Analysis
-
max time kernel
51s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/12/2022, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe
Resource
win10v2004-20221111-en
General
-
Target
HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe
-
Size
1.6MB
-
MD5
c2941309c33f19d5c2acc448e838b281
-
SHA1
e929e9425de8df49806780664eec76df479f95b9
-
SHA256
b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6
-
SHA512
3ae53ac29729d7da962de103826b105fa785ab3b306c323abb9001e2ef107c320f37d1b807af608f174bb4786a42b050bd440ecd66b60614df3ae230263882e8
-
SSDEEP
24576:oXGq9fNAehxNnn+MsgnUQ0+vgd9Ulk5R/+VKkccpScpuw72sEeh8Sx8y:FqVNxhxFVKQKHgk5RmVKG7dr
Malware Config
Signatures
-
DcRat 14 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1164 schtasks.exe 1916 schtasks.exe File created C:\Windows\System32\lltdsvc\886983d96e3d3e HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1496 schtasks.exe 1976 schtasks.exe 1624 schtasks.exe 268 schtasks.exe 1488 schtasks.exe 1592 schtasks.exe 1048 schtasks.exe 1960 schtasks.exe File created C:\Windows\System32\lltdsvc\csrss.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 392 schtasks.exe 1076 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\", \"C:\\ProgramData\\Documents\\dwm.exe\", \"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\", \"C:\\Documents and Settings\\WmiPrvSE.exe\", \"C:\\Windows\\es-ES\\WMIADAP.exe\", \"C:\\ProgramData\\Templates\\services.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\spoolsv.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\", \"C:\\ProgramData\\Documents\\dwm.exe\", \"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\", \"C:\\ProgramData\\Documents\\dwm.exe\", \"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\", \"C:\\Documents and Settings\\WmiPrvSE.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\", \"C:\\ProgramData\\Documents\\dwm.exe\", \"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\", \"C:\\Documents and Settings\\WmiPrvSE.exe\", \"C:\\Windows\\es-ES\\WMIADAP.exe\", \"C:\\ProgramData\\Templates\\services.exe\", \"C:\\ProgramData\\Adobe\\Updater6\\spoolsv.exe\", \"C:\\Windows\\WindowsUpdate\\explorer.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\", \"C:\\ProgramData\\Documents\\dwm.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\", \"C:\\ProgramData\\Documents\\dwm.exe\", \"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\", \"C:\\Documents and Settings\\WmiPrvSE.exe\", \"C:\\Windows\\es-ES\\WMIADAP.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\System32\\lltdsvc\\csrss.exe\", \"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\", \"C:\\ProgramData\\Application Data\\lsass.exe\", \"C:\\Windows\\System32\\slui\\dwm.exe\", \"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\", \"C:\\ProgramData\\Documents\\dwm.exe\", \"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\", \"C:\\Documents and Settings\\WmiPrvSE.exe\", \"C:\\Windows\\es-ES\\WMIADAP.exe\", \"C:\\ProgramData\\Templates\\services.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe -
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1048 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 268 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 896 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 896 schtasks.exe 28 -
Executes dropped EXE 2 IoCs
pid Process 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1700 dwm.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\ProgramData\\Templates\\services.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\System32\\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\\wininit.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\ProgramData\\Application Data\\lsass.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\ProgramData\\Documents\\dwm.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Windows\\es-ES\\WMIADAP.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\WindowsUpdate\\explorer.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\lltdsvc\\csrss.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Windows\\es-ES\\WMIADAP.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\ProgramData\\Adobe\\Updater6\\spoolsv.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\ProgramData\\Application Data\\lsass.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\slui\\dwm.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\WindowsUpdate\\explorer.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Documents and Settings\\WmiPrvSE.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Documents and Settings\\WmiPrvSE.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\ProgramData\\Templates\\services.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\lltdsvc\\csrss.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\slui\\dwm.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Recovery\\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\\explorer.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\ProgramData\\Documents\\dwm.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\SysWOW64\\oobe\\es-ES\\taskhost.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\ProgramData\\Adobe\\Updater6\\spoolsv.exe\"" HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\oobe\es-ES\b75386f1303e64 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\lltdsvc\csrss.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\System32\lltdsvc\886983d96e3d3e HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\System32\slui\dwm.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\lltdsvc\RCX1671.tmp HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\RCX1D75.tmp HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\SysWOW64\oobe\es-ES\taskhost.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\System32\lltdsvc\csrss.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\slui\RCX3379.tmp HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\wininit.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\lltdsvc\RCX13C2.tmp HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\wininit.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\56085415360792 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\System32\slui\6cb0b6c459d5d3 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\RCX2024.tmp HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\slui\RCX30BA.tmp HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\System32\slui\dwm.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\SysWOW64\oobe\es-ES\taskhost.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\WindowsUpdate\explorer.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\WindowsUpdate\7a0fd90576e088 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\es-ES\WMIADAP.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File opened for modification C:\Windows\WindowsUpdate\explorer.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\es-ES\WMIADAP.exe HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe File created C:\Windows\es-ES\75a57c1bdf437c HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1488 schtasks.exe 1496 schtasks.exe 1960 schtasks.exe 1624 schtasks.exe 392 schtasks.exe 1048 schtasks.exe 1976 schtasks.exe 1592 schtasks.exe 268 schtasks.exe 1164 schtasks.exe 1916 schtasks.exe 1076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 324 powershell.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1152 powershell.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe Token: SeDebugPrivilege 1152 powershell.exe Token: SeDebugPrivilege 1700 dwm.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1308 wrote to memory of 324 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 33 PID 1308 wrote to memory of 324 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 33 PID 1308 wrote to memory of 324 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 33 PID 1308 wrote to memory of 1652 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 35 PID 1308 wrote to memory of 1652 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 35 PID 1308 wrote to memory of 1652 1308 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 35 PID 1652 wrote to memory of 2004 1652 cmd.exe 37 PID 1652 wrote to memory of 2004 1652 cmd.exe 37 PID 1652 wrote to memory of 2004 1652 cmd.exe 37 PID 1652 wrote to memory of 1732 1652 cmd.exe 38 PID 1652 wrote to memory of 1732 1652 cmd.exe 38 PID 1652 wrote to memory of 1732 1652 cmd.exe 38 PID 1732 wrote to memory of 1152 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 47 PID 1732 wrote to memory of 1152 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 47 PID 1732 wrote to memory of 1152 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 47 PID 1732 wrote to memory of 1700 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 49 PID 1732 wrote to memory of 1700 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 49 PID 1732 wrote to memory of 1700 1732 HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xqixiZ9QWd.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\ProgramData\Documents\dwm.exe"C:\ProgramData\Documents\dwm.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\lltdsvc\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\ProgramData\Application Data\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\slui\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\ad6fdfc2-6219-11ed-a572-5e34c4ab0fa3\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\ProgramData\Documents\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\SysWOW64\oobe\es-ES\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Documents and Settings\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Windows\es-ES\WMIADAP.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\ProgramData\Templates\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\ProgramData\Adobe\Updater6\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\WindowsUpdate\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5c2941309c33f19d5c2acc448e838b281
SHA1e929e9425de8df49806780664eec76df479f95b9
SHA256b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6
SHA5123ae53ac29729d7da962de103826b105fa785ab3b306c323abb9001e2ef107c320f37d1b807af608f174bb4786a42b050bd440ecd66b60614df3ae230263882e8
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Stealer.gen-b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6.exe
Filesize1.6MB
MD5c2941309c33f19d5c2acc448e838b281
SHA1e929e9425de8df49806780664eec76df479f95b9
SHA256b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6
SHA5123ae53ac29729d7da962de103826b105fa785ab3b306c323abb9001e2ef107c320f37d1b807af608f174bb4786a42b050bd440ecd66b60614df3ae230263882e8
-
Filesize
299B
MD543770e679053bb113c04eba05c62ef94
SHA155265123bc38a0fda6738e532e3734e2ece9f930
SHA256acfb461915c0aea59d196163ce9b7d691f80170fc90446c0ad51fac225b3a469
SHA51241167e49fec735c3a15de56e1bc21c15291a5e28c27b67b2340412272170e06858ff7b6d4dbebfc5633c6d07237cd16bf1afd5e417b2172435707ec0b8b3b520
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57b77fa66f4496fed643ce945ae46b8f8
SHA1cb0ed6fddc801f67205ddf2d5e19580287c5f921
SHA25635504f03a01ec55e3d9411525d7a1e8db43cd9e1db152a808b058bea955dd95b
SHA512d55e889b85840c6f76f5415f799d9e3cc99732f3495a88e5c8c58b0e84eea95cc57852c9c881c4e705d52bce63846fd12424be01e19ba55d39aa262526be0e83
-
Filesize
1.6MB
MD5c2941309c33f19d5c2acc448e838b281
SHA1e929e9425de8df49806780664eec76df479f95b9
SHA256b0a22bc0c510257a80017253fda2699c005a4089e37974ee52f2cf1aaf5103b6
SHA5123ae53ac29729d7da962de103826b105fa785ab3b306c323abb9001e2ef107c320f37d1b807af608f174bb4786a42b050bd440ecd66b60614df3ae230263882e8