Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 13:44
Behavioral task
behavioral1
Sample
f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe
Resource
win10v2004-20230915-en
General
-
Target
f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe
-
Size
2.5MB
-
MD5
e71b100ba4895671392bebdb6940b58a
-
SHA1
3f0cc8aad3fa8041b5ba40ac4c3e9d9d2d909d25
-
SHA256
f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522
-
SHA512
24d99c32e2b275aa2554225932e73c319169cbe87811ab4d08861e44a43f0e7984690e1e83200405321062680d7ec679eea7ab7d09b633700b1edcf73dc68191
-
SSDEEP
49152:UbA30JB27p9ftg4mUnKbgHns5D6RL1gVHrl+ZraG9LOgwddVyB7pe:Ub3a9fmbgMN8qLYxasqDncq
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2456 schtasks.exe 624 schtasks.exe 440 schtasks.exe 2284 schtasks.exe 2888 schtasks.exe 2716 schtasks.exe 1204 schtasks.exe 2276 schtasks.exe 772 schtasks.exe 2660 schtasks.exe 2572 schtasks.exe 1712 schtasks.exe 1192 schtasks.exe 2360 schtasks.exe 3068 schtasks.exe 2692 schtasks.exe 1652 schtasks.exe 1808 schtasks.exe 2348 schtasks.exe 1312 schtasks.exe 1652 schtasks.exe 2872 schtasks.exe 1164 schtasks.exe 276 schtasks.exe 2272 schtasks.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\69ddcba757bf72 bridgeComComponent.exe 2600 schtasks.exe File created C:\Windows\Fonts\886983d96e3d3e bridgeComComponent.exe File created C:\Program Files\Microsoft Games\More Games\es-ES\088424020bedd6 bridgeComComponent.exe File created C:\Windows\twain_32\b75386f1303e64 bridgeComComponent.exe 1800 schtasks.exe 3012 schtasks.exe 2848 schtasks.exe File created C:\Program Files (x86)\Microsoft Office\088424020bedd6 bridgeComComponent.exe 624 schtasks.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\b75386f1303e64 bridgeComComponent.exe 1052 schtasks.exe 2844 schtasks.exe 1992 schtasks.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\088424020bedd6 bridgeComComponent.exe 2676 schtasks.exe 1756 schtasks.exe 1936 schtasks.exe 1956 schtasks.exe 2908 schtasks.exe 2868 schtasks.exe 2976 schtasks.exe 1728 schtasks.exe 2984 schtasks.exe 2708 schtasks.exe 1756 schtasks.exe 3028 schtasks.exe 2408 schtasks.exe 2836 schtasks.exe 940 schtasks.exe 2280 schtasks.exe 3052 schtasks.exe 1900 schtasks.exe 1340 schtasks.exe 1644 schtasks.exe 2160 schtasks.exe 2580 schtasks.exe 2184 schtasks.exe 1200 schtasks.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1192 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 660 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 304 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 440 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 344 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 460 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2508 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1204 2508 schtasks.exe 33 -
resource yara_rule behavioral1/files/0x0007000000015c61-14.dat dcrat behavioral1/files/0x0007000000015c61-17.dat dcrat behavioral1/files/0x0007000000015c61-16.dat dcrat behavioral1/files/0x0007000000015c61-15.dat dcrat behavioral1/memory/2912-18-0x0000000000A00000-0x0000000000C38000-memory.dmp dcrat behavioral1/files/0x0007000000015dc2-31.dat dcrat behavioral1/files/0x0007000000015c61-61.dat dcrat behavioral1/memory/1464-63-0x0000000000320000-0x0000000000558000-memory.dmp dcrat behavioral1/files/0x0005000000019526-101.dat dcrat behavioral1/files/0x0005000000019526-102.dat dcrat behavioral1/memory/1624-106-0x000000001B410000-0x000000001B490000-memory.dmp dcrat -
Executes dropped EXE 3 IoCs
pid Process 2912 bridgeComComponent.exe 1464 bridgeComComponent.exe 1624 WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 2656 cmd.exe 2656 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\Windows NT\Accessories\en-US\886983d96e3d3e bridgeComComponent.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\taskhost.exe bridgeComComponent.exe File created C:\Program Files (x86)\Microsoft Office\conhost.exe bridgeComComponent.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\088424020bedd6 bridgeComComponent.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\b75386f1303e64 bridgeComComponent.exe File created C:\Program Files (x86)\Microsoft Office\088424020bedd6 bridgeComComponent.exe File created C:\Program Files\DVD Maker\b75386f1303e64 bridgeComComponent.exe File created C:\Program Files (x86)\Windows Sidebar\6cb0b6c459d5d3 bridgeComComponent.exe File created C:\Program Files\DVD Maker\taskhost.exe bridgeComComponent.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\conhost.exe bridgeComComponent.exe File created C:\Program Files\Windows NT\Accessories\en-US\csrss.exe bridgeComComponent.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\69ddcba757bf72 bridgeComComponent.exe File created C:\Program Files\Microsoft Games\More Games\es-ES\conhost.exe bridgeComComponent.exe File created C:\Program Files (x86)\Windows Sidebar\dwm.exe bridgeComComponent.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\smss.exe bridgeComComponent.exe File created C:\Program Files\Microsoft Games\More Games\es-ES\088424020bedd6 bridgeComComponent.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\AppCompat\6ccacd8608530f bridgeComComponent.exe File created C:\Windows\SoftwareDistribution\886983d96e3d3e bridgeComComponent.exe File created C:\Windows\AppCompat\Idle.exe bridgeComComponent.exe File created C:\Windows\twain_32\b75386f1303e64 bridgeComComponent.exe File created C:\Windows\Fonts\csrss.exe bridgeComComponent.exe File created C:\Windows\Fonts\886983d96e3d3e bridgeComComponent.exe File created C:\Windows\SoftwareDistribution\csrss.exe bridgeComComponent.exe File created C:\Windows\DigitalLocker\es-ES\winlogon.exe bridgeComComponent.exe File created C:\Windows\DigitalLocker\es-ES\cc11b995f2a76d bridgeComComponent.exe File created C:\Windows\twain_32\taskhost.exe bridgeComComponent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2836 schtasks.exe 2708 schtasks.exe 1884 schtasks.exe 772 schtasks.exe 2276 schtasks.exe 1992 schtasks.exe 2868 schtasks.exe 1380 schtasks.exe 2908 schtasks.exe 2184 schtasks.exe 1200 schtasks.exe 2280 schtasks.exe 940 schtasks.exe 1340 schtasks.exe 460 schtasks.exe 1712 schtasks.exe 3052 schtasks.exe 1192 schtasks.exe 660 schtasks.exe 1936 schtasks.exe 2848 schtasks.exe 2512 schtasks.exe 880 schtasks.exe 304 schtasks.exe 2924 schtasks.exe 2716 schtasks.exe 2980 schtasks.exe 2692 schtasks.exe 1900 schtasks.exe 3036 schtasks.exe 276 schtasks.exe 2236 schtasks.exe 2888 schtasks.exe 624 schtasks.exe 2408 schtasks.exe 972 schtasks.exe 2976 schtasks.exe 2872 schtasks.exe 3000 schtasks.exe 1184 schtasks.exe 1164 schtasks.exe 1956 schtasks.exe 1652 schtasks.exe 1620 schtasks.exe 2404 schtasks.exe 1808 schtasks.exe 892 schtasks.exe 2676 schtasks.exe 1204 schtasks.exe 1368 schtasks.exe 2360 schtasks.exe 2580 schtasks.exe 1624 schtasks.exe 1312 schtasks.exe 1776 schtasks.exe 440 schtasks.exe 1644 schtasks.exe 2272 schtasks.exe 3012 schtasks.exe 2456 schtasks.exe 2100 schtasks.exe 344 schtasks.exe 2996 schtasks.exe 1052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 2912 bridgeComComponent.exe 1464 bridgeComComponent.exe 1464 bridgeComComponent.exe 1464 bridgeComComponent.exe 1624 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2912 bridgeComComponent.exe Token: SeDebugPrivilege 1464 bridgeComComponent.exe Token: SeDebugPrivilege 1624 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2184 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 28 PID 2452 wrote to memory of 2184 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 28 PID 2452 wrote to memory of 2184 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 28 PID 2452 wrote to memory of 2184 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 28 PID 2452 wrote to memory of 2816 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 29 PID 2452 wrote to memory of 2816 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 29 PID 2452 wrote to memory of 2816 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 29 PID 2452 wrote to memory of 2816 2452 f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe 29 PID 2184 wrote to memory of 2656 2184 WScript.exe 30 PID 2184 wrote to memory of 2656 2184 WScript.exe 30 PID 2184 wrote to memory of 2656 2184 WScript.exe 30 PID 2184 wrote to memory of 2656 2184 WScript.exe 30 PID 2656 wrote to memory of 2912 2656 cmd.exe 32 PID 2656 wrote to memory of 2912 2656 cmd.exe 32 PID 2656 wrote to memory of 2912 2656 cmd.exe 32 PID 2656 wrote to memory of 2912 2656 cmd.exe 32 PID 2912 wrote to memory of 1488 2912 bridgeComComponent.exe 76 PID 2912 wrote to memory of 1488 2912 bridgeComComponent.exe 76 PID 2912 wrote to memory of 1488 2912 bridgeComComponent.exe 76 PID 1488 wrote to memory of 1872 1488 cmd.exe 78 PID 1488 wrote to memory of 1872 1488 cmd.exe 78 PID 1488 wrote to memory of 1872 1488 cmd.exe 78 PID 1488 wrote to memory of 1464 1488 cmd.exe 79 PID 1488 wrote to memory of 1464 1488 cmd.exe 79 PID 1488 wrote to memory of 1464 1488 cmd.exe 79 PID 1464 wrote to memory of 560 1464 bridgeComComponent.exe 126 PID 1464 wrote to memory of 560 1464 bridgeComComponent.exe 126 PID 1464 wrote to memory of 560 1464 bridgeComComponent.exe 126 PID 560 wrote to memory of 1928 560 cmd.exe 127 PID 560 wrote to memory of 1928 560 cmd.exe 127 PID 560 wrote to memory of 1928 560 cmd.exe 127 PID 560 wrote to memory of 1624 560 cmd.exe 130 PID 560 wrote to memory of 1624 560 cmd.exe 130 PID 560 wrote to memory of 1624 560 cmd.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe"C:\Users\Admin\AppData\Local\Temp\f554f85e09589b01fd0b4280b8446e4c28300e699676ca4c1a1bac3342b48522.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Webreviewcrt\ipDh6jR2mcTwtep.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Webreviewcrt\kcPcB.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Webreviewcrt\bridgeComComponent.exe"C:\Webreviewcrt\bridgeComComponent.exe"4⤵
- DcRat
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jPdVSuzNYv.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1872
-
-
C:\Webreviewcrt\bridgeComComponent.exe"C:\Webreviewcrt\bridgeComComponent.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zO3ul9mHmD.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1928
-
-
C:\Users\Default User\WmiPrvSE.exe"C:\Users\Default User\WmiPrvSE.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Webreviewcrt\file.vbs"2⤵PID:2816
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Webreviewcrt\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Webreviewcrt\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Webreviewcrt\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Games\More Games\es-ES\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\More Games\es-ES\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Games\More Games\es-ES\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Windows\twain_32\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\twain_32\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Windows\twain_32\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Sidebar\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Office\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Office\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Windows\AppCompat\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\AppCompat\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Windows\AppCompat\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files\DVD Maker\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Program Files\DVD Maker\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\de-DE\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\de-DE\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\de-DE\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\Fonts\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Fonts\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\Fonts\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Webreviewcrt\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Webreviewcrt\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Webreviewcrt\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Documents\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Videos\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\Videos\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Videos\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\SoftwareDistribution\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\SoftwareDistribution\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\Accessories\en-US\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\Accessories\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default User\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\DigitalLocker\es-ES\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\es-ES\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Windows\DigitalLocker\es-ES\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Recovery\5ccd98e2-489c-11ee-919d-62b3d3f2749b\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\5ccd98e2-489c-11ee-919d-62b3d3f2749b\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Recovery\5ccd98e2-489c-11ee-919d-62b3d3f2749b\smss.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Webreviewcrt\Idle.exe'" /f1⤵
- Creates scheduled task(s)
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Webreviewcrt\Idle.exe'" /rl HIGHEST /f1⤵PID:540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Webreviewcrt\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Idle.exe'" /f1⤵
- Creates scheduled task(s)
PID:1884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f1⤵PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f1⤵PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Webreviewcrt\WmiPrvSE.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Webreviewcrt\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Webreviewcrt\WmiPrvSE.exe'" /rl HIGHEST /f1⤵PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Creates scheduled task(s)
PID:1368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Webreviewcrt\csrss.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Webreviewcrt\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Webreviewcrt\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Cookies\WmiPrvSE.exe'" /f1⤵
- DcRat
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default\Cookies\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Cookies\WmiPrvSE.exe'" /rl HIGHEST /f1⤵PID:1776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
203B
MD5d07efab75877877a538691b284da1950
SHA1473b03888b4b81de64496ab13650ca44d0975e59
SHA2561a4c0cb612c475e8e4a4e38259d87766f092fb49406da5c3c2dec685c96c893c
SHA512ab1225a10769318514d79bc02cc8a1394066ad40be4e631968479db1d27d0e570df59633a0d34d34bb8aef08ecf309dc8f45390e5fbda2b502b80eacb3c2d4a1
-
Filesize
199B
MD580a6e70afaeac7df5e9019743e33d729
SHA19819a67870c5b6af8541121dc522ecf7b458e53c
SHA2567e6a15dd863ccdbc84bc94492158ac97bcbdbbfa17ce2a4a77c9478fb41e6d24
SHA5121c3fa03360ea8c364c2d1be8dba4d4b613228407bff3a0a587fd048152638b19c461491e6f5cbdc15ee7fb7644e73aa9c8293dcdc263cb45c45cc937c0d55a9c
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
194B
MD5fc850c6d24758438279181729066a815
SHA1f3145e372180f4116efb393aee5dd529c726fb52
SHA2560b23b06e5c8bc58f169f794bf9730566ce19ec5be3194bd38fd153493e7f6bc6
SHA5129a094a0bf414279ffe512ab2926c5bd6250ce5832534297138b468ea238355b30f1928ff062bf5f1a0bd17f97750276c7fde4eba2dda575f09df7570492362d4
-
Filesize
40B
MD55fa60759170284b04b907dede9ec02fc
SHA1a642c3173654b61888e6d523a16406201054964d
SHA256738a5ee2597722bce53cc2137b528873aee86a3b52ccc162de3ac4e8f234f99c
SHA51219ced211450f2201611f4b56ff3f29426f5173444791ddec7e87b1a32e089cffd5540c319371aa01b6fff0ee37151e41be0afb7c2923869bfda525e1edd6a585
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648
-
Filesize
2.2MB
MD53905ef3502b9ddbda1c2b244450b672a
SHA173ab0e08aae09d3248d47d387b5c971a72e46abd
SHA2568c7e3ca7aac4dde3e7716fc99e598ac064ddf35825d626047d4f0536460aee16
SHA5128cce2524b997cf9231c37f07c257238d8e0c7547a1fad8a4fa8d0c4cb0cec4276db327a200a34a15926e563e0a79df910639f3f0ec14e7a2b127f91dc975c648