Analysis
-
max time kernel
301s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2023, 05:05
Behavioral task
behavioral1
Sample
6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe
Resource
win10-20230220-en
General
-
Target
6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe
-
Size
1.6MB
-
MD5
6d7d70595af3ae4115d69718f718b880
-
SHA1
6b6b3addca0399dd4f2d36548179d96caa25c80a
-
SHA256
6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0
-
SHA512
ae64359e108f51a91d94942d08b273b52b53351c641cb6c7023b77586b37b7efca37c1455aa500b5954d6575639354f78716bd8d8d24c437d756066dadf57add
-
SSDEEP
24576:U2G/nvxW3Ww0t/QGhgyp3PKgG0reey15j6IaXG6hCqsNbSv0P6N1B:UbA304GhrpFNIO5hCqWPP6Nn
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1412 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1244 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 308 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1176 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1392 1516 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 1516 schtasks.exe 31 -
resource yara_rule behavioral1/files/0x0008000000014120-66.dat dcrat behavioral1/files/0x0008000000014120-65.dat dcrat behavioral1/files/0x0008000000014120-64.dat dcrat behavioral1/files/0x0008000000014120-63.dat dcrat behavioral1/memory/552-67-0x0000000001380000-0x00000000014CC000-memory.dmp dcrat behavioral1/memory/552-71-0x000000001AF30000-0x000000001AFB0000-memory.dmp dcrat behavioral1/files/0x0006000000014489-77.dat dcrat behavioral1/files/0x0006000000015c2f-112.dat dcrat behavioral1/files/0x0006000000015c2f-113.dat dcrat behavioral1/memory/660-114-0x0000000000020000-0x000000000016C000-memory.dmp dcrat behavioral1/files/0x000600000001608e-142.dat dcrat behavioral1/files/0x000600000001608e-141.dat dcrat behavioral1/memory/1108-143-0x0000000000310000-0x000000000045C000-memory.dmp dcrat behavioral1/memory/1108-144-0x000000001AFB0000-0x000000001B030000-memory.dmp dcrat -
Executes dropped EXE 3 IoCs
pid Process 552 surrogatefontbroker.exe 660 conhost.exe 1108 lsm.exe -
Loads dropped DLL 2 IoCs
pid Process 1576 cmd.exe 1576 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\migration\es-ES\lsm.exe surrogatefontbroker.exe File created C:\Windows\SysWOW64\migration\es-ES\101b941d020240 surrogatefontbroker.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\smss.exe surrogatefontbroker.exe File created C:\Program Files\DVD Maker\101b941d020240 surrogatefontbroker.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\0a1fd5f707cd16 surrogatefontbroker.exe File created C:\Program Files (x86)\Adobe\lsm.exe surrogatefontbroker.exe File opened for modification C:\Program Files (x86)\Adobe\lsm.exe surrogatefontbroker.exe File created C:\Program Files (x86)\Adobe\101b941d020240 surrogatefontbroker.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\conhost.exe surrogatefontbroker.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\088424020bedd6 surrogatefontbroker.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\69ddcba757bf72 surrogatefontbroker.exe File created C:\Program Files\DVD Maker\lsm.exe surrogatefontbroker.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\sppsvc.exe surrogatefontbroker.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\ehome\lsass.exe surrogatefontbroker.exe File created C:\Windows\ehome\6203df4a6bafc7 surrogatefontbroker.exe File created C:\Windows\rescache\wip\wininit.exe surrogatefontbroker.exe File created C:\Windows\servicing\Sessions\dwm.exe surrogatefontbroker.exe File created C:\Windows\Registration\CRMLog\services.exe surrogatefontbroker.exe File created C:\Windows\Registration\CRMLog\c5b4cb5e9653cc surrogatefontbroker.exe File created C:\Windows\Boot\EFI\pl-PL\conhost.exe surrogatefontbroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1000 schtasks.exe 1636 schtasks.exe 1620 schtasks.exe 1292 schtasks.exe 1176 schtasks.exe 1952 schtasks.exe 1412 schtasks.exe 1020 schtasks.exe 1564 schtasks.exe 924 schtasks.exe 1180 schtasks.exe 1592 schtasks.exe 872 schtasks.exe 1952 schtasks.exe 956 schtasks.exe 1680 schtasks.exe 964 schtasks.exe 1796 schtasks.exe 1008 schtasks.exe 952 schtasks.exe 308 schtasks.exe 1340 schtasks.exe 1136 schtasks.exe 1940 schtasks.exe 1876 schtasks.exe 972 schtasks.exe 964 schtasks.exe 1432 schtasks.exe 1968 schtasks.exe 1760 schtasks.exe 1220 schtasks.exe 744 schtasks.exe 1888 schtasks.exe 1736 schtasks.exe 2004 schtasks.exe 1460 schtasks.exe 920 schtasks.exe 1072 schtasks.exe 1140 schtasks.exe 936 schtasks.exe 1760 schtasks.exe 1244 schtasks.exe 1680 schtasks.exe 1444 schtasks.exe 1252 schtasks.exe 936 schtasks.exe 1972 schtasks.exe 1136 schtasks.exe 1708 schtasks.exe 880 schtasks.exe 1392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 552 surrogatefontbroker.exe 552 surrogatefontbroker.exe 552 surrogatefontbroker.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe 660 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 660 conhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 552 surrogatefontbroker.exe Token: SeDebugPrivilege 660 conhost.exe Token: SeDebugPrivilege 1108 lsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1524 wrote to memory of 920 1524 6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe 27 PID 1524 wrote to memory of 920 1524 6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe 27 PID 1524 wrote to memory of 920 1524 6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe 27 PID 1524 wrote to memory of 920 1524 6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe 27 PID 920 wrote to memory of 1576 920 WScript.exe 28 PID 920 wrote to memory of 1576 920 WScript.exe 28 PID 920 wrote to memory of 1576 920 WScript.exe 28 PID 920 wrote to memory of 1576 920 WScript.exe 28 PID 1576 wrote to memory of 552 1576 cmd.exe 30 PID 1576 wrote to memory of 552 1576 cmd.exe 30 PID 1576 wrote to memory of 552 1576 cmd.exe 30 PID 1576 wrote to memory of 552 1576 cmd.exe 30 PID 552 wrote to memory of 1460 552 surrogatefontbroker.exe 83 PID 552 wrote to memory of 1460 552 surrogatefontbroker.exe 83 PID 552 wrote to memory of 1460 552 surrogatefontbroker.exe 83 PID 1460 wrote to memory of 924 1460 cmd.exe 85 PID 1460 wrote to memory of 924 1460 cmd.exe 85 PID 1460 wrote to memory of 924 1460 cmd.exe 85 PID 1460 wrote to memory of 660 1460 cmd.exe 86 PID 1460 wrote to memory of 660 1460 cmd.exe 86 PID 1460 wrote to memory of 660 1460 cmd.exe 86 PID 1996 wrote to memory of 1108 1996 taskeng.exe 88 PID 1996 wrote to memory of 1108 1996 taskeng.exe 88 PID 1996 wrote to memory of 1108 1996 taskeng.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe"C:\Users\Admin\AppData\Local\Temp\6f21b3590e366009837b47d593fe3b6078a81922799a7eb0262de47c1ebe03c0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\serverRuntimeperfNet\szYrcjGuYLGmL0L4KP7jJ67pgceF.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\serverRuntimeperfNet\qmzY6VsVMzatuzX.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\serverRuntimeperfNet\surrogatefontbroker.exe"C:\serverRuntimeperfNet\surrogatefontbroker.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NJ9yZIXzA0.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:924
-
-
C:\Program Files (x86)\Windows NT\TableTextService\en-US\conhost.exe"C:\Program Files (x86)\Windows NT\TableTextService\en-US\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Windows\ehome\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\ehome\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Windows\ehome\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\fr-FR\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\serverRuntimeperfNet\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\serverRuntimeperfNet\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\serverRuntimeperfNet\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files\DVD Maker\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files\DVD Maker\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\serverRuntimeperfNet\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\serverRuntimeperfNet\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\serverRuntimeperfNet\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 12 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Templates\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Templates\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Templates\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogatefontbrokers" /sc MINUTE /mo 14 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\surrogatefontbroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogatefontbroker" /sc ONLOGON /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\surrogatefontbroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "surrogatefontbrokers" /sc MINUTE /mo 10 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\surrogatefontbroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\Registration\CRMLog\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\Registration\CRMLog\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Windows\SysWOW64\migration\es-ES\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\SysWOW64\migration\es-ES\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Windows\SysWOW64\migration\es-ES\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 7 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:956
-
C:\Windows\system32\taskeng.exetaskeng.exe {15521384-7CAE-429E-9EF3-B7528B27C6AD} S-1-5-21-1914912747-3343861975-731272777-1000:TMRJMUQF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\migration\es-ES\lsm.exeC:\Windows\SysWOW64\migration\es-ES\lsm.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
233B
MD5817846e435d761a8b5e6dddb16e36dfd
SHA14f35fd2119f46c98b84b62666ab0589e4dc51277
SHA256dc52246965d2f07dacb2818127238a4411d56cdcd8b1e633dc28c73d072e57b4
SHA512992907e4c5d84852263ea419eb5956d029cbbe8462d11f5705d1095fd826236580723df8477769927b3ca3e2984fbb4a7ece39c215fd723155d17d4e04d7a10e
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
49B
MD58cfb56e485ff86e82d6f9e7a319617ab
SHA1d071fb71ca118caeab9bda297ddd60190460dcd2
SHA25658e393022079288275223afe82aabff34db169d74fa288ae01ecd619b166e023
SHA5125e366b4b91854a0cf59419d663bf2cc2c36306acd3a659275e43d26fbe6e0695f33b0f514020e47ef2077a13b9cdbddb1d8e157dd54bdb84a2dfa522223cdd5d
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
212B
MD5ac5d5bb02e03d9f968b07f0e3d9207fd
SHA18d0e6bf882fff66333a289aa46dd72fe1d3798f2
SHA25651dc3e697cdbf76e5a80c964ca116e80e3cd9ac9daf1ad66a2ccf780380ca0ff
SHA51249a29d78ba3ff006357a5786b4028b17ed4123d8076beaaa72ebc13cbe8b3a92e63e4f4e8e447aab11dbb5cc06c7035c52ac643c6addf21c0653f1af274825a8
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5
-
Filesize
1.3MB
MD5c809062f8c74c3555143eec236bec626
SHA1ec57ce4a59096421e9a2edad45411cea658f41ad
SHA25628c22038a27c2fef303d27617b00f70244ad1cc4b36d72875d17341e539d4ef1
SHA5124c5cb9dc7b710b34b5de2d56ed9c917c7c15ae0d960ff63a8218d3a1780ca12cf290b25ddcaa87dbb0a18aba998b9572b1a6bad244580ea0d2e2e3aa2dea0cb5