Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 15:50
Behavioral task
behavioral1
Sample
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe
Resource
win10v2004-20220812-en
General
-
Target
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe
-
Size
1.3MB
-
MD5
8f2d25b0c003534f30a2b3a42ebb56b4
-
SHA1
93dc46fda102820f8402b2e1f41e295f4d0d4768
-
SHA256
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c
-
SHA512
53d46909cc1f5710209c5c0839d1c40393eb3e9c4a8323d7eda08bfcc0ffaa8186cd554a88c1b0437962fd9b8018e0c5e2a1841780f41781dced9b9228dd6f49
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3724 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3696 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3848 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4408 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3768 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4324 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3484 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3080 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 4692 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4556 4692 schtasks.exe 83 -
resource yara_rule behavioral1/files/0x0006000000022f5e-137.dat dcrat behavioral1/files/0x0006000000022f5e-138.dat dcrat behavioral1/memory/3436-139-0x0000000000440000-0x0000000000550000-memory.dmp dcrat behavioral1/files/0x0006000000022f6f-149.dat dcrat behavioral1/files/0x0006000000022f6f-148.dat dcrat behavioral1/files/0x0006000000022f6f-176.dat dcrat behavioral1/files/0x0006000000022f6f-184.dat dcrat behavioral1/files/0x0006000000022f6f-191.dat dcrat behavioral1/files/0x0006000000022f6f-198.dat dcrat behavioral1/files/0x0006000000022f6f-205.dat dcrat behavioral1/files/0x0006000000022f6f-212.dat dcrat behavioral1/files/0x0006000000022f6f-219.dat dcrat behavioral1/files/0x0006000000022f6f-226.dat dcrat -
Executes dropped EXE 10 IoCs
pid Process 3436 DllCommonsvc.exe 4668 System.exe 4420 System.exe 3108 System.exe 212 System.exe 2024 System.exe 3896 System.exe 4716 System.exe 4048 System.exe 956 System.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation System.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\088424020bedd6 DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\browser\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\browser\9e8d7a4ca61bd9 DllCommonsvc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Fonts\fontdrvhost.exe DllCommonsvc.exe File opened for modification C:\Windows\Fonts\fontdrvhost.exe DllCommonsvc.exe File created C:\Windows\Fonts\5b884080fd4f94 DllCommonsvc.exe File created C:\Windows\en-US\System.exe DllCommonsvc.exe File created C:\Windows\en-US\27d1bcfc3c54e0 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3676 schtasks.exe 3848 schtasks.exe 2204 schtasks.exe 2112 schtasks.exe 836 schtasks.exe 3484 schtasks.exe 1844 schtasks.exe 3928 schtasks.exe 3724 schtasks.exe 3768 schtasks.exe 4324 schtasks.exe 3080 schtasks.exe 4556 schtasks.exe 3696 schtasks.exe 4408 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings System.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 3436 DllCommonsvc.exe 1784 powershell.exe 1848 powershell.exe 3240 powershell.exe 948 powershell.exe 948 powershell.exe 4264 powershell.exe 4264 powershell.exe 1760 powershell.exe 1760 powershell.exe 948 powershell.exe 4668 System.exe 4668 System.exe 1784 powershell.exe 1784 powershell.exe 3240 powershell.exe 3240 powershell.exe 1848 powershell.exe 1848 powershell.exe 4264 powershell.exe 1760 powershell.exe 4420 System.exe 3108 System.exe 212 System.exe 2024 System.exe 3896 System.exe 4716 System.exe 4048 System.exe 956 System.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 3436 DllCommonsvc.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 1848 powershell.exe Token: SeDebugPrivilege 3240 powershell.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 4264 powershell.exe Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 4668 System.exe Token: SeDebugPrivilege 4420 System.exe Token: SeDebugPrivilege 3108 System.exe Token: SeDebugPrivilege 212 System.exe Token: SeDebugPrivilege 2024 System.exe Token: SeDebugPrivilege 3896 System.exe Token: SeDebugPrivilege 4716 System.exe Token: SeDebugPrivilege 4048 System.exe Token: SeDebugPrivilege 956 System.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 2148 4016 602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe 79 PID 4016 wrote to memory of 2148 4016 602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe 79 PID 4016 wrote to memory of 2148 4016 602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe 79 PID 2148 wrote to memory of 1600 2148 WScript.exe 84 PID 2148 wrote to memory of 1600 2148 WScript.exe 84 PID 2148 wrote to memory of 1600 2148 WScript.exe 84 PID 1600 wrote to memory of 3436 1600 cmd.exe 86 PID 1600 wrote to memory of 3436 1600 cmd.exe 86 PID 3436 wrote to memory of 1760 3436 DllCommonsvc.exe 103 PID 3436 wrote to memory of 1760 3436 DllCommonsvc.exe 103 PID 3436 wrote to memory of 948 3436 DllCommonsvc.exe 104 PID 3436 wrote to memory of 948 3436 DllCommonsvc.exe 104 PID 3436 wrote to memory of 1784 3436 DllCommonsvc.exe 105 PID 3436 wrote to memory of 1784 3436 DllCommonsvc.exe 105 PID 3436 wrote to memory of 1848 3436 DllCommonsvc.exe 107 PID 3436 wrote to memory of 1848 3436 DllCommonsvc.exe 107 PID 3436 wrote to memory of 3240 3436 DllCommonsvc.exe 111 PID 3436 wrote to memory of 3240 3436 DllCommonsvc.exe 111 PID 3436 wrote to memory of 4264 3436 DllCommonsvc.exe 110 PID 3436 wrote to memory of 4264 3436 DllCommonsvc.exe 110 PID 3436 wrote to memory of 4668 3436 DllCommonsvc.exe 115 PID 3436 wrote to memory of 4668 3436 DllCommonsvc.exe 115 PID 4668 wrote to memory of 3748 4668 System.exe 118 PID 4668 wrote to memory of 3748 4668 System.exe 118 PID 3748 wrote to memory of 4512 3748 cmd.exe 120 PID 3748 wrote to memory of 4512 3748 cmd.exe 120 PID 3748 wrote to memory of 4420 3748 cmd.exe 122 PID 3748 wrote to memory of 4420 3748 cmd.exe 122 PID 4420 wrote to memory of 1880 4420 System.exe 123 PID 4420 wrote to memory of 1880 4420 System.exe 123 PID 1880 wrote to memory of 3848 1880 cmd.exe 125 PID 1880 wrote to memory of 3848 1880 cmd.exe 125 PID 1880 wrote to memory of 3108 1880 cmd.exe 126 PID 1880 wrote to memory of 3108 1880 cmd.exe 126 PID 3108 wrote to memory of 3404 3108 System.exe 127 PID 3108 wrote to memory of 3404 3108 System.exe 127 PID 3404 wrote to memory of 1744 3404 cmd.exe 129 PID 3404 wrote to memory of 1744 3404 cmd.exe 129 PID 3404 wrote to memory of 212 3404 cmd.exe 130 PID 3404 wrote to memory of 212 3404 cmd.exe 130 PID 212 wrote to memory of 1348 212 System.exe 131 PID 212 wrote to memory of 1348 212 System.exe 131 PID 1348 wrote to memory of 2820 1348 cmd.exe 133 PID 1348 wrote to memory of 2820 1348 cmd.exe 133 PID 1348 wrote to memory of 2024 1348 cmd.exe 134 PID 1348 wrote to memory of 2024 1348 cmd.exe 134 PID 2024 wrote to memory of 780 2024 System.exe 135 PID 2024 wrote to memory of 780 2024 System.exe 135 PID 780 wrote to memory of 2124 780 cmd.exe 137 PID 780 wrote to memory of 2124 780 cmd.exe 137 PID 780 wrote to memory of 3896 780 cmd.exe 138 PID 780 wrote to memory of 3896 780 cmd.exe 138 PID 3896 wrote to memory of 3828 3896 System.exe 139 PID 3896 wrote to memory of 3828 3896 System.exe 139 PID 3828 wrote to memory of 2760 3828 cmd.exe 141 PID 3828 wrote to memory of 2760 3828 cmd.exe 141 PID 3828 wrote to memory of 4716 3828 cmd.exe 142 PID 3828 wrote to memory of 4716 3828 cmd.exe 142 PID 4716 wrote to memory of 1760 4716 System.exe 143 PID 4716 wrote to memory of 1760 4716 System.exe 143 PID 1760 wrote to memory of 4952 1760 cmd.exe 145 PID 1760 wrote to memory of 4952 1760 cmd.exe 145 PID 1760 wrote to memory of 4048 1760 cmd.exe 146 PID 1760 wrote to memory of 4048 1760 cmd.exe 146
Processes
-
C:\Users\Admin\AppData\Local\Temp\602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe"C:\Users\Admin\AppData\Local\Temp\602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Fonts\fontdrvhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\browser\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\conhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\en-US\System.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ewVMycoP0v.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4512
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QO5FEA9wo1.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:3848
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wpigNgqS7W.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:1744
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"11⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\i32OxRBhll.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2820
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hC9SSnetfo.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:2124
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"15⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HKL0gj8mBn.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2760
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"17⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\j8BV8simza.bat"18⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:4952
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"19⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FaowIOOII5.bat"20⤵PID:3200
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:4740
-
-
C:\Windows\en-US\System.exe"C:\Windows\en-US\System.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Windows\Fonts\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Fonts\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Windows\Fonts\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Mozilla Firefox\browser\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\browser\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\browser\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Windows\en-US\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\en-US\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Windows\en-US\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5ecceac16628651c18879d836acfcb062
SHA1420502b3e5220a01586c59504e94aa1ee11982c9
SHA25658238de09a8817ed9f894ed8e5bf06a897fd08e0b0bd77e508d37b2598edd2a9
SHA512be3c7cb529cafb00f58790a6f8b35c4ff6db9f7f43a507d2218fd80cebc88413e46f71b1bc35b8afcc36b68f9409c946470d1e74a4fe225400eeb6f3f898f5b3
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
192B
MD5f5c9eaeda15c4d64deee872f7f5ce200
SHA1d8a76673ad9a499e1316d49f63338dd1ed04e663
SHA2568c155fd2615fe74a3b185cfef4e782a1f2022d1daf4494aa6f6bdf82fa470f8c
SHA512e978868793d6d5146e09ed1878e72e0beb1d56e349bf7412ad6d782690af02c35fa87eff362cabf747b12ce7d38e4eb4dd3efa207e8b3ca68df87cbd3002be16
-
Filesize
192B
MD58b801081b6a3c6720675a8b65d0b82a1
SHA132cf2438ccd2efc3a07adbd82d1b1e32d8e56feb
SHA25675dbef9540545a0ed2425de16cc42924216bec471dca0a812bd28a131ebb68d7
SHA5128d7c9fbb64dbb20389cf4cc0c339631b290cc7a54c138a0c4bfa4c7d4f61d34f0ae0c9349c5e66350d9e20be26770e0cd209ce268ab86fa0f788b9c612df021c
-
Filesize
192B
MD5c89ca7e1283deb82ecdfaee792294751
SHA1dc2aa183e642ad3ba4b78f85261fad066d9f13ee
SHA2566f8aae22dd220c20e429ddec4a87923ebac446506425dabbe431ab2b48300811
SHA512f4ae720b756629ca27eda15e830b1d06070b9df35ca6dd54ece71c9e560bea85312e7d73f8266cf28d87f0e4a399ae479b7cc291078ca5efd8b46c15f656d029
-
Filesize
192B
MD56e73f87452d1e2e2502ec897ab67214b
SHA170e6959c34be9fc7fdf5033fa277e3cbd7edf456
SHA2569fa530dde34b8a6e81abb1fbde34c8420092695fab9f0aca05f04bcce67e0e99
SHA512b4ea2a8c3210eece2737067c579a0b1e0aa39c179724fc31387ecfe3fc094e71bce8cfe1babbcb23c257fd1366932d3e53b878a7404ebf734c0ab92a97ff6893
-
Filesize
192B
MD5ce77691c3382d259a056a28384ce259a
SHA1955e4097e17ac7f6989c4d1638426a169f23a0f9
SHA256733ee5fc706ce52a5a2eb14b2eacf34fdf44baa2073bdaa8a794b9bcf1e60d60
SHA5128aa97105f30a0d69e7801198c598d3fdb00b494553c2657b3fc6b9c14c2301b0c28499212519ab183cc1577b7940322bdcd607bac7230890b6911953478c91b8
-
Filesize
192B
MD50ab2a8d5040a3776daf04fcd2a78462b
SHA1470ecef645f8c571d38e7cbf29d80c833733715f
SHA256c650d242579b3ff4e207492d7765d2178b0b43021043788eaf10436676f6d121
SHA51283f60573af10148e305ef355b4edc2837c7f99936754533e5bc3d4ca9383c3a0705ee2964d4dac24b761d095ff84bdbaef6606201148d8d25d864716efcc18e0
-
Filesize
192B
MD53d67ee8bc00cbdcc56f59f7da6206189
SHA14a9f46ec59f99734c1d0c45b38782dcaa8527d90
SHA256ecb213fcdb49cda5d3a5c30386ee2af1eeb7bbf96b7bceff770a800884019912
SHA5120a0f87ef13944df269003df8f663dcb1a449e25e135097c8f920467dc7f0df8432e80ebcf7d1a7e16e772427497c861850b6a5de4dfa11143f0233f2a861e65f
-
Filesize
192B
MD59cc021005782a74de6a73e2a3f62aa4a
SHA17fbba55d61636e535ee1e86b272d5d7e68287b2c
SHA256c8b93f7b5c403a1905e5abf83e1e295d5f5a3ea7e7d9fe0f4b6058a1e1c5be99
SHA512650412dd0673a6c1b570021036bf40eb4e0da259230de2c96823fea6ac6dc1f501eb14a2f0754cb992e9b1913ce3567ec1d5b9091816547ce2254950c6119f99
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478