Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
b067ce756638b4266dc38d81abb68af2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b067ce756638b4266dc38d81abb68af2.exe
Resource
win10v2004-20230915-en
General
-
Target
b067ce756638b4266dc38d81abb68af2.exe
-
Size
1.9MB
-
MD5
b067ce756638b4266dc38d81abb68af2
-
SHA1
a5dfa0b07ddc85b5bf3ab0a1027bb6fef3470f37
-
SHA256
5c445f99c3c151573f373b65e070381d96df9260169433a01e7a7fab04ad88fe
-
SHA512
3f49947ee3b8436a09a027496cd5e6a0ff0ae56f811d74e17b2f166f4da5cfddbf9a8d33926c8a4c228edbe53d05b6bcd1507aba064a56e31e688d91b4d677ed
-
SSDEEP
49152:qcbzAoVVRaWf4aEqGaU5XBkvRdLtkdbW0qmxKghiX:qcbx9dtxu5arZkdX1K
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3784 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3208 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3092 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 752 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4596 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4380 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3652 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3572 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3200 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4884 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4892 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3528 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4168 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4968 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 4812 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 4812 schtasks.exe 87 -
resource yara_rule behavioral2/memory/1576-23-0x00000000007E0000-0x0000000000C1E000-memory.dmp dcrat behavioral2/memory/1576-69-0x00000000007E0000-0x0000000000C1E000-memory.dmp dcrat behavioral2/memory/1840-70-0x0000000000CE0000-0x000000000111E000-memory.dmp dcrat behavioral2/memory/1840-72-0x0000000000CE0000-0x000000000111E000-memory.dmp dcrat behavioral2/memory/1840-82-0x0000000000CE0000-0x000000000111E000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation b067ce756638b4266dc38d81abb68af2.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation portwebhost_protected.exe -
Executes dropped EXE 3 IoCs
pid Process 792 1.exe 1576 portwebhost_protected.exe 1840 services.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1840 services.exe 1840 services.exe 1840 services.exe 1840 services.exe 1840 services.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\fr-FR\29c1c3cc0f7685 portwebhost_protected.exe File created C:\Program Files\Mozilla Firefox\6203df4a6bafc7 portwebhost_protected.exe File created C:\Program Files\Windows NT\Accessories\RuntimeBroker.exe portwebhost_protected.exe File created C:\Program Files\7-Zip\Lang\e1ef82546f0b02 portwebhost_protected.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\unsecapp.exe portwebhost_protected.exe File created C:\Program Files\7-Zip\Lang\SppExtComObj.exe portwebhost_protected.exe File created C:\Program Files\Mozilla Firefox\lsass.exe portwebhost_protected.exe File created C:\Program Files\Windows NT\Accessories\9e8d7a4ca61bd9 portwebhost_protected.exe File created C:\Program Files\7-Zip\services.exe portwebhost_protected.exe File created C:\Program Files\7-Zip\c5b4cb5e9653cc portwebhost_protected.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\dllhost.exe portwebhost_protected.exe File created C:\Windows\Tasks\5940a34987c991 portwebhost_protected.exe File created C:\Windows\SchCache\taskhostw.exe portwebhost_protected.exe File created C:\Windows\SchCache\ea9f0e6c9e2dcd portwebhost_protected.exe File created C:\Windows\Setup\State\unsecapp.exe portwebhost_protected.exe File created C:\Windows\Setup\State\29c1c3cc0f7685 portwebhost_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3572 schtasks.exe 3928 schtasks.exe 1076 schtasks.exe 216 schtasks.exe 3652 schtasks.exe 684 schtasks.exe 3528 schtasks.exe 4892 schtasks.exe 2720 schtasks.exe 1688 schtasks.exe 1136 schtasks.exe 2000 schtasks.exe 4380 schtasks.exe 3016 schtasks.exe 2672 schtasks.exe 3200 schtasks.exe 4448 schtasks.exe 3208 schtasks.exe 1068 schtasks.exe 1112 schtasks.exe 4596 schtasks.exe 764 schtasks.exe 2372 schtasks.exe 4968 schtasks.exe 1104 schtasks.exe 1896 schtasks.exe 3092 schtasks.exe 4560 schtasks.exe 2996 schtasks.exe 4168 schtasks.exe 1116 schtasks.exe 1740 schtasks.exe 2608 schtasks.exe 1876 schtasks.exe 4884 schtasks.exe 4716 schtasks.exe 1476 schtasks.exe 3784 schtasks.exe 752 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1576 portwebhost_protected.exe 1840 services.exe 1840 services.exe 1840 services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 portwebhost_protected.exe Token: SeDebugPrivilege 1840 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1576 portwebhost_protected.exe 1840 services.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1840 1096 b067ce756638b4266dc38d81abb68af2.exe 88 PID 1096 wrote to memory of 1840 1096 b067ce756638b4266dc38d81abb68af2.exe 88 PID 1096 wrote to memory of 1840 1096 b067ce756638b4266dc38d81abb68af2.exe 88 PID 1840 wrote to memory of 792 1840 cmd.exe 91 PID 1840 wrote to memory of 792 1840 cmd.exe 91 PID 1840 wrote to memory of 792 1840 cmd.exe 91 PID 792 wrote to memory of 1576 792 1.exe 93 PID 792 wrote to memory of 1576 792 1.exe 93 PID 792 wrote to memory of 1576 792 1.exe 93 PID 1576 wrote to memory of 1840 1576 portwebhost_protected.exe 137 PID 1576 wrote to memory of 1840 1576 portwebhost_protected.exe 137 PID 1576 wrote to memory of 1840 1576 portwebhost_protected.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b067ce756638b4266dc38d81abb68af2.exe"C:\Users\Admin\AppData\Local\Temp\b067ce756638b4266dc38d81abb68af2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe -pOIUTRGROID8IRGD7GD6UG3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\portwebhost_protected.exe"C:\Users\Admin\AppData\Local\Temp\portwebhost_protected.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\7-Zip\services.exe"C:\Program Files\7-Zip\services.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\odt\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\7-Zip\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Windows\SchCache\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\SchCache\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Windows\SchCache\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Windows\Setup\State\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\Setup\State\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Windows\Setup\State\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\odt\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\Tasks\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Tasks\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\Tasks\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Lang\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Lang\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files\Mozilla Firefox\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Documents\My Pictures\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Pictures\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Documents\My Pictures\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\Accessories\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\Accessories\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\odt\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\odt\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\odt\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
46B
MD5485b1f288e5f5e8cf3765a001ad83b90
SHA1c7df06ea8734b550d90f810d84fd8a54c2fedaee
SHA2560267d5b9766a69fc65b9cb2ae5945bc5d42e85d9f155c8f4a15786f27ca84e95
SHA51295ccb456b58249f80fb6a5d0910bb7fd1c83734fac76be0479b238f05f7b5bfed1227656aef3287c956878d1dd6a9dceaea93b482de272aa5764088941700272
-
Filesize
1.8MB
MD5db26634068f2b0c596b1b029f1763792
SHA1883814f09c8462194ea45991e9dbdc499da14709
SHA25637b21ed3b707757ffe29f249a9a47c6729a8354ce9940c4d4a11b0bfb1d24f30
SHA5121c3c7fa7db6dbaf8585eae46b57ea12d5e16ea02b22f499bff49275102f91f09a7ccffa58f9d6adddfc39512e0e3484925c152f799cd77a6ba1118b8fecb364a
-
Filesize
1.8MB
MD5db26634068f2b0c596b1b029f1763792
SHA1883814f09c8462194ea45991e9dbdc499da14709
SHA25637b21ed3b707757ffe29f249a9a47c6729a8354ce9940c4d4a11b0bfb1d24f30
SHA5121c3c7fa7db6dbaf8585eae46b57ea12d5e16ea02b22f499bff49275102f91f09a7ccffa58f9d6adddfc39512e0e3484925c152f799cd77a6ba1118b8fecb364a
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31
-
Filesize
1.5MB
MD5f65cc7ac632006f36da65555ac55ce83
SHA159ab98b973cf37f5aa096b65677f282d24382e64
SHA256f72ec7b3eaf3112713d6d77c7256a25d777d4794a0daa3b864855b68bbf40a5e
SHA5124a10a9b8d1dba01a0dc284c8c3f6c396e3632931fa188c1c6b74dd92d46ab1958b8d09e621fc1461ace4e2ce84c7b9be4e3e6f006dc35647b39b668b02b47e31