Resubmissions
12-01-2023 20:01
230112-yrh6hsae52 1007-01-2023 04:41
230107-fa3jqagb8t 1007-01-2023 04:21
230107-eynj2acf87 10Analysis
-
max time kernel
61s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-01-2023 04:21
Behavioral task
behavioral1
Sample
0a0a64f3c4fa7d960be983aa0a7d0ce8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0a0a64f3c4fa7d960be983aa0a7d0ce8.exe
Resource
win10v2004-20220812-en
General
-
Target
0a0a64f3c4fa7d960be983aa0a7d0ce8.exe
-
Size
3.8MB
-
MD5
0a0a64f3c4fa7d960be983aa0a7d0ce8
-
SHA1
b597c7397ecaff7c5c1aa27f5124fc7b8a94e643
-
SHA256
6d95012691b58c36574d4b1061b07e0a8340909664908e991fad91028777fdd1
-
SHA512
ef04e3eb8f2b10dae6845b97fa66086c3d02c5508adcd1923a93975c88f1ad0f80f984b563c36c4868276670b1dee9e11ae3c57faf7b0509118d121d920df7d4
-
SSDEEP
98304:F7b3a0t2TiPhx6Sp+ybfnDA4qo34n1oO:FH3Z8cp+gDZ4n1
Malware Config
Signatures
-
DcRat 55 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exe0a0a64f3c4fa7d960be983aa0a7d0ce8.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1312 schtasks.exe 964 schtasks.exe 604 schtasks.exe 1652 schtasks.exe 1708 schtasks.exe 1156 schtasks.exe 1860 schtasks.exe 1092 schtasks.exe 2256 schtasks.exe 2284 schtasks.exe 976 schtasks.exe 684 schtasks.exe 1496 schtasks.exe 1508 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe 1364 schtasks.exe 1096 schtasks.exe 2064 schtasks.exe 2164 schtasks.exe 2400 schtasks.exe 1380 schtasks.exe 2000 schtasks.exe 2468 schtasks.exe 580 schtasks.exe 1276 schtasks.exe 1768 schtasks.exe 1988 schtasks.exe 2032 schtasks.exe 1976 schtasks.exe 1068 schtasks.exe 952 schtasks.exe 2424 schtasks.exe 1944 schtasks.exe 2180 schtasks.exe 2372 schtasks.exe 832 schtasks.exe 1512 schtasks.exe 2228 schtasks.exe 2084 schtasks.exe 1792 schtasks.exe 1764 schtasks.exe 1624 schtasks.exe 2332 schtasks.exe 2352 schtasks.exe 1628 schtasks.exe 556 schtasks.exe 2208 schtasks.exe 2300 schtasks.exe 2440 schtasks.exe 276 schtasks.exe 2112 schtasks.exe 2136 schtasks.exe 1328 schtasks.exe 884 schtasks.exe 1808 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 18 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\", \"C:\\MSOCache\\All Users\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\", \"C:\\MSOCache\\All Users\\csrss.exe\", \"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\csrss.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\dwm.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\", \"C:\\MSOCache\\All Users\\csrss.exe\", \"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\csrss.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\dwm.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files\\Uninstall Information\\System.exe\", \"C:\\Windows\\Microsoft.NET\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\", \"C:\\MSOCache\\All Users\\csrss.exe\", \"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\", \"C:\\MSOCache\\All Users\\csrss.exe\", \"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\", \"C:\\MSOCache\\All Users\\csrss.exe\", \"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\csrss.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\dwm.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Users\\All Users\\wininit.exe\", \"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\", \"C:\\MSOCache\\All Users\\csrss.exe\", \"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\", \"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\csrss.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\dwm.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\", \"C:\\Program Files\\Uninstall Information\\System.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1156 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 884 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2032 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1764 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 604 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1096 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 276 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2256 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 328 schtasks.exe -
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Processes:
resource yara_rule behavioral1/memory/2040-54-0x0000000000F50000-0x000000000131A000-memory.dmp dcrat -
Adds Run key to start application 2 TTPs 36 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0a0a64f3c4fa7d960be983aa0a7d0ce8 = "\"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Uninstall Information\\System.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Users\\All Users\\wininit.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Microsoft Office\\MEDIA\\CAGCAT10\\1033\\dwm.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\0a0a64f3c4fa7d960be983aa0a7d0ce8 = "\"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\v1.0\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\Microsoft.NET\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\MSOCache\\All Users\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\dwm.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0a0a64f3c4fa7d960be983aa0a7d0ce8 = "\"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files\\Windows Journal\\Templates\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\MSOCache\\All Users\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Uninstall Information\\System.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Users\\All Users\\wininit.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Windows Defender\\fr-FR\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Program Files\\Windows NT\\TableTextService\\de-DE\\WMIADAP.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\0a0a64f3c4fa7d960be983aa0a7d0ce8 = "\"C:\\Recovery\\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\Program Files (x86)\\Common Files\\WMIADAP.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\explorer.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Windows NT\\TableTextService\\it-IT\\smss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\wininit.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\dwm.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\Microsoft.NET\\csrss.exe\"" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Drops file in Program Files directory 45 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\RCXD744.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\RCX8BC4.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\6cb0b6c459d5d3 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\RCXBCAD.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\dwm.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\7a0fd90576e088 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\explorer.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\RCX9C89.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\RCX9F67.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Common Files\WMIADAP.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Windows NT\TableTextService\it-IT\smss.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Common Files\75a57c1bdf437c 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files\Windows Journal\Templates\smss.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\explorer.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Windows Journal\Templates\RCXEAC8.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Uninstall Information\RCX148F.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Common Files\WMIADAP.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\6cb0b6c459d5d3 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files\Uninstall Information\System.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\RCXB9EE.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\WMIADAP.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Windows Journal\Templates\RCXED87.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Windows Journal\Templates\smss.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RCX10B.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files\Windows NT\TableTextService\de-DE\WMIADAP.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dwm.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\c040f93204fd2c 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\RCXC67F.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RCXFE4C.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCX80E.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Uninstall Information\RCX11D0.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\dwm.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files\Windows NT\TableTextService\de-DE\75a57c1bdf437c 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dwm.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\RCX8905.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\smss.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\RCXACD.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files (x86)\Windows NT\TableTextService\it-IT\69ddcba757bf72 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files\Uninstall Information\27d1bcfc3c54e0 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\RCXC3B0.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files (x86)\Common Files\RCXDA03.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Program Files\Uninstall Information\System.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Program Files\Windows Journal\Templates\69ddcba757bf72 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Drops file in Windows directory 7 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription ioc process File created C:\Windows\Microsoft.NET\886983d96e3d3e 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Windows\Microsoft.NET\RCX1B92.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Windows\Microsoft.NET\RCX1E51.tmp 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File opened for modification C:\Windows\Microsoft.NET\csrss.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Windows\rescache\rc0000\services.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Windows\Speech\Common\fr-FR\taskhost.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe File created C:\Windows\Microsoft.NET\csrss.exe 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Creates scheduled task(s) 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1328 schtasks.exe 1808 schtasks.exe 1512 schtasks.exe 1652 schtasks.exe 2180 schtasks.exe 2208 schtasks.exe 2440 schtasks.exe 1624 schtasks.exe 2256 schtasks.exe 2424 schtasks.exe 2468 schtasks.exe 1628 schtasks.exe 2084 schtasks.exe 556 schtasks.exe 2064 schtasks.exe 2164 schtasks.exe 1364 schtasks.exe 1312 schtasks.exe 1944 schtasks.exe 604 schtasks.exe 1092 schtasks.exe 2300 schtasks.exe 1276 schtasks.exe 1988 schtasks.exe 1496 schtasks.exe 1976 schtasks.exe 1860 schtasks.exe 2400 schtasks.exe 832 schtasks.exe 1768 schtasks.exe 1156 schtasks.exe 1764 schtasks.exe 684 schtasks.exe 952 schtasks.exe 2284 schtasks.exe 1708 schtasks.exe 964 schtasks.exe 1508 schtasks.exe 276 schtasks.exe 2332 schtasks.exe 2372 schtasks.exe 580 schtasks.exe 2112 schtasks.exe 1792 schtasks.exe 976 schtasks.exe 884 schtasks.exe 1380 schtasks.exe 1096 schtasks.exe 2352 schtasks.exe 2000 schtasks.exe 1068 schtasks.exe 2136 schtasks.exe 2032 schtasks.exe 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exepid process 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription pid process Token: SeDebugPrivilege 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription pid process target process PID 2040 wrote to memory of 2508 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2508 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2508 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2520 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2520 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2520 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2540 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2540 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2540 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2576 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2576 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2576 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2592 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2592 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2592 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2604 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2604 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2604 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2636 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2636 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2636 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2652 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2652 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe PID 2040 wrote to memory of 2652 2040 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe powershell.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
0a0a64f3c4fa7d960be983aa0a7d0ce8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 0a0a64f3c4fa7d960be983aa0a7d0ce8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe"C:\Users\Admin\AppData\Local\Temp\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\wininit.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\smss.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\wininit.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\fr-FR\explorer.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\explorer.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\dwm.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\TableTextService\de-DE\WMIADAP.exe'2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'2⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\All Users\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\WMIADAP.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\WMIADAP.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\WMIADAP.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0a0a64f3c4fa7d960be983aa0a7d0ce80" /sc MINUTE /mo 9 /tr "'C:\Recovery\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0a0a64f3c4fa7d960be983aa0a7d0ce8" /sc ONLOGON /tr "'C:\Recovery\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0a0a64f3c4fa7d960be983aa0a7d0ce80" /sc MINUTE /mo 11 /tr "'C:\Recovery\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\WMIADAP.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\WMIADAP.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Common Files\WMIADAP.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Journal\Templates\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\Templates\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Journal\Templates\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\5e97ab82-6219-11ed-b9ee-5e34c4ab0fa3\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0a0a64f3c4fa7d960be983aa0a7d0ce80" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0a0a64f3c4fa7d960be983aa0a7d0ce8" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "0a0a64f3c4fa7d960be983aa0a7d0ce80" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\0a0a64f3c4fa7d960be983aa0a7d0ce8.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Uninstall Information\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Microsoft.NET\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Microsoft.NET\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD570a69ec8f2c590372f46237db0119110
SHA162a505abc656820e9ffd37fdad55913fa8888711
SHA25686bf01a3f99b00ec5488d4053c1914a913bb29e5e7ae17ff10bb29e711fe20f2
SHA5127881c4d856bc20ebde2545bc18c029cefda165e187899c5b359d860e50ab0675457e6277529731c26a8a8f79e4301933f1b8dfd2c0226622d445ec1cb87d0883
-
memory/2040-68-0x000000001ABB0000-0x000000001ABBA000-memory.dmpFilesize
40KB
-
memory/2040-73-0x000000001B020000-0x000000001B02C000-memory.dmpFilesize
48KB
-
memory/2040-64-0x0000000000D50000-0x0000000000D5C000-memory.dmpFilesize
48KB
-
memory/2040-65-0x0000000000D60000-0x0000000000D68000-memory.dmpFilesize
32KB
-
memory/2040-66-0x000000001AFB0000-0x000000001B006000-memory.dmpFilesize
344KB
-
memory/2040-67-0x000000001ABA0000-0x000000001ABA8000-memory.dmpFilesize
32KB
-
memory/2040-62-0x0000000000D10000-0x0000000000D22000-memory.dmpFilesize
72KB
-
memory/2040-69-0x000000001ABC0000-0x000000001ABCE000-memory.dmpFilesize
56KB
-
memory/2040-70-0x000000001ABD0000-0x000000001ABD8000-memory.dmpFilesize
32KB
-
memory/2040-71-0x000000001B000000-0x000000001B00E000-memory.dmpFilesize
56KB
-
memory/2040-72-0x000000001B010000-0x000000001B018000-memory.dmpFilesize
32KB
-
memory/2040-63-0x0000000000D40000-0x0000000000D48000-memory.dmpFilesize
32KB
-
memory/2040-74-0x000000001B040000-0x000000001B04A000-memory.dmpFilesize
40KB
-
memory/2040-75-0x000000001B050000-0x000000001B05C000-memory.dmpFilesize
48KB
-
memory/2040-61-0x0000000000B70000-0x0000000000B7C000-memory.dmpFilesize
48KB
-
memory/2040-60-0x0000000000500000-0x0000000000556000-memory.dmpFilesize
344KB
-
memory/2040-59-0x0000000000300000-0x000000000030A000-memory.dmpFilesize
40KB
-
memory/2040-58-0x00000000004E0000-0x00000000004F6000-memory.dmpFilesize
88KB
-
memory/2040-57-0x00000000002F0000-0x0000000000300000-memory.dmpFilesize
64KB
-
memory/2040-56-0x00000000002E0000-0x00000000002E8000-memory.dmpFilesize
32KB
-
memory/2040-55-0x00000000002C0000-0x00000000002DC000-memory.dmpFilesize
112KB
-
memory/2040-54-0x0000000000F50000-0x000000000131A000-memory.dmpFilesize
3.8MB
-
memory/2508-76-0x0000000000000000-mapping.dmp
-
memory/2520-89-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2520-82-0x000007FEFB5F1000-0x000007FEFB5F3000-memory.dmpFilesize
8KB
-
memory/2520-131-0x0000000002294000-0x0000000002297000-memory.dmpFilesize
12KB
-
memory/2520-77-0x0000000000000000-mapping.dmp
-
memory/2540-125-0x0000000002384000-0x0000000002387000-memory.dmpFilesize
12KB
-
memory/2540-107-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2540-78-0x0000000000000000-mapping.dmp
-
memory/2576-113-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2576-128-0x0000000002784000-0x0000000002787000-memory.dmpFilesize
12KB
-
memory/2576-79-0x0000000000000000-mapping.dmp
-
memory/2592-126-0x0000000002374000-0x0000000002377000-memory.dmpFilesize
12KB
-
memory/2592-80-0x0000000000000000-mapping.dmp
-
memory/2592-112-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2604-81-0x0000000000000000-mapping.dmp
-
memory/2604-111-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2604-129-0x0000000002854000-0x0000000002857000-memory.dmpFilesize
12KB
-
memory/2636-108-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2636-83-0x0000000000000000-mapping.dmp
-
memory/2636-127-0x0000000002484000-0x0000000002487000-memory.dmpFilesize
12KB
-
memory/2652-124-0x0000000002554000-0x0000000002557000-memory.dmpFilesize
12KB
-
memory/2652-84-0x0000000000000000-mapping.dmp
-
memory/2652-106-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2712-117-0x0000000001FF4000-0x0000000001FF7000-memory.dmpFilesize
12KB
-
memory/2712-87-0x0000000000000000-mapping.dmp
-
memory/2712-109-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2736-88-0x0000000000000000-mapping.dmp
-
memory/2736-110-0x000007FEEA720000-0x000007FEEB143000-memory.dmpFilesize
10.1MB
-
memory/2736-130-0x00000000025D4000-0x00000000025D7000-memory.dmpFilesize
12KB
-
memory/2788-91-0x0000000000000000-mapping.dmp