Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 13:06
Behavioral task
behavioral1
Sample
d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe
Resource
win10v2004-20220812-en
General
-
Target
d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe
-
Size
1.3MB
-
MD5
9fbef04babeb25326dcc41dd197e9c4b
-
SHA1
6be157d907b0c83ea98eb0871db937646fe4cdab
-
SHA256
d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb
-
SHA512
f509d9faeefd20f97cb4b7eb51212af2f4757449ca1adee2cfb66604325192147a7d8db47b446dd2e0dd0a41ffceaf14e662817bc02aa03d1482197094c933da
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3524 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4596 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3444 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 4340 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4504 4340 schtasks.exe 80 -
resource yara_rule behavioral1/files/0x0009000000022f41-137.dat dcrat behavioral1/files/0x0009000000022f41-138.dat dcrat behavioral1/memory/3500-139-0x0000000000240000-0x0000000000350000-memory.dmp dcrat behavioral1/files/0x0007000000022f53-167.dat dcrat behavioral1/files/0x0007000000022f53-168.dat dcrat behavioral1/files/0x0007000000022f53-175.dat dcrat behavioral1/files/0x0007000000022f53-178.dat dcrat behavioral1/files/0x0007000000022f53-186.dat dcrat behavioral1/files/0x0007000000022f53-193.dat dcrat behavioral1/files/0x0007000000022f53-200.dat dcrat behavioral1/files/0x0007000000022f53-207.dat dcrat behavioral1/files/0x0007000000022f53-214.dat dcrat behavioral1/files/0x0007000000022f53-221.dat dcrat behavioral1/files/0x0007000000022f53-228.dat dcrat behavioral1/files/0x0007000000022f53-235.dat dcrat -
Executes dropped EXE 12 IoCs
pid Process 3500 DllCommonsvc.exe 2280 explorer.exe 1316 explorer.exe 2588 explorer.exe 1824 explorer.exe 1612 explorer.exe 1144 explorer.exe 2096 explorer.exe 4852 explorer.exe 2728 explorer.exe 2012 explorer.exe 1316 explorer.exe -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\5b884080fd4f94 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1604 schtasks.exe 4128 schtasks.exe 4596 schtasks.exe 4172 schtasks.exe 4800 schtasks.exe 2440 schtasks.exe 4532 schtasks.exe 2640 schtasks.exe 3524 schtasks.exe 3444 schtasks.exe 4504 schtasks.exe 4312 schtasks.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3500 DllCommonsvc.exe 872 powershell.exe 4084 powershell.exe 552 powershell.exe 4088 powershell.exe 1084 powershell.exe 4088 powershell.exe 4084 powershell.exe 872 powershell.exe 552 powershell.exe 1084 powershell.exe 2280 explorer.exe 2588 explorer.exe 1824 explorer.exe 1612 explorer.exe 1144 explorer.exe 2096 explorer.exe 4852 explorer.exe 2728 explorer.exe 2012 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3500 DllCommonsvc.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 552 powershell.exe Token: SeDebugPrivilege 4088 powershell.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 2280 explorer.exe Token: SeDebugPrivilege 2588 explorer.exe Token: SeDebugPrivilege 1824 explorer.exe Token: SeDebugPrivilege 1612 explorer.exe Token: SeDebugPrivilege 1144 explorer.exe Token: SeDebugPrivilege 2096 explorer.exe Token: SeDebugPrivilege 4852 explorer.exe Token: SeDebugPrivilege 2728 explorer.exe Token: SeDebugPrivilege 2012 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 692 1944 d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe 76 PID 1944 wrote to memory of 692 1944 d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe 76 PID 1944 wrote to memory of 692 1944 d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe 76 PID 692 wrote to memory of 3896 692 WScript.exe 77 PID 692 wrote to memory of 3896 692 WScript.exe 77 PID 692 wrote to memory of 3896 692 WScript.exe 77 PID 3896 wrote to memory of 3500 3896 cmd.exe 79 PID 3896 wrote to memory of 3500 3896 cmd.exe 79 PID 3500 wrote to memory of 872 3500 DllCommonsvc.exe 93 PID 3500 wrote to memory of 872 3500 DllCommonsvc.exe 93 PID 3500 wrote to memory of 1084 3500 DllCommonsvc.exe 95 PID 3500 wrote to memory of 1084 3500 DllCommonsvc.exe 95 PID 3500 wrote to memory of 4084 3500 DllCommonsvc.exe 97 PID 3500 wrote to memory of 4084 3500 DllCommonsvc.exe 97 PID 3500 wrote to memory of 4088 3500 DllCommonsvc.exe 102 PID 3500 wrote to memory of 4088 3500 DllCommonsvc.exe 102 PID 3500 wrote to memory of 552 3500 DllCommonsvc.exe 99 PID 3500 wrote to memory of 552 3500 DllCommonsvc.exe 99 PID 3500 wrote to memory of 1532 3500 DllCommonsvc.exe 103 PID 3500 wrote to memory of 1532 3500 DllCommonsvc.exe 103 PID 1532 wrote to memory of 3628 1532 cmd.exe 105 PID 1532 wrote to memory of 3628 1532 cmd.exe 105 PID 1532 wrote to memory of 2280 1532 cmd.exe 106 PID 1532 wrote to memory of 2280 1532 cmd.exe 106 PID 2280 wrote to memory of 1920 2280 explorer.exe 107 PID 2280 wrote to memory of 1920 2280 explorer.exe 107 PID 1920 wrote to memory of 3436 1920 cmd.exe 109 PID 1920 wrote to memory of 3436 1920 cmd.exe 109 PID 1920 wrote to memory of 1316 1920 cmd.exe 116 PID 1920 wrote to memory of 1316 1920 cmd.exe 116 PID 312 wrote to memory of 4892 312 cmd.exe 122 PID 312 wrote to memory of 4892 312 cmd.exe 122 PID 312 wrote to memory of 2588 312 cmd.exe 123 PID 312 wrote to memory of 2588 312 cmd.exe 123 PID 2588 wrote to memory of 2376 2588 explorer.exe 124 PID 2588 wrote to memory of 2376 2588 explorer.exe 124 PID 2376 wrote to memory of 4024 2376 cmd.exe 126 PID 2376 wrote to memory of 4024 2376 cmd.exe 126 PID 2376 wrote to memory of 1824 2376 cmd.exe 128 PID 2376 wrote to memory of 1824 2376 cmd.exe 128 PID 1824 wrote to memory of 972 1824 explorer.exe 130 PID 1824 wrote to memory of 972 1824 explorer.exe 130 PID 972 wrote to memory of 2992 972 cmd.exe 132 PID 972 wrote to memory of 2992 972 cmd.exe 132 PID 972 wrote to memory of 1612 972 cmd.exe 133 PID 972 wrote to memory of 1612 972 cmd.exe 133 PID 1612 wrote to memory of 4032 1612 explorer.exe 134 PID 1612 wrote to memory of 4032 1612 explorer.exe 134 PID 4032 wrote to memory of 1748 4032 cmd.exe 136 PID 4032 wrote to memory of 1748 4032 cmd.exe 136 PID 4032 wrote to memory of 1144 4032 cmd.exe 137 PID 4032 wrote to memory of 1144 4032 cmd.exe 137 PID 1144 wrote to memory of 4004 1144 explorer.exe 138 PID 1144 wrote to memory of 4004 1144 explorer.exe 138 PID 4004 wrote to memory of 2896 4004 cmd.exe 140 PID 4004 wrote to memory of 2896 4004 cmd.exe 140 PID 4004 wrote to memory of 2096 4004 cmd.exe 141 PID 4004 wrote to memory of 2096 4004 cmd.exe 141 PID 2096 wrote to memory of 3596 2096 explorer.exe 145 PID 2096 wrote to memory of 3596 2096 explorer.exe 145 PID 3596 wrote to memory of 1772 3596 cmd.exe 147 PID 3596 wrote to memory of 1772 3596 cmd.exe 147 PID 3596 wrote to memory of 4852 3596 cmd.exe 148 PID 3596 wrote to memory of 4852 3596 cmd.exe 148
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe"C:\Users\Admin\AppData\Local\Temp\d6d833422303f635270517bc93d20e26b9bcf210b43b4da348af5f996753fdbb.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\SendTo\sppsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\SppExtComObj.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6uMYZ5DmT2.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:3628
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hGpPWS23Hw.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:3436
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"8⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\j95GpUP4tv.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:4892
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HZWv28qLDz.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:4024
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Jk1vLt9ke4.bat"13⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2992
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"14⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Nc51i3GWIc.bat"15⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1748
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"16⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xkGYwzkQoc.bat"17⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2896
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"18⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cU7BGbiaqd.bat"19⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:1772
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"20⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GUMorhJGzB.bat"21⤵PID:2812
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2064
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"22⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\voEVGuhWUp.bat"23⤵PID:4364
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:912
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"24⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Lg3y2yDdyq.bat"25⤵PID:1844
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:4852
-
-
C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe"26⤵
- Executes dropped EXE
PID:1316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Default\SendTo\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\SendTo\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Users\Default\SendTo\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Default User\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
228B
MD569970613b087b9033ec5406c787d5adf
SHA16721003e51b7e8eb42a9fe4469a1fec6c1e16769
SHA256ac6644c8535b3350cc05f0beaf2ed3780443929abd243304352221ee12ae5a82
SHA512241b18824a3bed4b4d13ee238fcb625e06a556ff4fce85d6e61f64f8126a63726c53408bd698fa0adbc79306f4ecdaecef5e55c0c3f78ec45291495e1efe3d5f
-
Filesize
228B
MD596dd5814b505f4a26c91fba603e39515
SHA1aff821d856ce7f4bae37a69946902a9f6676a216
SHA256a834cd8f5b5c4468afee2eec27f8a5eee607c8656f6d5a3954ff87f564a5e5f8
SHA512275e631e3931f0c2554aa332f3d10eba310272cf608e221115f9c41ad700c8f3208fd77a6dc5ffc2a86dc65dbfcf7516f943ab87ee66316503fddd9c795dfb8d
-
Filesize
228B
MD55188b327be9f8e06027129580fee7669
SHA14ded2144d39e2de5fc61f3af566d39524db6b31a
SHA256563a1dd7bc83a7af4e6aa866f8ae1826f587f4344f3470b053a4e2446b4f95da
SHA512fdf579f3e6bf0daec9a53f8b716560347a4031c71f8841c340f89e8f4e56cbec9601945b956cf4c5d45ff55cc142dd9fd15c99020af3b08dfe03fa7299a9d459
-
Filesize
228B
MD55b416ec0e24f71fbe214921f22cf2866
SHA1de28e73b95d70afd4da548342e48f4ca160b0693
SHA2562ed18616c058b9e7e434ad907ce238f6c03b2cf38ec419bf25d68a501e17b7c9
SHA5128a5762ae73296ed3eb4f0609b3649a14bbf26d779d3551166e80ec9877d909e72d1bd5e4e03abcb389214cdb5edf7e6ddf94e923bb216f70aadcffe4fa937bf2
-
Filesize
228B
MD58901559c897208af80022dd0dfa0cca2
SHA1525f241fbb863abfabce780869a6583c0bbfaf80
SHA256ff209eb4e198e03ba6b37b448faed5704749902c982d6e84de7bc1ea3d075255
SHA512d8f670de11303c796060fa1ba23ae4a4bc6e6b330cfa01bf0c56959d1f1eeccc83fb8de62b850d67473db2756a74c5915aeedaf32a67c9c00231c3dd2a85c21c
-
Filesize
228B
MD56aa8bfc792562fbc012175cc0391623d
SHA1d4d1ebdb7117c2b11b191341b6a9e53e10bd967a
SHA256706377fa8e078f74255ae46b8081357f7fdaf5bcff778e458e8fa893847b5d59
SHA51274986e93bf05605c8c64fa22f3f9f1bf4d67091a47dd1ec977d67355308990ce83cdc5d71e16fd0f6997b4d5483b2a6a22cc20ee399a222b9bdc7827e2aa1295
-
Filesize
228B
MD55976df32cf64de3c3200c17fe26feb73
SHA13d824b6006861165d448ce999a317a51e7d61413
SHA256632871c490b96fbceb6647b0f0d96f1b34f85e82ccc9a7f7868c486a4b77e71a
SHA512cad77da5a9e08e5dd6807a91d26207dde69a28713adde271fea67646a16b1f10592b1d8ea6f9e50dae6dbf61f80c8002dcafbaf1495f4e204e9da43337170c03
-
Filesize
228B
MD58a6e621480a67c404e56f0d966a44a03
SHA1b9d5696151e92f9c0bdb32fd2f81447f8a0abb55
SHA2561f0883f7e8902dfaaf74b10e975c9084f700eae93ab882eac2efe423804f754c
SHA5126669d3dcca5b78840f93312375de27e473e7fc2e432098ac1d3e715c56b488e0a9722abc8c8c5704e191e6dec27480f9704176bd443a9c47b59cf5b8454d413a
-
Filesize
228B
MD58a1282e36c7aaec51e859806dfd93f68
SHA164f2acc273b1f556f2dd2c9ca8fd9c9c3bed94cf
SHA256cf3c0738a6f91a3be9a29fa020bbf8cf2ef5159f27c5735cf677be7719b96260
SHA5125bb7d6895bfc4cbcce59626cbd24855f86b0d4381be16f0ad2babbb53989e05dbf810fc86da98c3e31d7974d30f1a313e243192b1b5211233e1da7c5cc25b439
-
Filesize
228B
MD51b95f2c6dcedd9ae88da990b7ef3e001
SHA136a19b5ecb5bea863b19bf4c96ecd81bc14dba2c
SHA256e0adbf4c6d63598bb0e5670b8fad666ebcd21d47e3e72c6acba94dd63d388b38
SHA512d2195731b235cbfec5e507383c4e0cff5ad204d4b0317ecb8eae20877dcec48c2dbe20e6682219d71d843f517dffaf355fdb0b1a18d70273a947febed99cc974
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478