Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 03:09
Static task
static1
Behavioral task
behavioral1
Sample
PZCheat.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PZCheat.exe
Resource
win10v2004-20220812-en
General
-
Target
PZCheat.exe
-
Size
1.5MB
-
MD5
164ba5ee6f6b30539e874248ccfa4c05
-
SHA1
6b14ed8dab712359453779f2896e1cbad78871d7
-
SHA256
fc7ca5dbd9e3d228416ea9725c7283d105d75533f7a4e069d89f2632840e1a5d
-
SHA512
c9b2eef0e4499832f9c4eca8b503f17f4cc7589d0d2b12fe82572ad5df23e85cef9267bdc24928b7ac6df0fff70fe49d2422d6e9a549f07a74c8f9bd47892cfc
-
SSDEEP
24576:B2G/nvxW3WLRnhzLfSRyBWkNUk9tJIzxIq2+kt3S5wFAiQuwV4ilByjNTVu1:BbA3+p9SRyBW0Tty2E5wFzQuo4iupRu1
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4480 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4636 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4064 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3100 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5048 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1412 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4664 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1016 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4404 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 208 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3768 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3760 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3828 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4408 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3624 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4932 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3468 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4612 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5104 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3916 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4852 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 800 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3424 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2412 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3784 3932 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 3932 schtasks.exe -
Processes:
resource yara_rule behavioral2/memory/5004-139-0x0000000000930000-0x0000000000CEC000-memory.dmp dcrat behavioral2/memory/5004-140-0x0000000000930000-0x0000000000CEC000-memory.dmp dcrat behavioral2/memory/5004-145-0x0000000000930000-0x0000000000CEC000-memory.dmp dcrat behavioral2/memory/4644-148-0x0000000000930000-0x0000000000CEC000-memory.dmp dcrat behavioral2/memory/4644-149-0x0000000000930000-0x0000000000CEC000-memory.dmp dcrat behavioral2/memory/4644-151-0x0000000000930000-0x0000000000CEC000-memory.dmp dcrat behavioral2/memory/4484-158-0x0000000000E60000-0x000000000121C000-memory.dmp dcrat -
Executes dropped EXE 3 IoCs
Processes:
containersavesCrt.execontainersavesCrt.exeupfc.exepid process 5004 containersavesCrt.exe 4644 containersavesCrt.exe 4484 upfc.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
containersavesCrt.exePZCheat.exeWScript.execontainersavesCrt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation containersavesCrt.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation PZCheat.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation containersavesCrt.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
Processes:
containersavesCrt.execontainersavesCrt.exeupfc.exepid process 5004 containersavesCrt.exe 5004 containersavesCrt.exe 4644 containersavesCrt.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe -
Drops file in Program Files directory 8 IoCs
Processes:
containersavesCrt.execontainersavesCrt.exedescription ioc process File created C:\Program Files\Windows Defender\it-IT\explorer.exe containersavesCrt.exe File created C:\Program Files\Windows Defender\it-IT\7a0fd90576e088 containersavesCrt.exe File created C:\Program Files\Windows Portable Devices\smss.exe containersavesCrt.exe File created C:\Program Files\Windows Portable Devices\69ddcba757bf72 containersavesCrt.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe containersavesCrt.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\9e8d7a4ca61bd9 containersavesCrt.exe File created C:\Program Files\Microsoft Office 15\ClientX64\containersavesCrt.exe containersavesCrt.exe File created C:\Program Files\Microsoft Office 15\ClientX64\c0e8d1e0447bf6 containersavesCrt.exe -
Drops file in Windows directory 12 IoCs
Processes:
containersavesCrt.execontainersavesCrt.exedescription ioc process File opened for modification C:\Windows\AppReadiness\spoolsv.exe containersavesCrt.exe File created C:\Windows\AppReadiness\f3b6ecef712a24 containersavesCrt.exe File created C:\Windows\Media\Characters\containersavesCrt.exe containersavesCrt.exe File created C:\Windows\Media\Characters\c0e8d1e0447bf6 containersavesCrt.exe File created C:\Windows\servicing\Packages\RuntimeBroker.exe containersavesCrt.exe File created C:\Windows\Provisioning\Autopilot\5940a34987c991 containersavesCrt.exe File created C:\Windows\AppReadiness\spoolsv.exe containersavesCrt.exe File created C:\Windows\TAPI\c5b4cb5e9653cc containersavesCrt.exe File opened for modification C:\Windows\Media\Characters\containersavesCrt.exe containersavesCrt.exe File created C:\Windows\LanguageOverlayCache\spoolsv.exe containersavesCrt.exe File created C:\Windows\Provisioning\Autopilot\dllhost.exe containersavesCrt.exe File created C:\Windows\TAPI\services.exe containersavesCrt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4404 schtasks.exe 208 schtasks.exe 2168 schtasks.exe 4408 schtasks.exe 4128 schtasks.exe 4480 schtasks.exe 4548 schtasks.exe 5048 schtasks.exe 3424 schtasks.exe 5092 schtasks.exe 3100 schtasks.exe 1144 schtasks.exe 1084 schtasks.exe 2420 schtasks.exe 3768 schtasks.exe 4728 schtasks.exe 4636 schtasks.exe 4092 schtasks.exe 1164 schtasks.exe 3784 schtasks.exe 2424 schtasks.exe 3828 schtasks.exe 4964 schtasks.exe 2728 schtasks.exe 1016 schtasks.exe 4852 schtasks.exe 800 schtasks.exe 4064 schtasks.exe 5104 schtasks.exe 3916 schtasks.exe 2396 schtasks.exe 3468 schtasks.exe 4612 schtasks.exe 2412 schtasks.exe 4752 schtasks.exe 4664 schtasks.exe 2448 schtasks.exe 4912 schtasks.exe 3760 schtasks.exe 4464 schtasks.exe 4932 schtasks.exe 5084 schtasks.exe 4924 schtasks.exe 1412 schtasks.exe 3624 schtasks.exe -
Modifies registry class 2 IoCs
Processes:
PZCheat.execontainersavesCrt.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings PZCheat.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings containersavesCrt.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
containersavesCrt.execontainersavesCrt.exeupfc.exepid process 5004 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4644 containersavesCrt.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe 4484 upfc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
upfc.exepid process 4484 upfc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
containersavesCrt.execontainersavesCrt.exeupfc.exedescription pid process Token: SeDebugPrivilege 5004 containersavesCrt.exe Token: SeDebugPrivilege 4644 containersavesCrt.exe Token: SeDebugPrivilege 4484 upfc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
containersavesCrt.execontainersavesCrt.exeupfc.exepid process 5004 containersavesCrt.exe 4644 containersavesCrt.exe 4484 upfc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
PZCheat.exeWScript.execmd.execontainersavesCrt.execontainersavesCrt.execmd.exew32tm.exedescription pid process target process PID 4988 wrote to memory of 1896 4988 PZCheat.exe WScript.exe PID 4988 wrote to memory of 1896 4988 PZCheat.exe WScript.exe PID 4988 wrote to memory of 1896 4988 PZCheat.exe WScript.exe PID 1896 wrote to memory of 3312 1896 WScript.exe cmd.exe PID 1896 wrote to memory of 3312 1896 WScript.exe cmd.exe PID 1896 wrote to memory of 3312 1896 WScript.exe cmd.exe PID 3312 wrote to memory of 5004 3312 cmd.exe containersavesCrt.exe PID 3312 wrote to memory of 5004 3312 cmd.exe containersavesCrt.exe PID 3312 wrote to memory of 5004 3312 cmd.exe containersavesCrt.exe PID 5004 wrote to memory of 4644 5004 containersavesCrt.exe containersavesCrt.exe PID 5004 wrote to memory of 4644 5004 containersavesCrt.exe containersavesCrt.exe PID 5004 wrote to memory of 4644 5004 containersavesCrt.exe containersavesCrt.exe PID 4644 wrote to memory of 4456 4644 containersavesCrt.exe cmd.exe PID 4644 wrote to memory of 4456 4644 containersavesCrt.exe cmd.exe PID 4644 wrote to memory of 4456 4644 containersavesCrt.exe cmd.exe PID 4456 wrote to memory of 4968 4456 cmd.exe w32tm.exe PID 4456 wrote to memory of 4968 4456 cmd.exe w32tm.exe PID 4456 wrote to memory of 4968 4456 cmd.exe w32tm.exe PID 4968 wrote to memory of 4524 4968 w32tm.exe w32tm.exe PID 4968 wrote to memory of 4524 4968 w32tm.exe w32tm.exe PID 4456 wrote to memory of 4484 4456 cmd.exe upfc.exe PID 4456 wrote to memory of 4484 4456 cmd.exe upfc.exe PID 4456 wrote to memory of 4484 4456 cmd.exe upfc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PZCheat.exe"C:\Users\Admin\AppData\Local\Temp\PZCheat.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\surrogateContainerhostcrtDll\qAjDBhKogos2S0J68ty6.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\surrogateContainerhostcrtDll\fba6WO2dA9UqWb6NlbxSa.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\surrogateContainerhostcrtDll\containersavesCrt.exe"C:\surrogateContainerhostcrtDll\containersavesCrt.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\surrogateContainerhostcrtDll\containersavesCrt.exe"C:\surrogateContainerhostcrtDll\containersavesCrt.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Qt9IGSx6FQ.bat"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵
-
C:\surrogateContainerhostcrtDll\upfc.exe"C:\surrogateContainerhostcrtDll\upfc.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Windows\AppReadiness\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\AppReadiness\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Windows\AppReadiness\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "containersavesCrtc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\containersavesCrt.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "containersavesCrt" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\containersavesCrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "containersavesCrtc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\containersavesCrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Windows\TAPI\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\TAPI\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Windows\TAPI\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Defender\it-IT\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\it-IT\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\it-IT\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "containersavesCrtc" /sc MINUTE /mo 14 /tr "'C:\Windows\Media\Characters\containersavesCrt.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "containersavesCrt" /sc ONLOGON /tr "'C:\Windows\Media\Characters\containersavesCrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "containersavesCrtc" /sc MINUTE /mo 7 /tr "'C:\Windows\Media\Characters\containersavesCrt.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\surrogateContainerhostcrtDll\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\surrogateContainerhostcrtDll\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\surrogateContainerhostcrtDll\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\odt\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\odt\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\odt\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\surrogateContainerhostcrtDll\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\surrogateContainerhostcrtDll\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\surrogateContainerhostcrtDll\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\surrogateContainerhostcrtDll\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\surrogateContainerhostcrtDll\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\surrogateContainerhostcrtDll\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Windows\Provisioning\Autopilot\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Provisioning\Autopilot\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\Provisioning\Autopilot\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\containersavesCrt.exe.logFilesize
1KB
MD5d56746574a07d336d54eecc2a75626b7
SHA169f9eb5d18fec3bdff15fe2230783e405efffafb
SHA25690ae7d9d7baf1855a980d2ce2ec58754c1664d9626cfa76ecc8eb0701d737e81
SHA512001086afbe6aebb17cfd272a7fe6e3c737eb2946f385f14046d1a6f2a01dce3365de30072ba6b5029ec47a4bc850d42df293efb41c4a513e861253a4d863f12e
-
C:\Users\Admin\AppData\Local\Temp\Qt9IGSx6FQ.batFilesize
205B
MD5c218e1a9afc104e2a4548f4a886777bb
SHA1de505f3154d091c477705e3db73bbe81939e2649
SHA2565280b43f085d5190b84382104ad1096812ef9fdbf94a92d5cf9ec9f84fbfb763
SHA512871f744f1a38ac8898047dd821ac05df697a280919a80aa9af55a629c402899e001d7eab2ddd5369da5e2a076141dc30368b029cb1553fe635f627d26ef6eb3b
-
C:\surrogateContainerhostcrtDll\containersavesCrt.exeFilesize
1.2MB
MD5963f8f811b559d489ac8f0f5128acb7a
SHA191b273936ab1e1f562d29893f18bfe13a8be6448
SHA256a3add9edc4b19b2b4e1061b0f1e685c2738bed0be41a5b6bfb6f85b66f21d923
SHA5126c969271651bb4480d66c17665155e3a9590f41cc59091f2219b9f54bd86eabd6dee0deb758a12980b98740aa3859e670bf0cffa889702b3e038b1f9131a94c7
-
C:\surrogateContainerhostcrtDll\containersavesCrt.exeFilesize
1.2MB
MD5963f8f811b559d489ac8f0f5128acb7a
SHA191b273936ab1e1f562d29893f18bfe13a8be6448
SHA256a3add9edc4b19b2b4e1061b0f1e685c2738bed0be41a5b6bfb6f85b66f21d923
SHA5126c969271651bb4480d66c17665155e3a9590f41cc59091f2219b9f54bd86eabd6dee0deb758a12980b98740aa3859e670bf0cffa889702b3e038b1f9131a94c7
-
C:\surrogateContainerhostcrtDll\containersavesCrt.exeFilesize
1.2MB
MD5963f8f811b559d489ac8f0f5128acb7a
SHA191b273936ab1e1f562d29893f18bfe13a8be6448
SHA256a3add9edc4b19b2b4e1061b0f1e685c2738bed0be41a5b6bfb6f85b66f21d923
SHA5126c969271651bb4480d66c17665155e3a9590f41cc59091f2219b9f54bd86eabd6dee0deb758a12980b98740aa3859e670bf0cffa889702b3e038b1f9131a94c7
-
C:\surrogateContainerhostcrtDll\fba6WO2dA9UqWb6NlbxSa.batFilesize
55B
MD5f1a7c3c3ddb14918973adcec0ca793e5
SHA1cd8dc923af6be2083d0a41f69fb32c9a08b2ea7a
SHA256ed360b14dbbe3a7a03e882f0bd9b892af8357642fcbb296e62bac96112d4a526
SHA512472f2d9d775d7b3a9a17fc8327040438e591ffbaaf87be8353a4e02446bd5ee805ce39fa2c57f1b32ca6f971210fba6532d3b993b7f861a6dd49edb0986dbccf
-
C:\surrogateContainerhostcrtDll\qAjDBhKogos2S0J68ty6.vbeFilesize
226B
MD56a5882c4cb8293cb361d7f95c51de59e
SHA148662867659024019cfc01e2e4731f9efaa83c67
SHA2561ce3ab815dfa8ab817dab9bb42c012e940041735fa4f2064f780cd44b7a5c0a2
SHA512e5c5940e4f1358688df06cb84ab1b9ea3a26a336ccbef7b02b0c40cb6477894855c8513f037ec602b4fce7a72f4a54b4f4ccf314437b595521aa4b3d4f21fe9f
-
C:\surrogateContainerhostcrtDll\upfc.exeFilesize
1.2MB
MD5963f8f811b559d489ac8f0f5128acb7a
SHA191b273936ab1e1f562d29893f18bfe13a8be6448
SHA256a3add9edc4b19b2b4e1061b0f1e685c2738bed0be41a5b6bfb6f85b66f21d923
SHA5126c969271651bb4480d66c17665155e3a9590f41cc59091f2219b9f54bd86eabd6dee0deb758a12980b98740aa3859e670bf0cffa889702b3e038b1f9131a94c7
-
C:\surrogateContainerhostcrtDll\upfc.exeFilesize
1.2MB
MD5963f8f811b559d489ac8f0f5128acb7a
SHA191b273936ab1e1f562d29893f18bfe13a8be6448
SHA256a3add9edc4b19b2b4e1061b0f1e685c2738bed0be41a5b6bfb6f85b66f21d923
SHA5126c969271651bb4480d66c17665155e3a9590f41cc59091f2219b9f54bd86eabd6dee0deb758a12980b98740aa3859e670bf0cffa889702b3e038b1f9131a94c7
-
memory/1896-132-0x0000000000000000-mapping.dmp
-
memory/3312-135-0x0000000000000000-mapping.dmp
-
memory/4456-150-0x0000000000000000-mapping.dmp
-
memory/4484-155-0x0000000000000000-mapping.dmp
-
memory/4484-158-0x0000000000E60000-0x000000000121C000-memory.dmpFilesize
3.7MB
-
memory/4484-159-0x0000000000E60000-0x000000000121C000-memory.dmpFilesize
3.7MB
-
memory/4484-160-0x0000000006F90000-0x0000000007022000-memory.dmpFilesize
584KB
-
memory/4484-161-0x0000000000E60000-0x000000000121C000-memory.dmpFilesize
3.7MB
-
memory/4524-154-0x0000000000000000-mapping.dmp
-
memory/4644-143-0x0000000000000000-mapping.dmp
-
memory/4644-146-0x0000000000930000-0x0000000000CEC000-memory.dmpFilesize
3.7MB
-
memory/4644-148-0x0000000000930000-0x0000000000CEC000-memory.dmpFilesize
3.7MB
-
memory/4644-149-0x0000000000930000-0x0000000000CEC000-memory.dmpFilesize
3.7MB
-
memory/4644-151-0x0000000000930000-0x0000000000CEC000-memory.dmpFilesize
3.7MB
-
memory/4968-153-0x0000000000000000-mapping.dmp
-
memory/5004-145-0x0000000000930000-0x0000000000CEC000-memory.dmpFilesize
3.7MB
-
memory/5004-142-0x0000000006490000-0x00000000064F6000-memory.dmpFilesize
408KB
-
memory/5004-141-0x0000000006890000-0x0000000006E34000-memory.dmpFilesize
5.6MB
-
memory/5004-140-0x0000000000930000-0x0000000000CEC000-memory.dmpFilesize
3.7MB
-
memory/5004-139-0x0000000000930000-0x0000000000CEC000-memory.dmpFilesize
3.7MB
-
memory/5004-136-0x0000000000000000-mapping.dmp