077b53ceebbafa110a722dcdff0310039ac57ead9
SHA5124a08a91cd18ccdc090d45f067001ac452f638d0929963dc29326ca51f60f07ecbe71f7029ba0cda193f4dbfd12a30c151c5b20765c238fa7053b1edece9d98f9
-
Filesize
194B
MD5420fe421c35d413b84cb78077351492b
SHA1ad0de816ddd5ff3dc4ecc4a1d376dc0e693339cf
SHA256d4b159538b783aaa14d794099b078ab6e35487954a063d2feaa87f0b20927380
SHA51234fedee126a1e639735459f2fa6be71436bec9689cea09c9557d348e958d1276f05138297c73ee3f2a9db3c76166118806dea7ff5509a3c85b685ffd663eb14a
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478