Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2022, 11:48
Behavioral task
behavioral1
Sample
b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe
Resource
win10v2004-20220812-en
General
-
Target
b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe
-
Size
1.3MB
-
MD5
8008d370d88b1dae6d5b920560daee35
-
SHA1
50ad16bab233eaacae99828ecb5ba8ed154e7246
-
SHA256
b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67
-
SHA512
afd22f7a34f5574dc108bbe6878798c8695fdec902c75622620a3f544d6fd5b19af98da233deaa6e4af4c5d22da877b58a35821310b79ebe7d54c682f0e85896
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4820 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4788 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5080 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4224 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3996 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 4796 schtasks.exe 62 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 4796 schtasks.exe 62 -
resource yara_rule behavioral1/files/0x0009000000022f52-137.dat dcrat behavioral1/files/0x0009000000022f52-138.dat dcrat behavioral1/memory/320-139-0x0000000000980000-0x0000000000A90000-memory.dmp dcrat behavioral1/files/0x0006000000022f59-167.dat dcrat behavioral1/files/0x0006000000022f59-168.dat dcrat behavioral1/files/0x0006000000022f59-176.dat dcrat behavioral1/files/0x0006000000022f59-183.dat dcrat behavioral1/files/0x0006000000022f59-190.dat dcrat behavioral1/files/0x0006000000022f59-197.dat dcrat behavioral1/files/0x0006000000022f59-204.dat dcrat behavioral1/files/0x0006000000022f59-211.dat dcrat behavioral1/files/0x0006000000022f59-218.dat dcrat behavioral1/files/0x0006000000022f59-225.dat dcrat behavioral1/files/0x0006000000022f59-232.dat dcrat -
Executes dropped EXE 11 IoCs
pid Process 320 DllCommonsvc.exe 408 DllCommonsvc.exe 3188 DllCommonsvc.exe 100 DllCommonsvc.exe 4704 DllCommonsvc.exe 3292 DllCommonsvc.exe 1924 DllCommonsvc.exe 3948 DllCommonsvc.exe 4872 DllCommonsvc.exe 2416 DllCommonsvc.exe 4752 DllCommonsvc.exe -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Download\f3b6ecef712a24 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files (x86)\Google\Update\Download\spoolsv.exe DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ModemLogs\csrss.exe DllCommonsvc.exe File created C:\Windows\ModemLogs\886983d96e3d3e DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4820 schtasks.exe 4788 schtasks.exe 3748 schtasks.exe 5080 schtasks.exe 4224 schtasks.exe 3996 schtasks.exe 1544 schtasks.exe 2040 schtasks.exe 4876 schtasks.exe 3236 schtasks.exe 4812 schtasks.exe 2376 schtasks.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings DllCommonsvc.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 320 DllCommonsvc.exe 2348 powershell.exe 3348 powershell.exe 3380 powershell.exe 4848 powershell.exe 4252 powershell.exe 4848 powershell.exe 3348 powershell.exe 2348 powershell.exe 3380 powershell.exe 4252 powershell.exe 408 DllCommonsvc.exe 3188 DllCommonsvc.exe 100 DllCommonsvc.exe 4704 DllCommonsvc.exe 3292 DllCommonsvc.exe 1924 DllCommonsvc.exe 3948 DllCommonsvc.exe 4872 DllCommonsvc.exe 2416 DllCommonsvc.exe 4752 DllCommonsvc.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 320 DllCommonsvc.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 4848 powershell.exe Token: SeDebugPrivilege 4252 powershell.exe Token: SeDebugPrivilege 408 DllCommonsvc.exe Token: SeDebugPrivilege 3188 DllCommonsvc.exe Token: SeDebugPrivilege 100 DllCommonsvc.exe Token: SeDebugPrivilege 4704 DllCommonsvc.exe Token: SeDebugPrivilege 3292 DllCommonsvc.exe Token: SeDebugPrivilege 1924 DllCommonsvc.exe Token: SeDebugPrivilege 3948 DllCommonsvc.exe Token: SeDebugPrivilege 4872 DllCommonsvc.exe Token: SeDebugPrivilege 2416 DllCommonsvc.exe Token: SeDebugPrivilege 4752 DllCommonsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 4992 3036 b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe 80 PID 3036 wrote to memory of 4992 3036 b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe 80 PID 3036 wrote to memory of 4992 3036 b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe 80 PID 4992 wrote to memory of 2092 4992 WScript.exe 84 PID 4992 wrote to memory of 2092 4992 WScript.exe 84 PID 4992 wrote to memory of 2092 4992 WScript.exe 84 PID 2092 wrote to memory of 320 2092 cmd.exe 86 PID 2092 wrote to memory of 320 2092 cmd.exe 86 PID 320 wrote to memory of 4252 320 DllCommonsvc.exe 100 PID 320 wrote to memory of 4252 320 DllCommonsvc.exe 100 PID 320 wrote to memory of 2348 320 DllCommonsvc.exe 101 PID 320 wrote to memory of 2348 320 DllCommonsvc.exe 101 PID 320 wrote to memory of 3348 320 DllCommonsvc.exe 102 PID 320 wrote to memory of 3348 320 DllCommonsvc.exe 102 PID 320 wrote to memory of 3380 320 DllCommonsvc.exe 103 PID 320 wrote to memory of 3380 320 DllCommonsvc.exe 103 PID 320 wrote to memory of 4848 320 DllCommonsvc.exe 104 PID 320 wrote to memory of 4848 320 DllCommonsvc.exe 104 PID 320 wrote to memory of 3172 320 DllCommonsvc.exe 110 PID 320 wrote to memory of 3172 320 DllCommonsvc.exe 110 PID 3172 wrote to memory of 4568 3172 cmd.exe 112 PID 3172 wrote to memory of 4568 3172 cmd.exe 112 PID 3172 wrote to memory of 408 3172 cmd.exe 115 PID 3172 wrote to memory of 408 3172 cmd.exe 115 PID 408 wrote to memory of 1436 408 DllCommonsvc.exe 116 PID 408 wrote to memory of 1436 408 DllCommonsvc.exe 116 PID 1436 wrote to memory of 4008 1436 cmd.exe 118 PID 1436 wrote to memory of 4008 1436 cmd.exe 118 PID 1436 wrote to memory of 3188 1436 cmd.exe 120 PID 1436 wrote to memory of 3188 1436 cmd.exe 120 PID 3188 wrote to memory of 2068 3188 DllCommonsvc.exe 121 PID 3188 wrote to memory of 2068 3188 DllCommonsvc.exe 121 PID 2068 wrote to memory of 2160 2068 cmd.exe 123 PID 2068 wrote to memory of 2160 2068 cmd.exe 123 PID 2068 wrote to memory of 100 2068 cmd.exe 124 PID 2068 wrote to memory of 100 2068 cmd.exe 124 PID 100 wrote to memory of 4964 100 DllCommonsvc.exe 125 PID 100 wrote to memory of 4964 100 DllCommonsvc.exe 125 PID 4964 wrote to memory of 4224 4964 cmd.exe 127 PID 4964 wrote to memory of 4224 4964 cmd.exe 127 PID 4964 wrote to memory of 4704 4964 cmd.exe 128 PID 4964 wrote to memory of 4704 4964 cmd.exe 128 PID 4704 wrote to memory of 2980 4704 DllCommonsvc.exe 129 PID 4704 wrote to memory of 2980 4704 DllCommonsvc.exe 129 PID 2980 wrote to memory of 2092 2980 cmd.exe 131 PID 2980 wrote to memory of 2092 2980 cmd.exe 131 PID 2980 wrote to memory of 3292 2980 cmd.exe 132 PID 2980 wrote to memory of 3292 2980 cmd.exe 132 PID 3292 wrote to memory of 3816 3292 DllCommonsvc.exe 133 PID 3292 wrote to memory of 3816 3292 DllCommonsvc.exe 133 PID 3816 wrote to memory of 5108 3816 cmd.exe 135 PID 3816 wrote to memory of 5108 3816 cmd.exe 135 PID 3816 wrote to memory of 1924 3816 cmd.exe 136 PID 3816 wrote to memory of 1924 3816 cmd.exe 136 PID 1924 wrote to memory of 4088 1924 DllCommonsvc.exe 137 PID 1924 wrote to memory of 4088 1924 DllCommonsvc.exe 137 PID 4088 wrote to memory of 2356 4088 cmd.exe 139 PID 4088 wrote to memory of 2356 4088 cmd.exe 139 PID 4088 wrote to memory of 3948 4088 cmd.exe 140 PID 4088 wrote to memory of 3948 4088 cmd.exe 140 PID 3948 wrote to memory of 1884 3948 DllCommonsvc.exe 141 PID 3948 wrote to memory of 1884 3948 DllCommonsvc.exe 141 PID 1884 wrote to memory of 3732 1884 cmd.exe 143 PID 1884 wrote to memory of 3732 1884 cmd.exe 143
Processes
-
C:\Users\Admin\AppData\Local\Temp\b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe"C:\Users\Admin\AppData\Local\Temp\b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ModemLogs\csrss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Pictures\dwm.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yt7RvnjQdj.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4568
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oVhzrLBDaJ.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:4008
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"8⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RkPY472Oq9.bat"9⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2160
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0LMDaVm4bI.bat"11⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:4224
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\M1TWCJOn7d.bat"13⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2092
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"14⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mQXsfud8LV.bat"15⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:5108
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"16⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\M1TWCJOn7d.bat"17⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2356
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"18⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ww6iFNwlpp.bat"19⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:3732
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"20⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fdSjcfTSOA.bat"21⤵PID:2116
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2136
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"22⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SvvYNrLnHE.bat"23⤵PID:3500
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:1616
-
-
C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"24⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iYTmIkWLiw.bat"25⤵PID:4068
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:216
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\ModemLogs\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\ModemLogs\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\ModemLogs\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Pictures\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Pictures\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Pictures\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1KB
MD57f3c0ae41f0d9ae10a8985a2c327b8fb
SHA1d58622bf6b5071beacf3b35bb505bde2000983e3
SHA256519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900
SHA5128a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
217B
MD57c7b6aeeb0d89ee4727cbb343b2e3b76
SHA19e92f5ca631f7dbe058a51291f09d24beb3aa082
SHA256660f76fe59f69db84bcace72e938ca9da6c9cadd73547a1de1564f5e7c189c8e
SHA512b99428b5429d16e56f00c9668ffd303e52eaae8ce9bf3493532ff79f30ebbe54c636476f560a1a502a2e95f60fc73503b82ee6ff06f8c81cee68926cf43dadb2
-
Filesize
217B
MD5dd600962aed5746ef482701aba7561be
SHA18c30ec7f9cebcfc82f10721dfb248a99f93e0388
SHA256d4c7b17a0740328ffe57c760f9d9bbea9f1130d9dfb293aa01eeecbc2b2ed668
SHA512721aea95aeac0458d7bddaf5ba1e3bca838df8e71fafceaa5acb4b581ea88a241c8203ecdfc51990e4725e3d7f6bd06e8ae0cf2020636ac8413fd82ef2555540
-
Filesize
217B
MD5dd600962aed5746ef482701aba7561be
SHA18c30ec7f9cebcfc82f10721dfb248a99f93e0388
SHA256d4c7b17a0740328ffe57c760f9d9bbea9f1130d9dfb293aa01eeecbc2b2ed668
SHA512721aea95aeac0458d7bddaf5ba1e3bca838df8e71fafceaa5acb4b581ea88a241c8203ecdfc51990e4725e3d7f6bd06e8ae0cf2020636ac8413fd82ef2555540
-
Filesize
217B
MD5454112e6f4ac1883e63a42e3121c5fa8
SHA18071cee89c73c06e6274f6d67e470178aa123585
SHA25636b4299775fe937dca895ca9cd9ba39f33974823933a44efeb7abc8156182bc1
SHA5121933892c2326107c952be6d6e7af91a3564fbeb1102f2075426a35b81d64e7026cd9749f43748d931db1cd310ac112ea45b7d6b8e799fd458fa19213117891c8
-
Filesize
217B
MD568b5f8600ed0dc984fac01679b87a8aa
SHA1562669d8dd1c5f46ba8300da9030c21899b4df6f
SHA256dad6908e498d4c60f9e180faad0ce06f7a6dd445e052b028dd22d7a707998499
SHA51225a689fa4357551b9e313e55646f07f642ad1b2590d4ddf64feab1e8dc7ffa176d78b312def3545c6b513f33abd2d2f9aa7b6abcd378ba8cbc45307a8edff631
-
Filesize
217B
MD509eab5be846e6246fcc469c67480fbd6
SHA14246c86454c7bc6c75cdab4e30ce0bd1ea4fb410
SHA25634eee62ffd3c0ec534fa0ad2133b9f4d4c9a92643e04712c1662550b632d4a8a
SHA512c23820f86e072f58dc598d09ea5c6ab2f674f60f8a891d037aa58945e478f93b5a7aecccaf6947e4063158d299061298da73b09ff6bd0b3e88f0321d1def612b
-
Filesize
217B
MD5b57cddf47bfa7daa6a6dd0d81d184128
SHA17e256232c1d15162860c82aeb86eccfabcbe14a6
SHA256493a045eb0dcc4c7b4ccd5d5375bf322ae4d9d0292923a6973e49b9c53ada287
SHA512a6b152deeb8f0eea978e361009a9f4ea0983087097124071ddee513613cf9605dd89f79bfb59823a51264d7f36734c8ec9d9db6bf4e66fe40c261a922636b7f9
-
Filesize
217B
MD5c1f3d0c393f0559b7394a831a7af2463
SHA191d4526430da5068ebff76aed53d4decef0fc80e
SHA2565abf361d50956f5a8706e08456ecac24b8fb9cacc37e5c395c4a76a26015d911
SHA512d0c4feb0592957a9e3707878247111bf2b614c9b1909702f40b7c554d89faadd1ff39e19f8e51c27619d2ff1f490eeff76e66bac058d052be1b005ef35afce5f
-
Filesize
217B
MD56f8783205bbcf7d12cb14f16ef9e496b
SHA177c91a7b454883eab64d194e41f9bd79da6bf4e3
SHA2560643c99c936fbf9a3720e2067cf284c58d02ef47ce3156833975ffbcbb1b3a59
SHA512cc2e7dc08e380c3caf5aa72f56813d07144364e79f5af0b56b28d1b70ba467b35a5410094fe27f12b281b0fc5d669b712807f47966e7050e4a7a876cb1c80b84
-
Filesize
217B
MD5a6f688ea7bd3d8dc056a8d8a16af10bf
SHA14280a502e9f088215f1f27ca6722d12968527a01
SHA256533137cb449e12170e68ffd4b2c8e14941571b82d9903f043dc843e049cc2a06
SHA512fe6f8b2b57e33ad45bc160602f2576a8e24c130c804e558cb1450fc93c8160a600c87c9a62089b8b7f1ff98f2a6a53d482e06ad41f97427bb588bd047435351d
-
Filesize
217B
MD5f75eb1ab21210dcd8bab26cc871b6248
SHA147f307d88942b991574556b35065650b912d006e
SHA2564010ae0940a3398eecb8d95644934c4cf1e895ca3402d048b65aa38e1e77b881
SHA5127e61fe1814bd9b1c8dad0eb30b92d0442c2ed798acb72ac2c1d811b98c431c70ef436ea867dc483587acbd4e9ba3ed343d862209165c08f37ef4176cb9fa49f8
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478