Analysis
-
max time kernel
57s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-03-2023 09:21
Behavioral task
behavioral1
Sample
54c6b64cb242fc9e210578980c59c0ee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
54c6b64cb242fc9e210578980c59c0ee.exe
Resource
win10v2004-20230220-en
General
-
Target
54c6b64cb242fc9e210578980c59c0ee.exe
-
Size
1.3MB
-
MD5
54c6b64cb242fc9e210578980c59c0ee
-
SHA1
1dc98a41b748f67c73fd7be8d702dfc60e7c8305
-
SHA256
d56bc8947bd949294eeb0b4191b94beb2553e5972c72587ddd215ebaf899354b
-
SHA512
445089b0c012451f557e9a15f2cd5cf5b62b002cdf82130e2087120b1964638bf7d98ae85026896ec343144a0c60a23de58a6bcc321fad91a2eddafe6a1f6cdb
-
SSDEEP
24576:52G/nvxW3W60GnMGAa6h5QcxfImbaPaoVRhL0b7wTy:5bA3+G7AScxfIuaiod6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 656 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1280 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1404 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 868 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 668 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 656 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 1356 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 1356 schtasks.exe -
Processes:
resource yara_rule \MsSurrogatesavesDllCommon\portcomponenthost.exe dcrat C:\MsSurrogatesavesDllCommon\portcomponenthost.exe dcrat \MsSurrogatesavesDllCommon\portcomponenthost.exe dcrat C:\MsSurrogatesavesDllCommon\portcomponenthost.exe dcrat behavioral1/memory/360-67-0x0000000000BA0000-0x0000000000C76000-memory.dmp dcrat behavioral1/memory/360-68-0x000000001AE80000-0x000000001AF00000-memory.dmp dcrat C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\dwm.exe dcrat C:\Program Files\Mozilla Firefox\fonts\Idle.exe dcrat C:\Program Files\Mozilla Firefox\fonts\Idle.exe dcrat behavioral1/memory/1480-101-0x0000000000E70000-0x0000000000F46000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
Processes:
portcomponenthost.exeIdle.exepid process 360 portcomponenthost.exe 1480 Idle.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 712 cmd.exe 712 cmd.exe -
Drops file in Program Files directory 13 IoCs
Processes:
portcomponenthost.exedescription ioc process File created C:\Program Files (x86)\Common Files\System\msadc\fr-FR\0a1fd5f707cd16 portcomponenthost.exe File created C:\Program Files (x86)\Google\Update\b75386f1303e64 portcomponenthost.exe File created C:\Program Files\Internet Explorer\en-US\lsm.exe portcomponenthost.exe File created C:\Program Files\Internet Explorer\en-US\101b941d020240 portcomponenthost.exe File created C:\Program Files\VideoLAN\VLC\lsass.exe portcomponenthost.exe File created C:\Program Files\Windows Defender\sppsvc.exe portcomponenthost.exe File created C:\Program Files\Windows Defender\0a1fd5f707cd16 portcomponenthost.exe File created C:\Program Files (x86)\Google\Update\taskhost.exe portcomponenthost.exe File created C:\Program Files\VideoLAN\VLC\6203df4a6bafc7 portcomponenthost.exe File created C:\Program Files\Mozilla Firefox\fonts\Idle.exe portcomponenthost.exe File created C:\Program Files\Mozilla Firefox\fonts\6ccacd8608530f portcomponenthost.exe File opened for modification C:\Program Files\Windows Defender\sppsvc.exe portcomponenthost.exe File created C:\Program Files (x86)\Common Files\System\msadc\fr-FR\sppsvc.exe portcomponenthost.exe -
Drops file in Windows directory 2 IoCs
Processes:
portcomponenthost.exedescription ioc process File created C:\Windows\ModemLogs\services.exe portcomponenthost.exe File created C:\Windows\ModemLogs\c5b4cb5e9653cc portcomponenthost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1932 schtasks.exe 1996 schtasks.exe 1520 schtasks.exe 1712 schtasks.exe 1600 schtasks.exe 1604 schtasks.exe 1624 schtasks.exe 1632 schtasks.exe 992 schtasks.exe 1628 schtasks.exe 656 schtasks.exe 1744 schtasks.exe 1684 schtasks.exe 1100 schtasks.exe 1180 schtasks.exe 888 schtasks.exe 1496 schtasks.exe 1280 schtasks.exe 1528 schtasks.exe 1884 schtasks.exe 1692 schtasks.exe 1920 schtasks.exe 1932 schtasks.exe 836 schtasks.exe 860 schtasks.exe 656 schtasks.exe 1904 schtasks.exe 668 schtasks.exe 1540 schtasks.exe 1144 schtasks.exe 1404 schtasks.exe 868 schtasks.exe 1060 schtasks.exe 672 schtasks.exe 1920 schtasks.exe 1524 schtasks.exe 956 schtasks.exe 544 schtasks.exe 1596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
portcomponenthost.exeIdle.exepid process 360 portcomponenthost.exe 360 portcomponenthost.exe 360 portcomponenthost.exe 360 portcomponenthost.exe 360 portcomponenthost.exe 1480 Idle.exe 1480 Idle.exe 1480 Idle.exe 1480 Idle.exe 1480 Idle.exe 1480 Idle.exe 1480 Idle.exe 1480 Idle.exe 1480 Idle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
portcomponenthost.exeIdle.exedescription pid process Token: SeDebugPrivilege 360 portcomponenthost.exe Token: SeDebugPrivilege 1480 Idle.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
54c6b64cb242fc9e210578980c59c0ee.exeWScript.execmd.exeportcomponenthost.exedescription pid process target process PID 1196 wrote to memory of 1260 1196 54c6b64cb242fc9e210578980c59c0ee.exe WScript.exe PID 1196 wrote to memory of 1260 1196 54c6b64cb242fc9e210578980c59c0ee.exe WScript.exe PID 1196 wrote to memory of 1260 1196 54c6b64cb242fc9e210578980c59c0ee.exe WScript.exe PID 1196 wrote to memory of 1260 1196 54c6b64cb242fc9e210578980c59c0ee.exe WScript.exe PID 1260 wrote to memory of 712 1260 WScript.exe cmd.exe PID 1260 wrote to memory of 712 1260 WScript.exe cmd.exe PID 1260 wrote to memory of 712 1260 WScript.exe cmd.exe PID 1260 wrote to memory of 712 1260 WScript.exe cmd.exe PID 712 wrote to memory of 360 712 cmd.exe portcomponenthost.exe PID 712 wrote to memory of 360 712 cmd.exe portcomponenthost.exe PID 712 wrote to memory of 360 712 cmd.exe portcomponenthost.exe PID 712 wrote to memory of 360 712 cmd.exe portcomponenthost.exe PID 360 wrote to memory of 1480 360 portcomponenthost.exe Idle.exe PID 360 wrote to memory of 1480 360 portcomponenthost.exe Idle.exe PID 360 wrote to memory of 1480 360 portcomponenthost.exe Idle.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c6b64cb242fc9e210578980c59c0ee.exe"C:\Users\Admin\AppData\Local\Temp\54c6b64cb242fc9e210578980c59c0ee.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsSurrogatesavesDllCommon\KNXxoYbYBPxFU.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\MsSurrogatesavesDllCommon\8EVty8tFPt0VqMZlz5bMQ6Tt5F96.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\MsSurrogatesavesDllCommon\portcomponenthost.exe"C:\MsSurrogatesavesDllCommon\portcomponenthost.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\fonts\Idle.exe"C:\Program Files\Mozilla Firefox\fonts\Idle.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Defender\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Defender\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\System\msadc\fr-FR\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System\msadc\fr-FR\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Common Files\System\msadc\fr-FR\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\Update\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\Update\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\en-US\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\en-US\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Program Files\Internet Explorer\en-US\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files\VideoLAN\VLC\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\VideoLAN\VLC\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files\Mozilla Firefox\fonts\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\fonts\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Mozilla Firefox\fonts\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\MsSurrogatesavesDllCommon\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MsSurrogatesavesDllCommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\MsSurrogatesavesDllCommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Windows\ModemLogs\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\ModemLogs\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\ModemLogs\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MsSurrogatesavesDllCommon\8EVty8tFPt0VqMZlz5bMQ6Tt5F96.batFilesize
52B
MD5ce377e811edf958e24553755294774a8
SHA10c6faccdb6381e423aaef33e7544dce5de7cae60
SHA25641c0d44b462f9731a9658a13e91ef3a02b964af9f16f3c53daf46441008eaa71
SHA512f9b716e1a6884183d209d49a15354d8325e42e90cfefb2c6fe441d044e2496f1ab66675074c205bec79da04bf2673e0b5b5a10e6607a3ea869b2fe135942a575
-
C:\MsSurrogatesavesDllCommon\KNXxoYbYBPxFU.vbeFilesize
230B
MD5d123093db1ad87dce8d25a1b15cc6f9f
SHA17c38bf3d49b5ba661b7979cbb60cd533a86a2018
SHA256acbac6ea28763d88cdaa2f1bc1738b8c6149be7e30d66db31afa3babf3937537
SHA512593397dbf44208fcefcc08de07a856b71a367a2bb77edb3ffcac4e7cf89fe2795b343a5617138ac1d79c474ae94e73cccf053306d959806634b0f88401b01de6
-
C:\MsSurrogatesavesDllCommon\portcomponenthost.exeFilesize
828KB
MD52ac0e24ee73528bf8e6205fdbf62cb48
SHA1f103fb7fd6d4552c3e278d12a4d3e4fa3970cd22
SHA2566a8b636d017e1d6daf0c78b7f46f7b0ab97805a4008301041603f79f6b3cd919
SHA512c457029a45721254de3317573f466a7587794c80cdacb046de13418909363569df8f58d77b74c138bbb61f1d57be0db8bd408c8a3c840379b0d77fab01ebf136
-
C:\MsSurrogatesavesDllCommon\portcomponenthost.exeFilesize
828KB
MD52ac0e24ee73528bf8e6205fdbf62cb48
SHA1f103fb7fd6d4552c3e278d12a4d3e4fa3970cd22
SHA2566a8b636d017e1d6daf0c78b7f46f7b0ab97805a4008301041603f79f6b3cd919
SHA512c457029a45721254de3317573f466a7587794c80cdacb046de13418909363569df8f58d77b74c138bbb61f1d57be0db8bd408c8a3c840379b0d77fab01ebf136
-
C:\Program Files\Mozilla Firefox\fonts\Idle.exeFilesize
828KB
MD52ac0e24ee73528bf8e6205fdbf62cb48
SHA1f103fb7fd6d4552c3e278d12a4d3e4fa3970cd22
SHA2566a8b636d017e1d6daf0c78b7f46f7b0ab97805a4008301041603f79f6b3cd919
SHA512c457029a45721254de3317573f466a7587794c80cdacb046de13418909363569df8f58d77b74c138bbb61f1d57be0db8bd408c8a3c840379b0d77fab01ebf136
-
C:\Program Files\Mozilla Firefox\fonts\Idle.exeFilesize
828KB
MD52ac0e24ee73528bf8e6205fdbf62cb48
SHA1f103fb7fd6d4552c3e278d12a4d3e4fa3970cd22
SHA2566a8b636d017e1d6daf0c78b7f46f7b0ab97805a4008301041603f79f6b3cd919
SHA512c457029a45721254de3317573f466a7587794c80cdacb046de13418909363569df8f58d77b74c138bbb61f1d57be0db8bd408c8a3c840379b0d77fab01ebf136
-
C:\Recovery\f8d1ec42-b1b7-11ed-bba7-be56d16f7d95\dwm.exeFilesize
828KB
MD52ac0e24ee73528bf8e6205fdbf62cb48
SHA1f103fb7fd6d4552c3e278d12a4d3e4fa3970cd22
SHA2566a8b636d017e1d6daf0c78b7f46f7b0ab97805a4008301041603f79f6b3cd919
SHA512c457029a45721254de3317573f466a7587794c80cdacb046de13418909363569df8f58d77b74c138bbb61f1d57be0db8bd408c8a3c840379b0d77fab01ebf136
-
\MsSurrogatesavesDllCommon\portcomponenthost.exeFilesize
828KB
MD52ac0e24ee73528bf8e6205fdbf62cb48
SHA1f103fb7fd6d4552c3e278d12a4d3e4fa3970cd22
SHA2566a8b636d017e1d6daf0c78b7f46f7b0ab97805a4008301041603f79f6b3cd919
SHA512c457029a45721254de3317573f466a7587794c80cdacb046de13418909363569df8f58d77b74c138bbb61f1d57be0db8bd408c8a3c840379b0d77fab01ebf136
-
\MsSurrogatesavesDllCommon\portcomponenthost.exeFilesize
828KB
MD52ac0e24ee73528bf8e6205fdbf62cb48
SHA1f103fb7fd6d4552c3e278d12a4d3e4fa3970cd22
SHA2566a8b636d017e1d6daf0c78b7f46f7b0ab97805a4008301041603f79f6b3cd919
SHA512c457029a45721254de3317573f466a7587794c80cdacb046de13418909363569df8f58d77b74c138bbb61f1d57be0db8bd408c8a3c840379b0d77fab01ebf136
-
memory/360-67-0x0000000000BA0000-0x0000000000C76000-memory.dmpFilesize
856KB
-
memory/360-68-0x000000001AE80000-0x000000001AF00000-memory.dmpFilesize
512KB
-
memory/1480-101-0x0000000000E70000-0x0000000000F46000-memory.dmpFilesize
856KB
-
memory/1480-102-0x00000000003F0000-0x0000000000470000-memory.dmpFilesize
512KB
-
memory/1480-103-0x00000000003F0000-0x0000000000470000-memory.dmpFilesize
512KB