Analysis

  • max time kernel
    46s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2023 09:21

General

  • Target

    a1d05206520518a47f710e7197bbc336.exe

  • Size

    1.5MB

  • MD5

    a1d05206520518a47f710e7197bbc336

  • SHA1

    270ac60027ac01b78139bec3a6fe54f702c4fe96

  • SHA256

    374eba5495779dc24974bb881e0c3f298861a91d88d710da4f684bf8a2a01fe6

  • SHA512

    6164910de359dd7f9ad12e75c1ea170ff5fb313598da249c12888a100cd01e3888bbea25240a7924ea825147a7979b0b941e9d8916a322dbb3846c077959921a

  • SSDEEP

    24576:YW3QhwWwORHtx07i/85O8q9Fx7hFsf1gj7xN9sKrogXMAGqo3K6L29ufIOT0Gj:YW3QNRH/07imOljZhFsf1s9ZkgXZkKxC

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 57 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 13 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 57 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1d05206520518a47f710e7197bbc336.exe
    "C:\Users\Admin\AppData\Local\Temp\a1d05206520518a47f710e7197bbc336.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ""C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\KillDuplicate.cmd" "C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate" "a1d05206520518a47f710e7197bbc336.exe""
      2⤵
        PID:1596
      • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
        "C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\ProgramData\01JDjn9an.vbe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:844
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\ProgramData\vyRlj1SkqrfRYAG7.bat" "
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1740
            • C:\ProgramData\componentsessioncrt.exe
              "C:\ProgramData\componentsessioncrt.exe"
              5⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1112
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2352
              • C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe
                "C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe"
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2604
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2492
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2476
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2456
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2448
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2432
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2416
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2400
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2392
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2376
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2368
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2360
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:516
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1628
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:696
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:956
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2012
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1492
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Desktop\taskhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:812
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1712
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Desktop\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2032
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Windows\PLA\Rules\en-US\taskhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1236
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\PLA\Rules\en-US\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:524
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Windows\PLA\Rules\en-US\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1004
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:776
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1204
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1176
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1808
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1660
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\WMIADAP.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1556
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:112
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:536
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "componentsessioncrtc" /sc MINUTE /mo 11 /tr "'C:\Windows\ModemLogs\componentsessioncrt.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1072
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "componentsessioncrt" /sc ONLOGON /tr "'C:\Windows\ModemLogs\componentsessioncrt.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1668
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "componentsessioncrtc" /sc MINUTE /mo 9 /tr "'C:\Windows\ModemLogs\componentsessioncrt.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:892
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\es-ES\dwm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:920
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\es-ES\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1516
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\es-ES\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:596
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\conhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1108
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:756
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1884
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\Offline Web Pages\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:364
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2012
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\Offline Web Pages\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1588
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1652
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:760
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1128
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1828
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:568
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1156
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\explorer.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1548
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1212
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1712
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1528
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1776
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:776
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\fr-FR\explorer.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2064
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\fr-FR\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2080
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\fr-FR\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2108
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2140
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2164
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2184
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2220
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows NT\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2240
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2260
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\conhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2292
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2312
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2328

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\01JDjn9an.vbe
      Filesize

      205B

      MD5

      76db147c9e20a89ea972166168a4b9ba

      SHA1

      475c26be4c2e8bc8ef0fd4bcc469e92e64f332ae

      SHA256

      5699049e3e55284b66a98cdbce5b4c36c3ce7396bdf60632c544ce390bad6dd0

      SHA512

      e32b9bfa54d9c71d1b17ea71ee5846a9f2220b77ad23045f5662c52324037e99cab253676d8d8e75bea44e2cf824b1ea3cc92ee84cced7866292eb73d51f77eb

    • C:\ProgramData\componentsessioncrt.exe
      Filesize

      983KB

      MD5

      5defd0000aa1bf0805c8d2e2fc3ed20d

      SHA1

      e7a366a7a834e2ab3cabc3dd412f065c636b4efb

      SHA256

      fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

      SHA512

      e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

    • C:\ProgramData\componentsessioncrt.exe
      Filesize

      983KB

      MD5

      5defd0000aa1bf0805c8d2e2fc3ed20d

      SHA1

      e7a366a7a834e2ab3cabc3dd412f065c636b4efb

      SHA256

      fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

      SHA512

      e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

    • C:\ProgramData\vyRlj1SkqrfRYAG7.bat
      Filesize

      40B

      MD5

      89947106df373d55eec5d73e11eac3e1

      SHA1

      788822f62913626780934e0bae6239b2f945dc61

      SHA256

      b30caba090d08a4bd296166f4833c90e5c0057d1bd04e0d50592319bccaf4637

      SHA512

      cc4d1a9b2fc1596526e99488fffde8d39c263b5551c5c5696dacbe3065cf44f5a94d77a34821cfe10b53e0e9202c3328850bd53bc6e0d4aca3ff99d729e33168

    • C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe
      Filesize

      983KB

      MD5

      5defd0000aa1bf0805c8d2e2fc3ed20d

      SHA1

      e7a366a7a834e2ab3cabc3dd412f065c636b4efb

      SHA256

      fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

      SHA512

      e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

    • C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\winlogon.exe
      Filesize

      983KB

      MD5

      5defd0000aa1bf0805c8d2e2fc3ed20d

      SHA1

      e7a366a7a834e2ab3cabc3dd412f065c636b4efb

      SHA256

      fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

      SHA512

      e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

    • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
      Filesize

      1.3MB

      MD5

      bced1e7139210b3cdd27938afeb88d8f

      SHA1

      06954c644d000863658b68dce36b6972f38da7d1

      SHA256

      d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7

      SHA512

      310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94

    • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
      Filesize

      1.3MB

      MD5

      bced1e7139210b3cdd27938afeb88d8f

      SHA1

      06954c644d000863658b68dce36b6972f38da7d1

      SHA256

      d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7

      SHA512

      310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94

    • C:\Users\Admin\AppData\Local\Temp\GoogleChromeUpdate\GoogleChromeUpdate.exe
      Filesize

      1.3MB

      MD5

      bced1e7139210b3cdd27938afeb88d8f

      SHA1

      06954c644d000863658b68dce36b6972f38da7d1

      SHA256

      d74aba28905fc35c7163604b9a807f289e00b0b28b4c88d06e308b4c977c1ea7

      SHA512

      310af594a2a744cb2e87aca3daeb2251d2219644bfc4f83fbcbce30119045fcbf68bd5a6ab318caa8090fd6598cc0de475c4687ae109458d71e11bf946df4b94

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LEUWPNKQEJNEQJPJSD4E.temp
      Filesize

      7KB

      MD5

      598ee337a1138c59c07ea8dbc6726153

      SHA1

      f8b4b7a28205489f7c690104917dbd46fe295578

      SHA256

      f8c993b0a8ce5a4eba7ac3f547d7e484fdccdee23948abce21ce505c54250b72

      SHA512

      673a4be0109b10b72fb5a2263ee3f0b7163a2266dd24d6f38881075ce3a2999175c48b0a204d46f2f897e6d17d39408487bb580c7dde13d9fed8ef2fb03fe0cd

    • C:\Users\Public\Desktop\taskhost.exe
      Filesize

      983KB

      MD5

      5defd0000aa1bf0805c8d2e2fc3ed20d

      SHA1

      e7a366a7a834e2ab3cabc3dd412f065c636b4efb

      SHA256

      fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

      SHA512

      e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

    • \ProgramData\componentsessioncrt.exe
      Filesize

      983KB

      MD5

      5defd0000aa1bf0805c8d2e2fc3ed20d

      SHA1

      e7a366a7a834e2ab3cabc3dd412f065c636b4efb

      SHA256

      fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

      SHA512

      e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

    • \ProgramData\componentsessioncrt.exe
      Filesize

      983KB

      MD5

      5defd0000aa1bf0805c8d2e2fc3ed20d

      SHA1

      e7a366a7a834e2ab3cabc3dd412f065c636b4efb

      SHA256

      fc11e2bbd6d3e8dce36393b3b00504ce8ed994e0498fffee0ce42d838ae51888

      SHA512

      e387cb219aec67da2eab62d7f091b8cad5b87cd971477f50c80ba263d009bc862ff272611a572de5cf51a27119e5ad0fae33cb9a4953b91768ed9252ebe84a7d

    • memory/1112-81-0x000000001AF00000-0x000000001AF80000-memory.dmp
      Filesize

      512KB

    • memory/1112-78-0x0000000000F20000-0x000000000101E000-memory.dmp
      Filesize

      1016KB

    • memory/1112-80-0x0000000000890000-0x000000000089A000-memory.dmp
      Filesize

      40KB

    • memory/1112-79-0x0000000000880000-0x000000000088E000-memory.dmp
      Filesize

      56KB

    • memory/1112-82-0x0000000000920000-0x000000000092C000-memory.dmp
      Filesize

      48KB

    • memory/2352-208-0x0000000002920000-0x00000000029A0000-memory.dmp
      Filesize

      512KB

    • memory/2352-209-0x0000000002920000-0x00000000029A0000-memory.dmp
      Filesize

      512KB

    • memory/2352-231-0x000000000292B000-0x0000000002962000-memory.dmp
      Filesize

      220KB

    • memory/2352-222-0x0000000002920000-0x00000000029A0000-memory.dmp
      Filesize

      512KB

    • memory/2360-192-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/2360-187-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/2360-189-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/2360-194-0x00000000028DB000-0x0000000002912000-memory.dmp
      Filesize

      220KB

    • memory/2368-227-0x000000000233B000-0x0000000002372000-memory.dmp
      Filesize

      220KB

    • memory/2368-212-0x0000000002330000-0x00000000023B0000-memory.dmp
      Filesize

      512KB

    • memory/2368-211-0x0000000002330000-0x00000000023B0000-memory.dmp
      Filesize

      512KB

    • memory/2368-210-0x0000000002330000-0x00000000023B0000-memory.dmp
      Filesize

      512KB

    • memory/2376-190-0x0000000002370000-0x00000000023F0000-memory.dmp
      Filesize

      512KB

    • memory/2376-193-0x0000000002370000-0x00000000023F0000-memory.dmp
      Filesize

      512KB

    • memory/2376-226-0x000000000237B000-0x00000000023B2000-memory.dmp
      Filesize

      220KB

    • memory/2376-197-0x0000000002370000-0x00000000023F0000-memory.dmp
      Filesize

      512KB

    • memory/2392-200-0x00000000024D0000-0x0000000002550000-memory.dmp
      Filesize

      512KB

    • memory/2392-201-0x00000000024D0000-0x0000000002550000-memory.dmp
      Filesize

      512KB

    • memory/2392-225-0x00000000024DB000-0x0000000002512000-memory.dmp
      Filesize

      220KB

    • memory/2400-207-0x00000000025B0000-0x0000000002630000-memory.dmp
      Filesize

      512KB

    • memory/2400-204-0x00000000025B0000-0x0000000002630000-memory.dmp
      Filesize

      512KB

    • memory/2400-206-0x00000000025B0000-0x0000000002630000-memory.dmp
      Filesize

      512KB

    • memory/2400-228-0x00000000025BB000-0x00000000025F2000-memory.dmp
      Filesize

      220KB

    • memory/2416-219-0x0000000002370000-0x00000000023F0000-memory.dmp
      Filesize

      512KB

    • memory/2416-233-0x000000000237B000-0x00000000023B2000-memory.dmp
      Filesize

      220KB

    • memory/2416-220-0x0000000002370000-0x00000000023F0000-memory.dmp
      Filesize

      512KB

    • memory/2416-221-0x0000000002370000-0x00000000023F0000-memory.dmp
      Filesize

      512KB

    • memory/2432-216-0x0000000002980000-0x0000000002A00000-memory.dmp
      Filesize

      512KB

    • memory/2432-218-0x0000000002980000-0x0000000002A00000-memory.dmp
      Filesize

      512KB

    • memory/2432-217-0x0000000002980000-0x0000000002A00000-memory.dmp
      Filesize

      512KB

    • memory/2432-232-0x000000000298B000-0x00000000029C2000-memory.dmp
      Filesize

      220KB

    • memory/2448-198-0x00000000028C0000-0x0000000002940000-memory.dmp
      Filesize

      512KB

    • memory/2448-224-0x00000000028CB000-0x0000000002902000-memory.dmp
      Filesize

      220KB

    • memory/2448-199-0x00000000028C0000-0x0000000002940000-memory.dmp
      Filesize

      512KB

    • memory/2456-229-0x000000000297B000-0x00000000029B2000-memory.dmp
      Filesize

      220KB

    • memory/2456-205-0x0000000002970000-0x00000000029F0000-memory.dmp
      Filesize

      512KB

    • memory/2456-203-0x0000000002970000-0x00000000029F0000-memory.dmp
      Filesize

      512KB

    • memory/2456-202-0x0000000002970000-0x00000000029F0000-memory.dmp
      Filesize

      512KB

    • memory/2476-195-0x00000000028C0000-0x0000000002940000-memory.dmp
      Filesize

      512KB

    • memory/2476-223-0x00000000028CB000-0x0000000002902000-memory.dmp
      Filesize

      220KB

    • memory/2476-196-0x00000000028C0000-0x0000000002940000-memory.dmp
      Filesize

      512KB

    • memory/2476-191-0x00000000028C0000-0x0000000002940000-memory.dmp
      Filesize

      512KB

    • memory/2476-186-0x0000000001ED0000-0x0000000001ED8000-memory.dmp
      Filesize

      32KB

    • memory/2476-185-0x000000001B3C0000-0x000000001B6A2000-memory.dmp
      Filesize

      2.9MB

    • memory/2492-215-0x0000000001ED0000-0x0000000001F50000-memory.dmp
      Filesize

      512KB

    • memory/2492-214-0x0000000001ED0000-0x0000000001F50000-memory.dmp
      Filesize

      512KB

    • memory/2492-213-0x0000000001ED0000-0x0000000001F50000-memory.dmp
      Filesize

      512KB

    • memory/2492-230-0x0000000001EDB000-0x0000000001F12000-memory.dmp
      Filesize

      220KB

    • memory/2604-188-0x000000001ADF0000-0x000000001AE70000-memory.dmp
      Filesize

      512KB

    • memory/2604-127-0x0000000000CE0000-0x0000000000DDE000-memory.dmp
      Filesize

      1016KB

    • memory/2604-234-0x000000001ADF0000-0x000000001AE70000-memory.dmp
      Filesize

      512KB