Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 18:29
Behavioral task
behavioral1
Sample
NEAS.97869c1104303d30be81f74ce6fba3b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.97869c1104303d30be81f74ce6fba3b0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.97869c1104303d30be81f74ce6fba3b0.exe
-
Size
3.0MB
-
MD5
97869c1104303d30be81f74ce6fba3b0
-
SHA1
1a663d0fcaba36ba34007048f9b829ef1306662e
-
SHA256
f914dd0ae7bfd6e26b2b41ea5fd5e68a3f0bd4f3404811a29a46429b71f8205c
-
SHA512
058b48d071e67adae13ab783632f3dca73e52f22e9dafaa27a2e073dc55611c3ebb08057798b0586e61b2bcad4bf2b59262ffc7b07410e90bf4140ac89fa814c
-
SSDEEP
98304:PM0woQggbNhWxU68v4Xi3yAbFwHTE9J/i:N0gOWfackHbFJH
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 568 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3408 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3904 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4184 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 852 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3208 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 664 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1016 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 460 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4176 3604 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5048 3604 schtasks.exe 84 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.97869c1104303d30be81f74ce6fba3b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.97869c1104303d30be81f74ce6fba3b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.97869c1104303d30be81f74ce6fba3b0.exe -
resource yara_rule behavioral2/memory/4308-0-0x0000000000880000-0x0000000000B8E000-memory.dmp dcrat behavioral2/files/0x0006000000023240-42.dat dcrat behavioral2/memory/4308-88-0x000000001CA70000-0x000000001CB70000-memory.dmp dcrat behavioral2/memory/4308-97-0x000000001CA70000-0x000000001CB70000-memory.dmp dcrat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.97869c1104303d30be81f74ce6fba3b0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.97869c1104303d30be81f74ce6fba3b0.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\defaults\RuntimeBroker.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\WindowsPowerShell\Configuration\NEAS.97869c1104303d30be81f74ce6fba3b0.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\6ccacd8608530f NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\RCX57F0.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX8BDA.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files (x86)\MSBuild\886983d96e3d3e NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Idle.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\RCX6466.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\Mozilla Firefox\defaults\9e8d7a4ca61bd9 NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\7-Zip\Lang\services.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\wininit.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files (x86)\MSBuild\csrss.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\RCX8773.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files\7-Zip\Lang\services.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\NEAS.97869c1104303d30be81f74ce6fba3b0.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\WindowsPowerShell\Configuration\0dc38b6bcfd224 NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\WindowsPowerShell\Modules\fontdrvhost.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\Idle.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\WindowsPowerShell\Modules\5b884080fd4f94 NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\fontdrvhost.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\wininit.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files (x86)\MSBuild\RCX8997.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\56085415360792 NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\7-Zip\Lang\c5b4cb5e9653cc NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\RCX5F64.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Program Files\Mozilla Firefox\defaults\RuntimeBroker.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\RCX5CA4.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Program Files (x86)\MSBuild\csrss.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\appcompat\appraiser\Telemetry\dwm.exe NEAS.97869c1104303d30be81f74ce6fba3b0.exe File created C:\Windows\appcompat\appraiser\Telemetry\6cb0b6c459d5d3 NEAS.97869c1104303d30be81f74ce6fba3b0.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\RCX932F.tmp NEAS.97869c1104303d30be81f74ce6fba3b0.exe -
Creates scheduled task(s) 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3496 schtasks.exe 4956 schtasks.exe 4916 schtasks.exe 3576 schtasks.exe 1928 schtasks.exe 2904 schtasks.exe 3904 schtasks.exe 4716 schtasks.exe 1500 schtasks.exe 2884 schtasks.exe 3408 schtasks.exe 1284 schtasks.exe 3540 schtasks.exe 2688 schtasks.exe 3208 schtasks.exe 5048 schtasks.exe 1216 schtasks.exe 4976 schtasks.exe 5020 schtasks.exe 568 schtasks.exe 4184 schtasks.exe 2780 schtasks.exe 664 schtasks.exe 4176 schtasks.exe 3968 schtasks.exe 5012 schtasks.exe 4888 schtasks.exe 1328 schtasks.exe 852 schtasks.exe 4540 schtasks.exe 4768 schtasks.exe 4312 schtasks.exe 4524 schtasks.exe 2368 schtasks.exe 1016 schtasks.exe 460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4308 NEAS.97869c1104303d30be81f74ce6fba3b0.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.97869c1104303d30be81f74ce6fba3b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.97869c1104303d30be81f74ce6fba3b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.97869c1104303d30be81f74ce6fba3b0.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.97869c1104303d30be81f74ce6fba3b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.97869c1104303d30be81f74ce6fba3b0.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NEAS.97869c1104303d30be81f74ce6fba3b0N" /sc MINUTE /mo 11 /tr "'C:\Program Files\WindowsPowerShell\Configuration\NEAS.97869c1104303d30be81f74ce6fba3b0.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NEAS.97869c1104303d30be81f74ce6fba3b0" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\NEAS.97869c1104303d30be81f74ce6fba3b0.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NEAS.97869c1104303d30be81f74ce6fba3b0N" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\Configuration\NEAS.97869c1104303d30be81f74ce6fba3b0.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\WindowsPowerShell\Modules\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\Modules\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\odt\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\defaults\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Mozilla Firefox\defaults\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\MSBuild\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\MSBuild\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\Lang\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Lang\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Windows\appcompat\appraiser\Telemetry\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\appcompat\appraiser\Telemetry\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Windows\appcompat\appraiser\Telemetry\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5048
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD597869c1104303d30be81f74ce6fba3b0
SHA11a663d0fcaba36ba34007048f9b829ef1306662e
SHA256f914dd0ae7bfd6e26b2b41ea5fd5e68a3f0bd4f3404811a29a46429b71f8205c
SHA512058b48d071e67adae13ab783632f3dca73e52f22e9dafaa27a2e073dc55611c3ebb08057798b0586e61b2bcad4bf2b59262ffc7b07410e90bf4140ac89fa814c