Analysis
-
max time kernel
332s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2023 18:18
Behavioral task
behavioral1
Sample
Expensive.exe
Resource
win10v2004-20231020-en
General
-
Target
Expensive.exe
-
Size
2.1MB
-
MD5
9127de477fcc591eea0315222e9ab353
-
SHA1
3731c238313b43c908c5c10981f6e0f35bb6593f
-
SHA256
071523576cd4bb651eeecf43780cea7dd9bcba75e00382016bc6ce9d47129c98
-
SHA512
3999391dc6dd1e2e92d2d1318ee6b2306542c0e7d2977e73130283a3b44edce8b553663e17d54eb683ddf04096006a31d8b47b430309e38f199599f6c9947023
-
SSDEEP
24576:h2G/nvxW3Wwh0hcCTp8vHOBYpTy1h1SyhGfS3l2o4nFAwODRxWcKmBN3ialREy4z:hbA3tGhcqKIJT1fsFpO/kWiaUJz
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3840 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3316 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4944 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4492 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4676 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4336 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3472 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4712 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3444 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3536 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3832 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 3360 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3888 3360 schtasks.exe 100 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe -
resource yara_rule behavioral1/files/0x0006000000022e48-10.dat dcrat behavioral1/files/0x0006000000022e48-11.dat dcrat behavioral1/memory/4164-13-0x0000000000830000-0x00000000009D6000-memory.dmp dcrat behavioral1/files/0x0006000000022e5a-39.dat dcrat behavioral1/files/0x0006000000022e7c-79.dat dcrat behavioral1/files/0x0006000000022e7c-78.dat dcrat behavioral1/files/0x0006000000022e7c-102.dat dcrat behavioral1/files/0x0006000000022e7c-109.dat dcrat behavioral1/files/0x0006000000022e78-116.dat dcrat behavioral1/files/0x0006000000022e78-117.dat dcrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation Expensive.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation SavesCommon.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation taskhostw.exe -
Executes dropped EXE 5 IoCs
pid Process 4164 SavesCommon.exe 1332 taskhostw.exe 3688 taskhostw.exe 1668 taskhostw.exe 4384 SearchApp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\6ccacd8608530f SavesCommon.exe File created C:\Program Files\WindowsPowerShell\Configuration\cmd.exe SavesCommon.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe SavesCommon.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe SavesCommon.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\conhost.exe SavesCommon.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\ea9f0e6c9e2dcd SavesCommon.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\lsass.exe SavesCommon.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\6203df4a6bafc7 SavesCommon.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\088424020bedd6 SavesCommon.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe SavesCommon.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe SavesCommon.exe File created C:\Program Files\WindowsPowerShell\Configuration\ebf1f9fa8afd6d SavesCommon.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\9e8d7a4ca61bd9 SavesCommon.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\WaaS\RuntimeBroker.exe SavesCommon.exe File created C:\Windows\Fonts\SearchApp.exe SavesCommon.exe File created C:\Windows\Fonts\38384e6a620884 SavesCommon.exe File created C:\Windows\Panther\setup.exe\backgroundTaskHost.exe SavesCommon.exe File created C:\Windows\Panther\setup.exe\eddb19405b7ce1 SavesCommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe 2384 schtasks.exe 3472 schtasks.exe 2084 schtasks.exe 2344 schtasks.exe 2080 schtasks.exe 2708 schtasks.exe 2336 schtasks.exe 4720 schtasks.exe 1288 schtasks.exe 3832 schtasks.exe 2172 schtasks.exe 4676 schtasks.exe 4712 schtasks.exe 4768 schtasks.exe 232 schtasks.exe 1508 schtasks.exe 1768 schtasks.exe 5064 schtasks.exe 4688 schtasks.exe 1592 schtasks.exe 4252 schtasks.exe 3444 schtasks.exe 3888 schtasks.exe 2852 schtasks.exe 2328 schtasks.exe 2448 schtasks.exe 2788 schtasks.exe 1256 schtasks.exe 4336 schtasks.exe 1992 schtasks.exe 4356 schtasks.exe 216 schtasks.exe 3840 schtasks.exe 1516 schtasks.exe 4944 schtasks.exe 4888 schtasks.exe 4492 schtasks.exe 4848 schtasks.exe 4900 schtasks.exe 2836 schtasks.exe 3536 schtasks.exe 3316 schtasks.exe 1108 schtasks.exe 1196 schtasks.exe 844 schtasks.exe 2192 schtasks.exe 1344 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings Expensive.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings taskhostw.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 4164 SavesCommon.exe 1332 taskhostw.exe 1332 taskhostw.exe 1332 taskhostw.exe 1332 taskhostw.exe 1332 taskhostw.exe 1332 taskhostw.exe 3688 taskhostw.exe 3688 taskhostw.exe 3688 taskhostw.exe 3688 taskhostw.exe 3688 taskhostw.exe 3688 taskhostw.exe 1668 taskhostw.exe 1668 taskhostw.exe 1668 taskhostw.exe 1668 taskhostw.exe 1668 taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4164 SavesCommon.exe Token: SeDebugPrivilege 1332 taskhostw.exe Token: SeDebugPrivilege 3688 taskhostw.exe Token: SeDebugPrivilege 1668 taskhostw.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4768 wrote to memory of 1472 4768 Expensive.exe 92 PID 4768 wrote to memory of 1472 4768 Expensive.exe 92 PID 4768 wrote to memory of 1472 4768 Expensive.exe 92 PID 1472 wrote to memory of 1404 1472 WScript.exe 94 PID 1472 wrote to memory of 1404 1472 WScript.exe 94 PID 1472 wrote to memory of 1404 1472 WScript.exe 94 PID 1404 wrote to memory of 4164 1404 cmd.exe 96 PID 1404 wrote to memory of 4164 1404 cmd.exe 96 PID 4164 wrote to memory of 1332 4164 SavesCommon.exe 152 PID 4164 wrote to memory of 1332 4164 SavesCommon.exe 152 PID 1332 wrote to memory of 4860 1332 taskhostw.exe 155 PID 1332 wrote to memory of 4860 1332 taskhostw.exe 155 PID 1332 wrote to memory of 2348 1332 taskhostw.exe 156 PID 1332 wrote to memory of 2348 1332 taskhostw.exe 156 PID 1332 wrote to memory of 964 1332 taskhostw.exe 157 PID 1332 wrote to memory of 964 1332 taskhostw.exe 157 PID 964 wrote to memory of 1760 964 cmd.exe 159 PID 964 wrote to memory of 1760 964 cmd.exe 159 PID 4860 wrote to memory of 3688 4860 WScript.exe 160 PID 4860 wrote to memory of 3688 4860 WScript.exe 160 PID 964 wrote to memory of 1668 964 cmd.exe 161 PID 964 wrote to memory of 1668 964 cmd.exe 161 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SavesCommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" taskhostw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" taskhostw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Expensive.exe"C:\Users\Admin\AppData\Local\Temp\Expensive.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\k8nUohoQkvTUGj0po2uwSdLBobMX.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\qA2M4OOY6O3ec5qA9l2THG0b.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\SavesCommon.exe"C:\Users\Admin\AppData\Roaming\surrogateproviderdriverIntoperf\SavesCommon.exe"4⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4164 -
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe"C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe"5⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1332 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\77f0f49c-7df5-4c5d-910b-068a7bb5ea0c.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe"C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe"7⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3688
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cfd875fb-4ce7-4236-8045-a3d99ba3471a.vbs"6⤵PID:2348
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sAPbyKfqpN.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe"C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe"7⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1668
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Program Files\WindowsPowerShell\Configuration\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\Configuration\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\odt\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\odt\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\odt\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\odt\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\odt\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\odt\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\SoftwareDistribution\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\All Users\SoftwareDistribution\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\SoftwareDistribution\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Windows\Fonts\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\Fonts\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Windows\Fonts\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Windows\Panther\setup.exe\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\Panther\setup.exe\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Windows\Panther\setup.exe\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\plugins\video_splitter\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\plugins\video_splitter\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\VLC\plugins\video_splitter\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\odt\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3888
-
C:\Windows\Fonts\SearchApp.exeC:\Windows\Fonts\SearchApp.exe1⤵
- Executes dropped EXE
PID:4384
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1KB
MD5c6ecc3bc2cdd7883e4f2039a5a5cf884
SHA120c9dd2a200e4b0390d490a7a76fa184bfc78151
SHA256b3d90663a46ee5333f8f99df4d43c0c76bf3902e3ba3ab36c0903027176d340d
SHA512892a8f8e50ff350e790e1543032c64b3e1c050198b1810f89b6ce8a23de947a3e8299e880f0e79da7e4b5373a6b95e7dd7814cd5d7406a1553ef104ff2ff091e
-
Filesize
753B
MD5788b8779df193fef74b4284203aaf496
SHA1c028d5f8c14ec187c40302d18050d2c12dbd21b6
SHA256dda7bea9fb6ac2144c69eb8beb623e0132e553edcb91a6e83ad2d0405b3f583b
SHA5124eeaee67e46832e0729812377ff6b8802ec92063c67c21c72f8c9b4ac3663545bc7a1269f850f3ed1b3675efab4b46153d9b8e47508560d28be19d259ed338db
-
Filesize
529B
MD5ec8c8ef4ebefea2b09d9cbfe96cd3235
SHA1d139a54407db2d252a28ebca829392223d8fca05
SHA25647b73d671f7e3f7a0f95ef97f60a77476ae00ae2cd4f5728bc2bc8fea1ce0c0d
SHA512a90cad686fc851344180edf5673239138619e56acc284544aec59177606f21fc112b865a94019664048c3d4bec048e1af6456a13466cdbe45148f7897663ace8
-
Filesize
242B
MD5ada6925cda58ba9f75397fb2c66baf61
SHA13badf9715ca52e9e520db35e441dec2ec1fddcc7
SHA2568c238cf606cef1e02c5fcd4215a18df06c8d61e0b7acf87a3dd5ded8cba4e238
SHA512a2ae69ed4c67cf28d25be3e758b1a5ae1cd053dd23a547aeb4d159c3bfe56d82c3ce2374ae73b7450fbcb7149d34d9b10b836dbbbfd8011d7bde9f1dfceb3eea
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
239B
MD5445deffc476f599610ccfbc026c5719c
SHA1ad2d330d80df0f2cb2bf9ee8e70566cd201cee04
SHA25615324a0079a4e21407a0a0211fe8daec86eddd0f6ffc44878f8c0239a4f23cde
SHA51292d38ef6d21319ec5927316943e2ef665df2a89fec9563fd85e317214322052e8f77f0027e859fcaa4d785b6be47ac9a56b99629dc487903f619d25477a9d018
-
Filesize
59B
MD5a0cf60494714328654ae0acf46d72cc0
SHA161bbcde48028567053eca470fcca76776bdc5d17
SHA256b93da684a52006130321ff31e4f0f4af96ecd5bf2bfc347b24b6a596153319a7
SHA5125fa41265ccbab182c5126c93471e18d45498378bd6d763466c278518c9e50f9c7bc31438c8cd6e9060931025c1bea942393b68428f1bdda927d7d0c216a01749
-
Filesize
1.6MB
MD5d8957e18549671aedf4dec7556d6c76e
SHA1d87b7d9e128d5c20a6274dfb7196e46d58208cc4
SHA2560f4b7a13f661f8383d2e06b45bf7403fb7068dab6bed5de593359b6852a30549
SHA512b4c3e235ae3867f220b30e7cd87bc403828c3621716e79984c68b46531a4f8976fe07b82770c1777ac677d157de0adb40c6db86b7736c9adf3bb0e454eb599e1
-
Filesize
1.6MB
MD54c52019072eb0e017b9a6575b83750bd
SHA162df1bc779fcb7afa73e94935f6a26413e490390
SHA2561f9b6f21eb91a1c0f4d51af9b2ae3b2b62240b2426fd893f188922e5c00ccfd0
SHA51298c1e57a26edb245f00483639061a169d53e003704475e0271857ac53fb2fafefac6ee18d5afa651508e1c2624e8f362c7563f28bf429e07363b5cb413697be3