Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
03/07/2023, 15:50
Behavioral task
behavioral1
Sample
bb378eeb6557e9441a1b77daaf259b2d.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
bb378eeb6557e9441a1b77daaf259b2d.exe
Resource
win10v2004-20230703-en
General
-
Target
bb378eeb6557e9441a1b77daaf259b2d.exe
-
Size
1.3MB
-
MD5
bb378eeb6557e9441a1b77daaf259b2d
-
SHA1
d70dbe4af5e6f910c842bd71683bcb7e7a6b3e70
-
SHA256
9eaab4bb7e5d22ea0c333513a0516b9535b45feeaf05cbc6714fbf8823cbcbbc
-
SHA512
7fd54487ee6529dec1a2a50bb9d60af79c64e1f9a0aab3d0fbb1772185524cb6444a906cb3022183e17c2aa4a0897e8d2e163536c4fded5ffe742ad2b0b77bca
-
SSDEEP
24576:FZXxCOFbh94+AkAUewXW4DFfepe8YT3f6j7ynSS52qs:FPCOFU+ewJfeg8Y2j2nh52
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1708 schtasks.exe 1840 schtasks.exe 1308 schtasks.exe 1160 schtasks.exe 1704 schtasks.exe 1748 schtasks.exe 1552 schtasks.exe 1576 schtasks.exe 864 schtasks.exe 1156 schtasks.exe 840 schtasks.exe 1676 schtasks.exe 1976 schtasks.exe 1108 schtasks.exe 908 schtasks.exe 1328 schtasks.exe 1232 schtasks.exe 964 schtasks.exe 1068 schtasks.exe 1768 schtasks.exe 1956 schtasks.exe 1292 schtasks.exe 1068 schtasks.exe 524 schtasks.exe 1340 schtasks.exe 876 schtasks.exe 1632 schtasks.exe 1544 schtasks.exe 2024 schtasks.exe 1160 schtasks.exe 296 schtasks.exe 840 schtasks.exe 1344 schtasks.exe 1684 schtasks.exe 332 schtasks.exe 1940 schtasks.exe 1412 schtasks.exe 1976 schtasks.exe 1640 schtasks.exe 1596 schtasks.exe 296 schtasks.exe File created C:\Windows\DigitalLocker\en-US\csrss.exe bb378eeb6557e9441a1b77daaf259b2d.exe 880 schtasks.exe 316 schtasks.exe 2000 schtasks.exe File created C:\Windows\DigitalLocker\en-US\886983d96e3d3e bb378eeb6557e9441a1b77daaf259b2d.exe 980 schtasks.exe 524 schtasks.exe 1676 schtasks.exe 1068 schtasks.exe 568 schtasks.exe 1576 schtasks.exe 1328 schtasks.exe 860 schtasks.exe 2040 schtasks.exe 1392 schtasks.exe 1780 schtasks.exe 328 schtasks.exe 1576 schtasks.exe 1500 schtasks.exe 1344 schtasks.exe 568 schtasks.exe 840 schtasks.exe 1844 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 25 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\", \"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\", \"C:\\Windows\\Help\\Corporate\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\", \"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\", \"C:\\Windows\\Help\\Corporate\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\", \"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\", \"C:\\Windows\\Help\\Corporate\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\", \"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\", \"C:\\Windows\\Help\\Corporate\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\WmiPrvSE.exe\", \"C:\\Program Files\\Internet Explorer\\lsass.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\", \"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\", \"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\", \"C:\\Windows\\Help\\Corporate\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\", \"C:\\Program Files\\Google\\lsm.exe\", \"C:\\Users\\All Users\\Favorites\\winlogon.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\", \"C:\\Windows\\es-ES\\winlogon.exe\", \"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\", \"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\", \"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\", \"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\", \"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\", \"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\", \"C:\\Windows\\addins\\wininit.exe\", \"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1392 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 980 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1412 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 308 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1160 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 876 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 328 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1840 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1308 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1160 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 864 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1156 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 520 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 520 schtasks.exe 28 -
resource yara_rule behavioral1/memory/1308-54-0x0000000000C90000-0x0000000000DE0000-memory.dmp dcrat behavioral1/memory/1308-58-0x000000001A920000-0x000000001A9A0000-memory.dmp dcrat behavioral1/files/0x00080000000122fb-68.dat dcrat behavioral1/files/0x0006000000014260-117.dat dcrat behavioral1/files/0x0006000000014260-116.dat dcrat behavioral1/memory/1568-118-0x0000000000F60000-0x00000000010B0000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1568 wininit.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\addins\\wininit.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\Help\\Corporate\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\Help\\Corporate\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\es-ES\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Internet Explorer\\lsass.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\addins\\wininit.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Program Files\\Google\\lsm.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files\\MSBuild\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Program Files\\Google\\lsm.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Users\\All Users\\Favorites\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\ehome\\wow\\ja-JP\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Registration\\CRMLog\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Microsoft Office\\Office14\\1033\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Users\\All Users\\Favorites\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\es-ES\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files (x86)\\Internet Explorer\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Internet Explorer\\lsass.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\291e1a42-1054-11ee-8655-fabf500b3286\\smss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\assembly\\GAC\\ADODB\\7.0.3300.0__b03f5f7f11d50a3a\\explorer.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Windows Portable Devices\\winlogon.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files (x86)\\Common Files\\DESIGNER\\WmiPrvSE.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\wininit.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Google\\Chrome\\Application\\106.0.5249.119\\default_apps\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\Windows Mail\\fr-FR\\explorer.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\DigitalLocker\\en-US\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\DVD Maker\\en-US\\csrss.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\sppsvc.exe\"" bb378eeb6557e9441a1b77daaf259b2d.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\winlogon.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Common Files\DESIGNER\24dbde2999530e bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\sppsvc.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\0a1fd5f707cd16 bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Windows Mail\fr-FR\explorer.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\MSBuild\Microsoft\24dbde2999530e bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Microsoft Office\Office14\1033\cc11b995f2a76d bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Google\lsm.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Windows Portable Devices\cc11b995f2a76d bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\csrss.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\DVD Maker\en-US\csrss.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\DVD Maker\en-US\886983d96e3d3e bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Common Files\DESIGNER\WmiPrvSE.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\MSBuild\Microsoft\WmiPrvSE.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Microsoft Office\Office14\1033\winlogon.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\WmiPrvSE.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\MSBuild\WmiPrvSE.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Windows Mail\fr-FR\7a0fd90576e088 bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Internet Explorer\sppsvc.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Internet Explorer\lsass.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Google\101b941d020240 bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\MSBuild\24dbde2999530e bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Internet Explorer\0a1fd5f707cd16 bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files\Internet Explorer\6203df4a6bafc7 bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\24dbde2999530e bb378eeb6557e9441a1b77daaf259b2d.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\DigitalLocker\en-US\886983d96e3d3e bb378eeb6557e9441a1b77daaf259b2d.exe File opened for modification C:\Windows\ehome\wow\ja-JP\csrss.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\addins\wininit.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\addins\56085415360792 bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\Help\Corporate\cc11b995f2a76d bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\DigitalLocker\en-US\csrss.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\es-ES\cc11b995f2a76d bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\ehome\wow\ja-JP\csrss.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\explorer.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\Registration\CRMLog\24dbde2999530e bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\es-ES\winlogon.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\Registration\CRMLog\WmiPrvSE.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\Help\Corporate\winlogon.exe bb378eeb6557e9441a1b77daaf259b2d.exe File opened for modification C:\Windows\DigitalLocker\en-US\csrss.exe bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\ehome\wow\ja-JP\886983d96e3d3e bb378eeb6557e9441a1b77daaf259b2d.exe File created C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\7a0fd90576e088 bb378eeb6557e9441a1b77daaf259b2d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1844 schtasks.exe 840 schtasks.exe 1340 schtasks.exe 296 schtasks.exe 1100 schtasks.exe 1292 schtasks.exe 1392 schtasks.exe 1708 schtasks.exe 1576 schtasks.exe 908 schtasks.exe 332 schtasks.exe 1748 schtasks.exe 2000 schtasks.exe 1552 schtasks.exe 1308 schtasks.exe 1768 schtasks.exe 1684 schtasks.exe 1328 schtasks.exe 1940 schtasks.exe 328 schtasks.exe 1500 schtasks.exe 836 schtasks.exe 996 schtasks.exe 1300 schtasks.exe 1156 schtasks.exe 296 schtasks.exe 1704 schtasks.exe 2040 schtasks.exe 2024 schtasks.exe 1640 schtasks.exe 1596 schtasks.exe 1344 schtasks.exe 1676 schtasks.exe 1576 schtasks.exe 1108 schtasks.exe 568 schtasks.exe 1976 schtasks.exe 1300 schtasks.exe 1508 schtasks.exe 308 schtasks.exe 876 schtasks.exe 908 schtasks.exe 1160 schtasks.exe 1576 schtasks.exe 980 schtasks.exe 964 schtasks.exe 1068 schtasks.exe 840 schtasks.exe 568 schtasks.exe 1996 schtasks.exe 1232 schtasks.exe 316 schtasks.exe 524 schtasks.exe 1160 schtasks.exe 524 schtasks.exe 840 schtasks.exe 1976 schtasks.exe 1780 schtasks.exe 1344 schtasks.exe 1544 schtasks.exe 1632 schtasks.exe 1068 schtasks.exe 1956 schtasks.exe 880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1308 bb378eeb6557e9441a1b77daaf259b2d.exe 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 1568 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1308 bb378eeb6557e9441a1b77daaf259b2d.exe Token: SeDebugPrivilege 1764 bb378eeb6557e9441a1b77daaf259b2d.exe Token: SeDebugPrivilege 1568 wininit.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1764 1308 bb378eeb6557e9441a1b77daaf259b2d.exe 53 PID 1308 wrote to memory of 1764 1308 bb378eeb6557e9441a1b77daaf259b2d.exe 53 PID 1308 wrote to memory of 1764 1308 bb378eeb6557e9441a1b77daaf259b2d.exe 53 PID 1764 wrote to memory of 1568 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 105 PID 1764 wrote to memory of 1568 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 105 PID 1764 wrote to memory of 1568 1764 bb378eeb6557e9441a1b77daaf259b2d.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb378eeb6557e9441a1b77daaf259b2d.exe"C:\Users\Admin\AppData\Local\Temp\bb378eeb6557e9441a1b77daaf259b2d.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\bb378eeb6557e9441a1b77daaf259b2d.exe"C:\Users\Admin\AppData\Local\Temp\bb378eeb6557e9441a1b77daaf259b2d.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wininit.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wininit.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\Office14\1033\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office\Office14\1033\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\lsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Google\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Favorites\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Favorites\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\DVD Maker\en-US\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\DVD Maker\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Windows\es-ES\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\es-ES\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Windows\es-ES\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\ehome\wow\ja-JP\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\ehome\wow\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\ehome\wow\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\DESIGNER\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Recovery\291e1a42-1054-11ee-8655-fabf500b3286\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\291e1a42-1054-11ee-8655-fabf500b3286\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\291e1a42-1054-11ee-8655-fabf500b3286\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\MSBuild\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Program Files\MSBuild\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Windows\Registration\CRMLog\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Windows\Registration\CRMLog\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\addins\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\addins\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\addins\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\fr-FR\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Mail\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Internet Explorer\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Windows\Help\Corporate\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Help\Corporate\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Windows\Help\Corporate\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Recovery\291e1a42-1054-11ee-8655-fabf500b3286\WmiPrvSE.exe'" /f1⤵
- Creates scheduled task(s)
PID:996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\291e1a42-1054-11ee-8655-fabf500b3286\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Recovery\291e1a42-1054-11ee-8655-fabf500b3286\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\Internet Explorer\lsass.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\lsass.exe'" /rl HIGHEST /f1⤵PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5bb378eeb6557e9441a1b77daaf259b2d
SHA1d70dbe4af5e6f910c842bd71683bcb7e7a6b3e70
SHA2569eaab4bb7e5d22ea0c333513a0516b9535b45feeaf05cbc6714fbf8823cbcbbc
SHA5127fd54487ee6529dec1a2a50bb9d60af79c64e1f9a0aab3d0fbb1772185524cb6444a906cb3022183e17c2aa4a0897e8d2e163536c4fded5ffe742ad2b0b77bca
-
Filesize
1.3MB
MD5bb378eeb6557e9441a1b77daaf259b2d
SHA1d70dbe4af5e6f910c842bd71683bcb7e7a6b3e70
SHA2569eaab4bb7e5d22ea0c333513a0516b9535b45feeaf05cbc6714fbf8823cbcbbc
SHA5127fd54487ee6529dec1a2a50bb9d60af79c64e1f9a0aab3d0fbb1772185524cb6444a906cb3022183e17c2aa4a0897e8d2e163536c4fded5ffe742ad2b0b77bca
-
Filesize
1.3MB
MD5bb378eeb6557e9441a1b77daaf259b2d
SHA1d70dbe4af5e6f910c842bd71683bcb7e7a6b3e70
SHA2569eaab4bb7e5d22ea0c333513a0516b9535b45feeaf05cbc6714fbf8823cbcbbc
SHA5127fd54487ee6529dec1a2a50bb9d60af79c64e1f9a0aab3d0fbb1772185524cb6444a906cb3022183e17c2aa4a0897e8d2e163536c4fded5ffe742ad2b0b77bca