Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
b067ce756638b4266dc38d81abb68af2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b067ce756638b4266dc38d81abb68af2.exe
Resource
win10v2004-20230915-en
General
-
Target
b067ce756638b4266dc38d81abb68af2.exe
-
Size
1.9MB
-
MD5
b067ce756638b4266dc38d81abb68af2
-
SHA1
a5dfa0b07ddc85b5bf3ab0a1027bb6fef3470f37
-
SHA256
5c445f99c3c151573f373b65e070381d96df9260169433a01e7a7fab04ad88fe
-
SHA512
3f49947ee3b8436a09a027496cd5e6a0ff0ae56f811d74e17b2f166f4da5cfddbf9a8d33926c8a4c228edbe53d05b6bcd1507aba064a56e31e688d91b4d677ed
-
SSDEEP
49152:qcbzAoVVRaWf4aEqGaU5XBkvRdLtkdbW0qmxKghiX:qcbx9dtxu5arZkdX1K
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4564 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1260 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4408 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 932 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4668 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4968 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3592 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4164 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4296 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4020 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2060 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3996 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3984 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3884 4896 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 4896 schtasks.exe 94 -
resource yara_rule behavioral2/memory/2416-24-0x0000000000160000-0x000000000059E000-memory.dmp dcrat behavioral2/memory/1528-80-0x0000000000750000-0x0000000000B8E000-memory.dmp dcrat behavioral2/memory/1528-82-0x0000000000750000-0x0000000000B8E000-memory.dmp dcrat behavioral2/memory/2416-85-0x0000000000160000-0x000000000059E000-memory.dmp dcrat behavioral2/memory/1528-93-0x0000000000750000-0x0000000000B8E000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation b067ce756638b4266dc38d81abb68af2.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation portwebhost_protected.exe -
Executes dropped EXE 3 IoCs
pid Process 4996 1.exe 2416 portwebhost_protected.exe 1528 unsecapp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 1528 unsecapp.exe 1528 unsecapp.exe 1528 unsecapp.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\StartMenuExperienceHost.exe portwebhost_protected.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\55b276f4edf653 portwebhost_protected.exe File created C:\Program Files\Common Files\System\StartMenuExperienceHost.exe portwebhost_protected.exe File created C:\Program Files\Common Files\System\55b276f4edf653 portwebhost_protected.exe File created C:\Program Files (x86)\Internet Explorer\images\csrss.exe portwebhost_protected.exe File created C:\Program Files (x86)\Windows Multimedia Platform\5940a34987c991 portwebhost_protected.exe File created C:\Program Files\WindowsPowerShell\Configuration\Registration\WmiPrvSE.exe portwebhost_protected.exe File created C:\Program Files\WindowsPowerShell\Configuration\Registration\24dbde2999530e portwebhost_protected.exe File created C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe portwebhost_protected.exe File created C:\Program Files (x86)\Common Files\7a0fd90576e088 portwebhost_protected.exe File created C:\Program Files\MSBuild\Microsoft\backgroundTaskHost.exe portwebhost_protected.exe File created C:\Program Files\MSBuild\Microsoft\eddb19405b7ce1 portwebhost_protected.exe File created C:\Program Files (x86)\Internet Explorer\images\886983d96e3d3e portwebhost_protected.exe File created C:\Program Files (x86)\Common Files\explorer.exe portwebhost_protected.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\schemas\Provisioning\RuntimeBroker.exe portwebhost_protected.exe File created C:\Windows\schemas\Provisioning\9e8d7a4ca61bd9 portwebhost_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 392 schtasks.exe 1692 schtasks.exe 2684 schtasks.exe 624 schtasks.exe 1628 schtasks.exe 3676 schtasks.exe 3984 schtasks.exe 2864 schtasks.exe 2500 schtasks.exe 3576 schtasks.exe 1548 schtasks.exe 2272 schtasks.exe 3592 schtasks.exe 3196 schtasks.exe 2644 schtasks.exe 2992 schtasks.exe 2068 schtasks.exe 1928 schtasks.exe 408 schtasks.exe 4776 schtasks.exe 2400 schtasks.exe 3996 schtasks.exe 4916 schtasks.exe 2016 schtasks.exe 4168 schtasks.exe 4968 schtasks.exe 4668 schtasks.exe 2024 schtasks.exe 1340 schtasks.exe 2276 schtasks.exe 4408 schtasks.exe 1260 schtasks.exe 1136 schtasks.exe 1112 schtasks.exe 2060 schtasks.exe 1752 schtasks.exe 1996 schtasks.exe 3884 schtasks.exe 4564 schtasks.exe 4164 schtasks.exe 4296 schtasks.exe 4020 schtasks.exe 2076 schtasks.exe 4160 schtasks.exe 932 schtasks.exe 1644 schtasks.exe 1744 schtasks.exe 3024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 2416 portwebhost_protected.exe 1528 unsecapp.exe 1528 unsecapp.exe 1528 unsecapp.exe 1528 unsecapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2416 portwebhost_protected.exe Token: SeDebugPrivilege 1528 unsecapp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 portwebhost_protected.exe 1528 unsecapp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4164 wrote to memory of 2176 4164 b067ce756638b4266dc38d81abb68af2.exe 88 PID 4164 wrote to memory of 2176 4164 b067ce756638b4266dc38d81abb68af2.exe 88 PID 4164 wrote to memory of 2176 4164 b067ce756638b4266dc38d81abb68af2.exe 88 PID 2176 wrote to memory of 4996 2176 cmd.exe 91 PID 2176 wrote to memory of 4996 2176 cmd.exe 91 PID 2176 wrote to memory of 4996 2176 cmd.exe 91 PID 4996 wrote to memory of 2416 4996 1.exe 92 PID 4996 wrote to memory of 2416 4996 1.exe 92 PID 4996 wrote to memory of 2416 4996 1.exe 92 PID 2416 wrote to memory of 1528 2416 portwebhost_protected.exe 149 PID 2416 wrote to memory of 1528 2416 portwebhost_protected.exe 149 PID 2416 wrote to memory of 1528 2416 portwebhost_protected.exe 149 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b067ce756638b4266dc38d81abb68af2.exe"C:\Users\Admin\AppData\Local\Temp\b067ce756638b4266dc38d81abb68af2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe -pOIUTRGROID8IRGD7GD6UG3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\portwebhost_protected.exe"C:\Users\Admin\AppData\Local\Temp\portwebhost_protected.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\odt\unsecapp.exe"C:\odt\unsecapp.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\odt\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\odt\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\odt\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\odt\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\odt\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\odt\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Program Files\MSBuild\Microsoft\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Program Files\MSBuild\Microsoft\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\images\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\images\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\images\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Registration\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\Registration\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Registration\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\odt\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\odt\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Windows\schemas\Provisioning\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\schemas\Provisioning\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\schemas\Provisioning\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\odt\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\odt\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\odt\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\System\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\System\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5485b1f288e5f5e8cf3765a001ad83b90
SHA1c7df06ea8734b550d90f810d84fd8a54c2fedaee
SHA2560267d5b9766a69fc65b9cb2ae5945bc5d42e85d9f155c8f4a15786f27ca84e95
SHA51295ccb456b58249f80fb6a5d0910bb7fd1c83734fac76be0479b238f05f7b5bfed1227656aef3287c956878d1dd6a9dceaea93b482de272aa5764088941700272
-
Filesize
1.8MB
MD5db26634068f2b0c596b1b029f1763792
SHA1883814f09c8462194ea45991e9dbdc499da14709
SHA25637b21ed3b707757ffe29f249a9a47c6729a8354ce9940c4d4a11b0bfb1d24f30
SHA5121c3c7fa7db6dbaf8585eae46b57ea12d5e16ea02b22f499bff49275102f91f09a7ccffa58f9d6adddfc39512e0e3484925c152f799cd77a6ba1118b8fecb364a
-
Filesize
1.8MB
MD5db26634068f2b0c596b1b029f1763792
SHA1883814f09c8462194ea45991e9dbdc499da14709
SHA25637b21ed3b707757ffe29f249a9a47c6729a8354ce9940c4d4a11b0bfb1d24f30
SHA5121c3c7fa7db6dbaf8585eae46b57ea12d5e16ea02b22f499bff49275102f91f09a7ccffa58f9d6adddfc39512e0e3484925c152f799cd77a6ba1118b8fecb364a
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31