Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 17:34
Static task
static1
Behavioral task
behavioral1
Sample
DCRat Crack Test VERSION.exe
Resource
win7-20230220-en
General
-
Target
DCRat Crack Test VERSION.exe
-
Size
3.7MB
-
MD5
0cf54aebcc76f09c147863b916a494fc
-
SHA1
5a41a7060f20f4bc16ba4a60c8f22aa16495cb3e
-
SHA256
0cac16b9e6b85c3415ebc63def32b4bc999182a7a09197afdcf0851f57aae68d
-
SHA512
8dc0c4fe4649523e155bf7c57ceccb70524b27a18374e4e5fa1b991ad322181dca131b99729926f9d54dd3a1c1f86fdb40607a4e9790d0acceef2e116ba4712e
-
SSDEEP
98304:OavNz0cqlVkGIgKuP04hZ9gA2aT3v9f8473v0H:OUNYcqMGIgdrgfaT/p8S3v0H
Malware Config
Signatures
-
DcRat 49 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exetaskmgr.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1436 schtasks.exe 940 schtasks.exe 1568 schtasks.exe 4700 schtasks.exe 2164 schtasks.exe 2716 schtasks.exe 2056 schtasks.exe 4652 schtasks.exe 3696 schtasks.exe 640 schtasks.exe 2076 schtasks.exe 1908 schtasks.exe 2548 schtasks.exe 4372 schtasks.exe 5000 schtasks.exe 3716 schtasks.exe 3376 schtasks.exe 4248 schtasks.exe 4428 schtasks.exe 400 schtasks.exe 4604 schtasks.exe 1840 schtasks.exe 1484 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation taskmgr.exe 268 schtasks.exe 4052 schtasks.exe 1336 schtasks.exe 2428 schtasks.exe 3944 schtasks.exe 1452 schtasks.exe 3592 schtasks.exe 3928 schtasks.exe 4920 schtasks.exe 1792 schtasks.exe 1808 schtasks.exe 1772 schtasks.exe 396 schtasks.exe 2424 schtasks.exe 3652 schtasks.exe 1296 schtasks.exe 4984 schtasks.exe 1408 schtasks.exe 492 schtasks.exe 4260 schtasks.exe 4084 schtasks.exe 4520 schtasks.exe 3348 schtasks.exe 220 schtasks.exe 1136 schtasks.exe -
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4652 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4260 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1772 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3716 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4084 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3376 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4248 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3592 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 396 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3696 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3348 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 268 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 400 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3652 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1296 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4052 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3944 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1408 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 492 3836 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 3836 schtasks.exe -
.NET Reactor proctector 31 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/2692-134-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-135-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-142-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-138-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-144-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-146-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-148-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-150-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-152-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-154-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-156-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-158-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-160-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-162-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-164-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-166-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-168-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-170-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-172-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-174-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-176-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-178-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-180-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-182-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-184-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-186-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-188-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-190-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-194-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-197-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor behavioral2/memory/2692-199-0x00000000054D0000-0x000000000588A000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DCRatSupport.exeDCRat Crack Test VERSION.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation DCRatSupport.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation DCRat Crack Test VERSION.exe -
Executes dropped EXE 2 IoCs
Processes:
DCRatSupport.exeOfficeClickToRun.exepid process 2708 DCRatSupport.exe 4236 OfficeClickToRun.exe -
Obfuscated with Agile.Net obfuscator 6 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe agile_net C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe agile_net C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe agile_net behavioral2/memory/2708-1743-0x00000161866D0000-0x0000016186C8A000-memory.dmp agile_net C:\Windows\InputMethod\OfficeClickToRun.exe agile_net C:\Windows\InputMethod\OfficeClickToRun.exe agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 49 ipinfo.io 50 ipinfo.io -
Drops file in Program Files directory 12 IoCs
Processes:
DCRatSupport.exedescription ioc process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\wininit.exe DCRatSupport.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\56085415360792 DCRatSupport.exe File created C:\Program Files\Windows Portable Devices\27d1bcfc3c54e0 DCRatSupport.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\Idle.exe DCRatSupport.exe File created C:\Program Files\VideoLAN\VLC\RuntimeBroker.exe DCRatSupport.exe File created C:\Program Files\VideoLAN\VLC\9e8d7a4ca61bd9 DCRatSupport.exe File opened for modification C:\Program Files\VideoLAN\VLC\RuntimeBroker.exe DCRatSupport.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\wininit.exe DCRatSupport.exe File opened for modification C:\Program Files\Windows Portable Devices\System.exe DCRatSupport.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\Idle.exe DCRatSupport.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\6ccacd8608530f DCRatSupport.exe File created C:\Program Files\Windows Portable Devices\System.exe DCRatSupport.exe -
Drops file in Windows directory 3 IoCs
Processes:
DCRatSupport.exedescription ioc process File opened for modification C:\Windows\InputMethod\OfficeClickToRun.exe DCRatSupport.exe File created C:\Windows\InputMethod\OfficeClickToRun.exe DCRatSupport.exe File created C:\Windows\InputMethod\e6c9b481da804f DCRatSupport.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1436 schtasks.exe 3592 schtasks.exe 3652 schtasks.exe 4372 schtasks.exe 4652 schtasks.exe 400 schtasks.exe 1808 schtasks.exe 492 schtasks.exe 2428 schtasks.exe 1408 schtasks.exe 2056 schtasks.exe 940 schtasks.exe 4248 schtasks.exe 3348 schtasks.exe 2424 schtasks.exe 1908 schtasks.exe 3716 schtasks.exe 3696 schtasks.exe 640 schtasks.exe 3928 schtasks.exe 1772 schtasks.exe 396 schtasks.exe 220 schtasks.exe 4604 schtasks.exe 2164 schtasks.exe 1568 schtasks.exe 4984 schtasks.exe 4260 schtasks.exe 5000 schtasks.exe 4084 schtasks.exe 3376 schtasks.exe 4520 schtasks.exe 2076 schtasks.exe 1484 schtasks.exe 1792 schtasks.exe 2716 schtasks.exe 4052 schtasks.exe 1336 schtasks.exe 4920 schtasks.exe 1840 schtasks.exe 1452 schtasks.exe 4700 schtasks.exe 4428 schtasks.exe 268 schtasks.exe 1296 schtasks.exe 2548 schtasks.exe 3944 schtasks.exe 1136 schtasks.exe -
Modifies registry class 2 IoCs
Processes:
taskmgr.exeDCRatSupport.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ DCRatSupport.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exeDCRatSupport.exepid process 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2708 DCRatSupport.exe 2780 taskmgr.exe 2708 DCRatSupport.exe 2708 DCRatSupport.exe 2708 DCRatSupport.exe 2708 DCRatSupport.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
DCRat Crack Test VERSION.exetaskmgr.exeDCRatSupport.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeOfficeClickToRun.exedescription pid process Token: SeDebugPrivilege 2692 DCRat Crack Test VERSION.exe Token: SeDebugPrivilege 2780 taskmgr.exe Token: SeSystemProfilePrivilege 2780 taskmgr.exe Token: SeCreateGlobalPrivilege 2780 taskmgr.exe Token: SeDebugPrivilege 2708 DCRatSupport.exe Token: SeDebugPrivilege 3296 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 1244 powershell.exe Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 4128 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 4236 OfficeClickToRun.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe 2780 taskmgr.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
DCRat Crack Test VERSION.exeDCRatSupport.exedescription pid process target process PID 2692 wrote to memory of 2708 2692 DCRat Crack Test VERSION.exe DCRatSupport.exe PID 2692 wrote to memory of 2708 2692 DCRat Crack Test VERSION.exe DCRatSupport.exe PID 2708 wrote to memory of 3812 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 3812 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 3296 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 3296 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 2688 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 2688 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 3984 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 3984 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 2712 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 2712 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 1236 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 1236 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 4736 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 4736 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 1244 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 1244 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 2128 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 2128 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 4128 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 4128 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 5076 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 5076 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 1852 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 1852 2708 DCRatSupport.exe powershell.exe PID 2708 wrote to memory of 4236 2708 DCRatSupport.exe OfficeClickToRun.exe PID 2708 wrote to memory of 4236 2708 DCRatSupport.exe OfficeClickToRun.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCRat Crack Test VERSION.exe"C:\Users\Admin\AppData\Local\Temp\DCRat Crack Test VERSION.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe"C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\InputMethod\OfficeClickToRun.exe"C:\Windows\InputMethod\OfficeClickToRun.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- DcRat
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\odt\StartMenuExperienceHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\odt\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\odt\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\odt\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Windows\InputMethod\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\InputMethod\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Windows\InputMethod\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\odt\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Documents\My Pictures\Registry.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Pictures\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Documents\My Pictures\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Documents\My Pictures\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Pictures\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Documents\My Pictures\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Start Menu\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Start Menu\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Start Menu\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\odt\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\odt\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\odt\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Favorites\Links\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Admin\Favorites\Links\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Favorites\Links\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5c6c940df49fc678d1c74fea3c57a32f9
SHA179edd715358a82e6d29970998ff2e9b235ea4217
SHA2564e50925adb70141467a7081cc905c76fd6dab841195400683f9f67fc2602aa0a
SHA5123c1df9c18f1756ead841f68916dec03a066078b0705443d3f886fd990e2e42ebbffd46916be3f6fe39ea0505fc2c848fbdea56828fbd5aa5f24b329f8d979707
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD561e06aa7c42c7b2a752516bcbb242cc1
SHA102c54f8b171ef48cad21819c20b360448418a068
SHA2565bb0254e8f0220caab64dcc785f432820350471bfcdcb98240c3e0e71a709f5d
SHA51203731f49999ec895370100a4dfeee674bbe5baa50d82007256e6914c323412eef8936b320d2738774758fbbfd76d4c3d391d9e144e65587eba700d98d0362346
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD561e06aa7c42c7b2a752516bcbb242cc1
SHA102c54f8b171ef48cad21819c20b360448418a068
SHA2565bb0254e8f0220caab64dcc785f432820350471bfcdcb98240c3e0e71a709f5d
SHA51203731f49999ec895370100a4dfeee674bbe5baa50d82007256e6914c323412eef8936b320d2738774758fbbfd76d4c3d391d9e144e65587eba700d98d0362346
-
C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exeFilesize
5.7MB
MD54bf0c454f9ec3e15308e5f2e362f9e87
SHA10ba55233e7510c060fc1f62d2a760096fb1b1136
SHA25643f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f
SHA512c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b
-
C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exeFilesize
5.7MB
MD54bf0c454f9ec3e15308e5f2e362f9e87
SHA10ba55233e7510c060fc1f62d2a760096fb1b1136
SHA25643f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f
SHA512c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b
-
C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exeFilesize
5.7MB
MD54bf0c454f9ec3e15308e5f2e362f9e87
SHA10ba55233e7510c060fc1f62d2a760096fb1b1136
SHA25643f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f
SHA512c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xafgxpyx.npr.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\InputMethod\OfficeClickToRun.exeFilesize
5.7MB
MD54bf0c454f9ec3e15308e5f2e362f9e87
SHA10ba55233e7510c060fc1f62d2a760096fb1b1136
SHA25643f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f
SHA512c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b
-
C:\Windows\InputMethod\OfficeClickToRun.exeFilesize
5.7MB
MD54bf0c454f9ec3e15308e5f2e362f9e87
SHA10ba55233e7510c060fc1f62d2a760096fb1b1136
SHA25643f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f
SHA512c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b
-
memory/1236-2011-0x00000154429B0000-0x00000154429C0000-memory.dmpFilesize
64KB
-
memory/1236-1955-0x00000154429B0000-0x00000154429C0000-memory.dmpFilesize
64KB
-
memory/1236-1977-0x00000154429B0000-0x00000154429C0000-memory.dmpFilesize
64KB
-
memory/1244-1954-0x000001ABA5B10000-0x000001ABA5B20000-memory.dmpFilesize
64KB
-
memory/1244-1975-0x000001ABA5B10000-0x000001ABA5B20000-memory.dmpFilesize
64KB
-
memory/1852-1947-0x00000284E09C0000-0x00000284E09D0000-memory.dmpFilesize
64KB
-
memory/1852-2009-0x00000284E09C0000-0x00000284E09D0000-memory.dmpFilesize
64KB
-
memory/1852-1976-0x00000284E09C0000-0x00000284E09D0000-memory.dmpFilesize
64KB
-
memory/2128-2000-0x000002C220340000-0x000002C220350000-memory.dmpFilesize
64KB
-
memory/2128-1971-0x000002C220340000-0x000002C220350000-memory.dmpFilesize
64KB
-
memory/2128-1952-0x000002C220340000-0x000002C220350000-memory.dmpFilesize
64KB
-
memory/2128-1953-0x000002C220340000-0x000002C220350000-memory.dmpFilesize
64KB
-
memory/2688-1884-0x000001F0D8F30000-0x000001F0D8F40000-memory.dmpFilesize
64KB
-
memory/2688-1874-0x000001F0D8F30000-0x000001F0D8F40000-memory.dmpFilesize
64KB
-
memory/2692-164-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-170-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-194-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-188-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-197-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-186-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-199-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-375-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2692-377-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2692-379-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2692-381-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2692-1730-0x0000000006460000-0x00000000064F2000-memory.dmpFilesize
584KB
-
memory/2692-1731-0x0000000006670000-0x000000000667A000-memory.dmpFilesize
40KB
-
memory/2692-184-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-182-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-180-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-178-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-133-0x0000000005C60000-0x0000000006204000-memory.dmpFilesize
5.6MB
-
memory/2692-176-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-174-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-172-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-190-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-168-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-166-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-162-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-160-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-158-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-156-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-154-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-152-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-150-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-148-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-146-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-144-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-138-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-142-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-141-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2692-139-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2692-137-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2692-135-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2692-134-0x00000000054D0000-0x000000000588A000-memory.dmpFilesize
3.7MB
-
memory/2708-1744-0x00000161870F0000-0x0000016187100000-memory.dmpFilesize
64KB
-
memory/2708-1743-0x00000161866D0000-0x0000016186C8A000-memory.dmpFilesize
5.7MB
-
memory/2708-1745-0x00000161A31F0000-0x00000161A3240000-memory.dmpFilesize
320KB
-
memory/2712-1928-0x000001C3CAFC0000-0x000001C3CAFD0000-memory.dmpFilesize
64KB
-
memory/2712-1974-0x000001C3CAFC0000-0x000001C3CAFD0000-memory.dmpFilesize
64KB
-
memory/2780-196-0x000002BD73700000-0x000002BD73701000-memory.dmpFilesize
4KB
-
memory/2780-191-0x000002BD73700000-0x000002BD73701000-memory.dmpFilesize
4KB
-
memory/2780-193-0x000002BD73700000-0x000002BD73701000-memory.dmpFilesize
4KB
-
memory/3296-1873-0x000001E1768F0000-0x000001E176900000-memory.dmpFilesize
64KB
-
memory/3296-1862-0x000001E1768F0000-0x000001E176900000-memory.dmpFilesize
64KB
-
memory/3984-2024-0x0000018955BB0000-0x0000018955BC0000-memory.dmpFilesize
64KB
-
memory/3984-1918-0x0000018955BB0000-0x0000018955BC0000-memory.dmpFilesize
64KB
-
memory/3984-1995-0x0000018955BB0000-0x0000018955BC0000-memory.dmpFilesize
64KB
-
memory/3984-1899-0x0000018955BB0000-0x0000018955BC0000-memory.dmpFilesize
64KB
-
memory/3984-1853-0x0000018955B60000-0x0000018955B82000-memory.dmpFilesize
136KB
-
memory/3984-1973-0x0000018955BB0000-0x0000018955BC0000-memory.dmpFilesize
64KB
-
memory/4128-1972-0x0000028AAEB50000-0x0000028AAEB60000-memory.dmpFilesize
64KB
-
memory/4236-2020-0x000002D4B9BF0000-0x000002D4B9DB2000-memory.dmpFilesize
1.8MB
-
memory/4236-1970-0x000002D4B8A90000-0x000002D4B8AA0000-memory.dmpFilesize
64KB
-
memory/4236-2021-0x000002D4BA710000-0x000002D4BAC38000-memory.dmpFilesize
5.2MB
-
memory/4236-2022-0x000002D4B8A90000-0x000002D4B8AA0000-memory.dmpFilesize
64KB
-
memory/4236-2072-0x000002D4B8A90000-0x000002D4B8AA0000-memory.dmpFilesize
64KB
-
memory/4736-2004-0x00000239A7110000-0x00000239A7120000-memory.dmpFilesize
64KB
-
memory/4736-1962-0x00000239A7110000-0x00000239A7120000-memory.dmpFilesize
64KB
-
memory/4736-2023-0x00000239A7110000-0x00000239A7120000-memory.dmpFilesize
64KB
-
memory/4736-1964-0x00000239A7110000-0x00000239A7120000-memory.dmpFilesize
64KB
-
memory/5076-2006-0x000001F2CC7F0000-0x000001F2CC800000-memory.dmpFilesize
64KB