Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 20:46
Behavioral task
behavioral1
Sample
9781aaa439fcf85da08d40c5c3e3909f.exe
Resource
win7-20230220-en
General
-
Target
9781aaa439fcf85da08d40c5c3e3909f.exe
-
Size
2.9MB
-
MD5
9781aaa439fcf85da08d40c5c3e3909f
-
SHA1
edd84aae94017cdde7dd564d2791c6389f98c01f
-
SHA256
413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
-
SHA512
27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
SSDEEP
49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3976 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4932 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3884 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4672 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4968 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1420 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 960 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3948 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4892 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3956 2968 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 2968 schtasks.exe -
Processes:
taskhostw.exe9781aaa439fcf85da08d40c5c3e3909f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe -
Processes:
resource yara_rule behavioral2/memory/324-133-0x0000000000850000-0x0000000000B36000-memory.dmp dcrat C:\odt\RuntimeBroker.exe dcrat C:\Users\Public\Music\taskhostw.exe dcrat C:\Users\Public\Music\taskhostw.exe dcrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exetaskhostw.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 9781aaa439fcf85da08d40c5c3e3909f.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation taskhostw.exe -
Executes dropped EXE 1 IoCs
Processes:
taskhostw.exepid process 3316 taskhostw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exetaskhostw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe -
Drops file in Program Files directory 6 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exedescription ioc process File created C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Program Files\Microsoft Office 15\ClientX64\9e8d7a4ca61bd9 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\explorer.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\7a0fd90576e088 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\sysmon.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\121e5b5079f7c0 9781aaa439fcf85da08d40c5c3e3909f.exe -
Drops file in Windows directory 4 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exedescription ioc process File created C:\Windows\BitLockerDiscoveryVolumeContents\OfficeClickToRun.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\OfficeClickToRun.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\e6c9b481da804f 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Windows\ImmersiveControlPanel\it-IT\SearchApp.exe 9781aaa439fcf85da08d40c5c3e3909f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4968 schtasks.exe 3948 schtasks.exe 4932 schtasks.exe 1400 schtasks.exe 3976 schtasks.exe 2960 schtasks.exe 1368 schtasks.exe 3640 schtasks.exe 3884 schtasks.exe 2656 schtasks.exe 1420 schtasks.exe 2476 schtasks.exe 3968 schtasks.exe 1536 schtasks.exe 4892 schtasks.exe 2312 schtasks.exe 4672 schtasks.exe 1756 schtasks.exe 960 schtasks.exe 4152 schtasks.exe 1852 schtasks.exe 2060 schtasks.exe 3956 schtasks.exe 756 schtasks.exe 2812 schtasks.exe 1816 schtasks.exe 2164 schtasks.exe -
Modifies registry class 2 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exetaskhostw.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings 9781aaa439fcf85da08d40c5c3e3909f.exe Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings taskhostw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exetaskhostw.exepid process 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 324 9781aaa439fcf85da08d40c5c3e3909f.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe 3316 taskhostw.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskhostw.exepid process 3316 taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exetaskhostw.exevssvc.exedescription pid process Token: SeDebugPrivilege 324 9781aaa439fcf85da08d40c5c3e3909f.exe Token: SeDebugPrivilege 3316 taskhostw.exe Token: SeBackupPrivilege 548 vssvc.exe Token: SeRestorePrivilege 548 vssvc.exe Token: SeAuditPrivilege 548 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.execmd.exetaskhostw.exedescription pid process target process PID 324 wrote to memory of 4504 324 9781aaa439fcf85da08d40c5c3e3909f.exe cmd.exe PID 324 wrote to memory of 4504 324 9781aaa439fcf85da08d40c5c3e3909f.exe cmd.exe PID 4504 wrote to memory of 2880 4504 cmd.exe w32tm.exe PID 4504 wrote to memory of 2880 4504 cmd.exe w32tm.exe PID 4504 wrote to memory of 3316 4504 cmd.exe taskhostw.exe PID 4504 wrote to memory of 3316 4504 cmd.exe taskhostw.exe PID 3316 wrote to memory of 4808 3316 taskhostw.exe WScript.exe PID 3316 wrote to memory of 4808 3316 taskhostw.exe WScript.exe PID 3316 wrote to memory of 1312 3316 taskhostw.exe WScript.exe PID 3316 wrote to memory of 1312 3316 taskhostw.exe WScript.exe -
System policy modification 1 TTPs 6 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exetaskhostw.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9781aaa439fcf85da08d40c5c3e3909f.exe"C:\Users\Admin\AppData\Local\Temp\9781aaa439fcf85da08d40c5c3e3909f.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\y6R1EO2Q7w.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\Users\Public\Music\taskhostw.exe"C:\Users\Public\Music\taskhostw.exe"3⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\69b74b01-6754-4280-b47d-534791876905.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5ac3e06f-31d6-4228-8af3-470141579451.vbs"4⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Music\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\Music\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Music\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\odt\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Libraries\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Public\Libraries\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Libraries\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\odt\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\odt\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\odt\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5ac3e06f-31d6-4228-8af3-470141579451.vbsFilesize
487B
MD588e0e35770ef41324f8268a35ef5aa02
SHA16dd0f3b4db94d9235b7290de3d4911b57c3b43a5
SHA25657898915471640e5abff522083d2f20af50ec4f2f4f7cb83a22dfd104acb82cc
SHA5128d6b8faa0c31563f3bbe82a24d7510923db8d7b74b0fb1709546a52e3727efafca8877afcd66c47133ddaf76682c907918c4fbf0a0d5d42af71d8dfe550e04e9
-
C:\Users\Admin\AppData\Local\Temp\69b74b01-6754-4280-b47d-534791876905.vbsFilesize
711B
MD5d082228e554102c0304d5dc8b8b9971c
SHA13bf465bccd67e80afd394b673567acbaa7354e07
SHA2566f57fca2bc4b58ec225f06030afbd52350fd80158c6c9f8f201deb8fe69fab2f
SHA5127cf3d25f620f0ad09235f7def39a50a5250041e1ce91a8d70e04f0d0a9a915000b65e8c9946482520322cea062eb2155c00d414b1658b3b76c7bac2119dfaf71
-
C:\Users\Admin\AppData\Local\Temp\y6R1EO2Q7w.batFilesize
200B
MD5683c09e9cde0d05aace192e550b9cf06
SHA19443eaec473b7c04936f8f2f9ac8c0621ac59d67
SHA256a03af45fe83c0149e0c4ce26c6eebc8c2ff95cc949d1866926a26e5a669eee6c
SHA5121587f2a6ad11b0ae863dca228d060c97db6b74c93a69fc1add50e639e123466676b063ca4c6293aae54d027284340d00f25710f6be54c598b413e62b7f45fc5a
-
C:\Users\Public\Music\taskhostw.exeFilesize
2.9MB
MD59781aaa439fcf85da08d40c5c3e3909f
SHA1edd84aae94017cdde7dd564d2791c6389f98c01f
SHA256413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
SHA51227be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
C:\Users\Public\Music\taskhostw.exeFilesize
2.9MB
MD59781aaa439fcf85da08d40c5c3e3909f
SHA1edd84aae94017cdde7dd564d2791c6389f98c01f
SHA256413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
SHA51227be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
C:\odt\RuntimeBroker.exeFilesize
2.9MB
MD59781aaa439fcf85da08d40c5c3e3909f
SHA1edd84aae94017cdde7dd564d2791c6389f98c01f
SHA256413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
SHA51227be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
memory/324-133-0x0000000000850000-0x0000000000B36000-memory.dmpFilesize
2.9MB
-
memory/324-134-0x0000000002BD0000-0x0000000002BE0000-memory.dmpFilesize
64KB
-
memory/324-135-0x0000000002DA0000-0x0000000002DF0000-memory.dmpFilesize
320KB
-
memory/324-136-0x000000001D010000-0x000000001D538000-memory.dmpFilesize
5.2MB
-
memory/3316-164-0x000000001C830000-0x000000001C840000-memory.dmpFilesize
64KB
-
memory/3316-209-0x000000001DBA0000-0x000000001DBB7000-memory.dmpFilesize
92KB