Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 16:40
Behavioral task
behavioral1
Sample
2e3ffb5f7fbeb7a61469de81dc14d064.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2e3ffb5f7fbeb7a61469de81dc14d064.exe
Resource
win10v2004-20230703-en
General
-
Target
2e3ffb5f7fbeb7a61469de81dc14d064.exe
-
Size
2.7MB
-
MD5
2e3ffb5f7fbeb7a61469de81dc14d064
-
SHA1
9d153b840d6c9b2df768252086db867a8d910adc
-
SHA256
247fb8446c5648499cbcba01cda9e97ce5daad8398343dc239f234465fc8a1e3
-
SHA512
4c4dc0160eddb055a9455f5a9f8efce41551d7f148fbdac9262b92d01a3a24a487b961130fde374ce7040ca1adc270c7d119205766caceb21e3b8eeb1833c9c3
-
SSDEEP
49152:UbA30UK6G4e3r8dh03amztNBDLTAOGqrXkAS+iIHLlDbDCXj63:Ub4/G94dmKmt/MoQASwbDec
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\", \"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\Icons\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Windows\\TAPI\\lsass.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\", \"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\Icons\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Windows\\TAPI\\lsass.exe\", \"C:\\Windows\\L2Schemas\\Idle.exe\", \"C:\\Program Files\\Windows NT\\TableTextService\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\", \"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\Icons\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\", \"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\Icons\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Windows\\TAPI\\lsass.exe\", \"C:\\Windows\\L2Schemas\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\", \"C:\\Program Files\\Common Files\\Services\\Idle.exe\", \"C:\\Windows\\Downloaded Program Files\\audiodg.exe\", \"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\", \"C:\\ComponentWebSvc\\services.exe\", \"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\", \"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\", \"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\Icons\\audiodg.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\twain_32\\services.exe\", \"C:\\ComponentWebSvc\\explorer.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\", \"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\"" Componentruntime.exe -
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1472 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 812 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1772 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 312 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1208 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 1984 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 1984 schtasks.exe 33 -
resource yara_rule behavioral1/files/0x0007000000015da4-68.dat dcrat behavioral1/files/0x0007000000015da4-69.dat dcrat behavioral1/files/0x0007000000015da4-71.dat dcrat behavioral1/files/0x0007000000015da4-70.dat dcrat behavioral1/memory/3032-72-0x0000000000A10000-0x0000000000C7C000-memory.dmp dcrat behavioral1/memory/3032-74-0x000000001B110000-0x000000001B190000-memory.dmp dcrat behavioral1/files/0x000600000001643f-92.dat dcrat behavioral1/files/0x0007000000016256-128.dat dcrat behavioral1/files/0x0007000000016256-129.dat dcrat behavioral1/memory/2520-130-0x0000000000BD0000-0x0000000000E3C000-memory.dmp dcrat behavioral1/memory/2520-132-0x000000001B0C0000-0x000000001B140000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 3032 Componentruntime.exe 2520 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2816 cmd.exe 2816 cmd.exe -
Adds Run key to start application 2 TTPs 34 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\Common Files\\Services\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\Icons\\audiodg.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\Windows NT\\TableTextService\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\Windows NT\\TableTextService\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\ComponentWebSvc\\explorer.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\ComponentWebSvc\\services.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\twain_32\\services.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\updates\\308046B0AF4A39CB\\smss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\TAPI\\lsass.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\Prefetch\\ReadyBoot\\wininit.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\ComponentWebSvc\\services.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\ServiceProfiles\\LocalService\\Saved Games\\lsm.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\TAPI\\lsass.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\L2Schemas\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\csrss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\Common Files\\Services\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Windows\\Downloaded Program Files\\audiodg.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\8ecc50a2-20ee-11ee-a805-d66763f08456\\smss.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Windows\\Downloaded Program Files\\audiodg.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\Icons\\audiodg.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\taskhost.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\L2Schemas\\Idle.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\twain_32\\services.exe\"" Componentruntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\ComponentWebSvc\\explorer.exe\"" Componentruntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Windows Media Player\\en-US\\sppsvc.exe\"" Componentruntime.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\Common Files\Services\Idle.exe Componentruntime.exe File created C:\Program Files\Common Files\Services\6ccacd8608530f Componentruntime.exe File created C:\Program Files\Windows Media Player\en-US\sppsvc.exe Componentruntime.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\42af1c969fbb7b Componentruntime.exe File created C:\Program Files\Windows NT\TableTextService\Idle.exe Componentruntime.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\csrss.exe Componentruntime.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\886983d96e3d3e Componentruntime.exe File created C:\Program Files\Windows NT\TableTextService\6ccacd8608530f Componentruntime.exe File created C:\Program Files\Windows Media Player\en-US\0a1fd5f707cd16 Componentruntime.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\audiodg.exe Componentruntime.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\L2Schemas\Idle.exe Componentruntime.exe File created C:\Windows\L2Schemas\6ccacd8608530f Componentruntime.exe File created C:\Windows\twain_32\c5b4cb5e9653cc Componentruntime.exe File created C:\Windows\TAPI\lsass.exe Componentruntime.exe File created C:\Windows\Downloaded Program Files\audiodg.exe Componentruntime.exe File created C:\Windows\Downloaded Program Files\42af1c969fbb7b Componentruntime.exe File created C:\Windows\Prefetch\ReadyBoot\wininit.exe Componentruntime.exe File created C:\Windows\Prefetch\ReadyBoot\56085415360792 Componentruntime.exe File created C:\Windows\ServiceProfiles\LocalService\Saved Games\lsm.exe Componentruntime.exe File created C:\Windows\ServiceProfiles\LocalService\Saved Games\101b941d020240 Componentruntime.exe File created C:\Windows\twain_32\services.exe Componentruntime.exe File opened for modification C:\Windows\twain_32\services.exe Componentruntime.exe File created C:\Windows\TAPI\6203df4a6bafc7 Componentruntime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe 2984 schtasks.exe 1772 schtasks.exe 2488 schtasks.exe 2044 schtasks.exe 1592 schtasks.exe 2800 schtasks.exe 2052 schtasks.exe 2804 schtasks.exe 2376 schtasks.exe 2096 schtasks.exe 1088 schtasks.exe 1996 schtasks.exe 1472 schtasks.exe 1328 schtasks.exe 1980 schtasks.exe 956 schtasks.exe 2664 schtasks.exe 2400 schtasks.exe 1912 schtasks.exe 812 schtasks.exe 2976 schtasks.exe 588 schtasks.exe 524 schtasks.exe 1740 schtasks.exe 2424 schtasks.exe 2672 schtasks.exe 2648 schtasks.exe 2188 schtasks.exe 2008 schtasks.exe 2080 schtasks.exe 680 schtasks.exe 1208 schtasks.exe 1708 schtasks.exe 776 schtasks.exe 1396 schtasks.exe 2700 schtasks.exe 2560 schtasks.exe 1728 schtasks.exe 2028 schtasks.exe 312 schtasks.exe 1732 schtasks.exe 2084 schtasks.exe 1316 schtasks.exe 2152 schtasks.exe 2180 schtasks.exe 2996 schtasks.exe 2532 schtasks.exe 3020 schtasks.exe 1056 schtasks.exe 1908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 3032 Componentruntime.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe 2520 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3032 Componentruntime.exe Token: SeDebugPrivilege 2520 explorer.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2520 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 28 PID 1952 wrote to memory of 2520 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 28 PID 1952 wrote to memory of 2520 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 28 PID 1952 wrote to memory of 2520 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 28 PID 1952 wrote to memory of 876 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 29 PID 1952 wrote to memory of 876 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 29 PID 1952 wrote to memory of 876 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 29 PID 1952 wrote to memory of 876 1952 2e3ffb5f7fbeb7a61469de81dc14d064.exe 29 PID 2520 wrote to memory of 2816 2520 WScript.exe 30 PID 2520 wrote to memory of 2816 2520 WScript.exe 30 PID 2520 wrote to memory of 2816 2520 WScript.exe 30 PID 2520 wrote to memory of 2816 2520 WScript.exe 30 PID 2816 wrote to memory of 3032 2816 cmd.exe 32 PID 2816 wrote to memory of 3032 2816 cmd.exe 32 PID 2816 wrote to memory of 3032 2816 cmd.exe 32 PID 2816 wrote to memory of 3032 2816 cmd.exe 32 PID 3032 wrote to memory of 2924 3032 Componentruntime.exe 85 PID 3032 wrote to memory of 2924 3032 Componentruntime.exe 85 PID 3032 wrote to memory of 2924 3032 Componentruntime.exe 85 PID 2924 wrote to memory of 2968 2924 cmd.exe 87 PID 2924 wrote to memory of 2968 2924 cmd.exe 87 PID 2924 wrote to memory of 2968 2924 cmd.exe 87 PID 2924 wrote to memory of 2520 2924 cmd.exe 88 PID 2924 wrote to memory of 2520 2924 cmd.exe 88 PID 2924 wrote to memory of 2520 2924 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e3ffb5f7fbeb7a61469de81dc14d064.exe"C:\Users\Admin\AppData\Local\Temp\2e3ffb5f7fbeb7a61469de81dc14d064.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComponentWebSvc\dnFW74Kzw603.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ComponentWebSvc\4ZTbrMkez5.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\ComponentWebSvc\Componentruntime.exe"C:\ComponentWebSvc\Componentruntime.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TgOHkLI5vF.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2968
-
-
C:\ComponentWebSvc\explorer.exe"C:\ComponentWebSvc\explorer.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComponentWebSvc\file.vbs"2⤵PID:876
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Windows\twain_32\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\twain_32\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Windows\twain_32\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\ComponentWebSvc\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\ComponentWebSvc\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\ComponentWebSvc\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Recovery\8ecc50a2-20ee-11ee-a805-d66763f08456\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\8ecc50a2-20ee-11ee-a805-d66763f08456\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\8ecc50a2-20ee-11ee-a805-d66763f08456\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\Services\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Common Files\Services\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\Services\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Windows\Downloaded Program Files\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\Downloaded Program Files\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Windows\Prefetch\ReadyBoot\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Prefetch\ReadyBoot\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\Prefetch\ReadyBoot\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\ComponentWebSvc\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\ComponentWebSvc\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\ComponentWebSvc\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Windows\ServiceProfiles\LocalService\Saved Games\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\LocalService\Saved Games\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Windows\ServiceProfiles\LocalService\Saved Games\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\en-US\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\en-US\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\en-US\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Windows\TAPI\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\TAPI\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\TAPI\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Windows\L2Schemas\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\L2Schemas\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Windows\L2Schemas\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows NT\TableTextService\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\TableTextService\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41B
MD5f2a92cda1e56df588a3d30bc691e2f90
SHA1a7365408d901d997fb85f675e72d24365a2d5a5d
SHA256700925fccc92f0993b3f5226794279d70702c983249a1a27b49bdbdf9565c22e
SHA512ae68e657e28650a1b59926d381f08e9e4c62a673ed445c4d4d4a4a85970f6e61d6b5b250980c62e9a12d2475c3f23d5532db2c6d98f672d0196df67b8525626c
-
Filesize
2.4MB
MD5c96ab99f9e455ca8998df8b93a0d0ec2
SHA13be467577bf802731e0900f3e32fbb2747a23b84
SHA2568486f68dd9c504e332a32bbd92b474cb2b9593dce6f7484a922ae7b9500d828c
SHA512d4cd5ff82e14dbda8692e760fc5d768951d3bc4f7892b9633046f6a0d881de9f143901563fc7b9fe164990151c121898191fe749c9e8250366a45b9606318885
-
Filesize
2.4MB
MD5c96ab99f9e455ca8998df8b93a0d0ec2
SHA13be467577bf802731e0900f3e32fbb2747a23b84
SHA2568486f68dd9c504e332a32bbd92b474cb2b9593dce6f7484a922ae7b9500d828c
SHA512d4cd5ff82e14dbda8692e760fc5d768951d3bc4f7892b9633046f6a0d881de9f143901563fc7b9fe164990151c121898191fe749c9e8250366a45b9606318885
-
Filesize
202B
MD5d24d8ce4b1ef38e575a7926863890612
SHA1158cc0e501359b687e85550d408f08491f7559d2
SHA25666dc9d6eadaff46e3bdb9aa46b5352e4b981526dc0bbde3ccc2668e3b9a5944a
SHA512d191727338eb23f698257062679985e945866e03eb882745114ee56d8a48d1004b4ad785d180a06c604955e6d2b997bcf121569c9a195c3f6431c75e9871353b
-
Filesize
2.4MB
MD5c96ab99f9e455ca8998df8b93a0d0ec2
SHA13be467577bf802731e0900f3e32fbb2747a23b84
SHA2568486f68dd9c504e332a32bbd92b474cb2b9593dce6f7484a922ae7b9500d828c
SHA512d4cd5ff82e14dbda8692e760fc5d768951d3bc4f7892b9633046f6a0d881de9f143901563fc7b9fe164990151c121898191fe749c9e8250366a45b9606318885
-
Filesize
2.4MB
MD5c96ab99f9e455ca8998df8b93a0d0ec2
SHA13be467577bf802731e0900f3e32fbb2747a23b84
SHA2568486f68dd9c504e332a32bbd92b474cb2b9593dce6f7484a922ae7b9500d828c
SHA512d4cd5ff82e14dbda8692e760fc5d768951d3bc4f7892b9633046f6a0d881de9f143901563fc7b9fe164990151c121898191fe749c9e8250366a45b9606318885
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
2.4MB
MD5c96ab99f9e455ca8998df8b93a0d0ec2
SHA13be467577bf802731e0900f3e32fbb2747a23b84
SHA2568486f68dd9c504e332a32bbd92b474cb2b9593dce6f7484a922ae7b9500d828c
SHA512d4cd5ff82e14dbda8692e760fc5d768951d3bc4f7892b9633046f6a0d881de9f143901563fc7b9fe164990151c121898191fe749c9e8250366a45b9606318885
-
Filesize
196B
MD5a8986f96fe0c3414a14402c18635bf20
SHA1c683473f2e1181693eeb1a1e328d92fc612dd1e8
SHA25643bd5d4fe85d284f311f88c6de1e6a5460acbe287d91983a01ce05f52787e9be
SHA512a821f31fd90f321dc1315db41ff3abc6b1d6c5dad8da72b69a6e2c7222fef772e3f8a2bb4f6e140f8f97901b62fc268f656fd836a28b7d2748127df898a696ff
-
Filesize
2.4MB
MD5c96ab99f9e455ca8998df8b93a0d0ec2
SHA13be467577bf802731e0900f3e32fbb2747a23b84
SHA2568486f68dd9c504e332a32bbd92b474cb2b9593dce6f7484a922ae7b9500d828c
SHA512d4cd5ff82e14dbda8692e760fc5d768951d3bc4f7892b9633046f6a0d881de9f143901563fc7b9fe164990151c121898191fe749c9e8250366a45b9606318885
-
Filesize
2.4MB
MD5c96ab99f9e455ca8998df8b93a0d0ec2
SHA13be467577bf802731e0900f3e32fbb2747a23b84
SHA2568486f68dd9c504e332a32bbd92b474cb2b9593dce6f7484a922ae7b9500d828c
SHA512d4cd5ff82e14dbda8692e760fc5d768951d3bc4f7892b9633046f6a0d881de9f143901563fc7b9fe164990151c121898191fe749c9e8250366a45b9606318885