Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 11:44
Behavioral task
behavioral1
Sample
1a030d2d68a966877a377cf8c888115c.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1a030d2d68a966877a377cf8c888115c.exe
Resource
win10v2004-20231023-en
General
-
Target
1a030d2d68a966877a377cf8c888115c.exe
-
Size
1.1MB
-
MD5
1a030d2d68a966877a377cf8c888115c
-
SHA1
b0d0fe9953ca03954fe6951d3fda35b08a045359
-
SHA256
07fa9ac4502b2a0ba83036450abbe28d6656c8941abf5180e81650550aa50a4e
-
SHA512
9b8d1336c207f5a6b34aecd1389405012ba33abc842a32d4de40a359abfe3314224e4154221bbeffaeb18987821dc150fc9010fb9b64b39b173546d47193da1e
-
SSDEEP
24576:U2G/nvxW3Ww0tKUVvRF5tWgTkvP0fA7HD56:UbA30KUVv+gwvsfA0
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4392 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3564 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5116 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3548 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4792 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4828 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4592 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4440 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4992 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5048 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4044 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4184 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4432 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3144 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3320 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4676 3692 schtasks.exe 95 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 3692 schtasks.exe 95 -
resource yara_rule behavioral2/files/0x0007000000022cf7-10.dat dcrat behavioral2/files/0x0007000000022cf7-11.dat dcrat behavioral2/memory/3992-12-0x0000000000560000-0x0000000000636000-memory.dmp dcrat behavioral2/files/0x0006000000022d01-17.dat dcrat behavioral2/files/0x0006000000022d32-51.dat dcrat behavioral2/files/0x0006000000022d32-52.dat dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation 1a030d2d68a966877a377cf8c888115c.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation Mscomponentdhcp.exe -
Executes dropped EXE 2 IoCs
pid Process 3992 Mscomponentdhcp.exe 3588 conhost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\29c1c3cc0f7685 Mscomponentdhcp.exe File created C:\Program Files\Microsoft Office\Office16\taskhostw.exe Mscomponentdhcp.exe File created C:\Program Files (x86)\Windows Multimedia Platform\088424020bedd6 Mscomponentdhcp.exe File created C:\Program Files (x86)\Windows Multimedia Platform\0a1fd5f707cd16 Mscomponentdhcp.exe File created C:\Program Files (x86)\Windows Multimedia Platform\sppsvc.exe Mscomponentdhcp.exe File created C:\Program Files\Windows Media Player\de-DE\System.exe Mscomponentdhcp.exe File created C:\Program Files\Windows Media Player\de-DE\27d1bcfc3c54e0 Mscomponentdhcp.exe File created C:\Program Files\Windows Sidebar\Gadgets\unsecapp.exe Mscomponentdhcp.exe File created C:\Program Files\Microsoft Office\Office16\ea9f0e6c9e2dcd Mscomponentdhcp.exe File created C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe Mscomponentdhcp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Speech\Common\es-ES\RuntimeBroker.exe Mscomponentdhcp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe 2076 schtasks.exe 3144 schtasks.exe 4676 schtasks.exe 4792 schtasks.exe 1896 schtasks.exe 2112 schtasks.exe 4432 schtasks.exe 3320 schtasks.exe 4440 schtasks.exe 3052 schtasks.exe 4592 schtasks.exe 4184 schtasks.exe 4920 schtasks.exe 4828 schtasks.exe 3020 schtasks.exe 2532 schtasks.exe 3564 schtasks.exe 2596 schtasks.exe 1552 schtasks.exe 4808 schtasks.exe 5048 schtasks.exe 4044 schtasks.exe 3056 schtasks.exe 4508 schtasks.exe 1112 schtasks.exe 5028 schtasks.exe 872 schtasks.exe 2936 schtasks.exe 4988 schtasks.exe 4320 schtasks.exe 916 schtasks.exe 4992 schtasks.exe 4732 schtasks.exe 2192 schtasks.exe 3048 schtasks.exe 3548 schtasks.exe 2392 schtasks.exe 1400 schtasks.exe 1996 schtasks.exe 4392 schtasks.exe 5116 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings 1a030d2d68a966877a377cf8c888115c.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings Mscomponentdhcp.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 3992 Mscomponentdhcp.exe 3992 Mscomponentdhcp.exe 3992 Mscomponentdhcp.exe 3992 Mscomponentdhcp.exe 3992 Mscomponentdhcp.exe 3992 Mscomponentdhcp.exe 3992 Mscomponentdhcp.exe 3992 Mscomponentdhcp.exe 3588 conhost.exe 3588 conhost.exe 3588 conhost.exe 3588 conhost.exe 3588 conhost.exe 3588 conhost.exe 3588 conhost.exe 3588 conhost.exe 3588 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3588 conhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3992 Mscomponentdhcp.exe Token: SeDebugPrivilege 3588 conhost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2100 3012 1a030d2d68a966877a377cf8c888115c.exe 91 PID 3012 wrote to memory of 2100 3012 1a030d2d68a966877a377cf8c888115c.exe 91 PID 3012 wrote to memory of 2100 3012 1a030d2d68a966877a377cf8c888115c.exe 91 PID 2100 wrote to memory of 4468 2100 WScript.exe 99 PID 2100 wrote to memory of 4468 2100 WScript.exe 99 PID 2100 wrote to memory of 4468 2100 WScript.exe 99 PID 4468 wrote to memory of 3992 4468 cmd.exe 101 PID 4468 wrote to memory of 3992 4468 cmd.exe 101 PID 3992 wrote to memory of 3776 3992 Mscomponentdhcp.exe 144 PID 3992 wrote to memory of 3776 3992 Mscomponentdhcp.exe 144 PID 3776 wrote to memory of 3852 3776 cmd.exe 146 PID 3776 wrote to memory of 3852 3776 cmd.exe 146 PID 3776 wrote to memory of 3588 3776 cmd.exe 147 PID 3776 wrote to memory of 3588 3776 cmd.exe 147 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a030d2d68a966877a377cf8c888115c.exe"C:\Users\Admin\AppData\Local\Temp\1a030d2d68a966877a377cf8c888115c.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\msAgentfont\7lZlduUKZRZBZkfNKew7tkV4l.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\msAgentfont\wycqJUldl1G9TitsOOqPbv.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\msAgentfont\Mscomponentdhcp.exe"C:\msAgentfont\Mscomponentdhcp.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QWBRySn29l.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:3852
-
-
C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe"C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\odt\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\de-DE\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\de-DE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\de-DE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\odt\TextInputHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\odt\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\odt\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Libraries\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Public\Libraries\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Libraries\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\Gadgets\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Gadgets\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Sidebar\Gadgets\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office\Office16\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office16\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office\Office16\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD5c3a26c0b9b0ce9f3b31c145e52738b83
SHA12879f4807b934535cd9911b92d63b29e35abb6ef
SHA2566c2ad2d3ab11bebf0af68754a2f7da5dc9199ee7b1d13a5b6ef46d544b52723a
SHA512ac8b19325294ef22dfcfb33caeeaebf78100c464df64b230b838ee83a5996ef1b28f36e81f7a87cda9dda26bc135637738dc3e7ac6db1a3e68b8428ace6b1661
-
Filesize
829KB
MD5c3a26c0b9b0ce9f3b31c145e52738b83
SHA12879f4807b934535cd9911b92d63b29e35abb6ef
SHA2566c2ad2d3ab11bebf0af68754a2f7da5dc9199ee7b1d13a5b6ef46d544b52723a
SHA512ac8b19325294ef22dfcfb33caeeaebf78100c464df64b230b838ee83a5996ef1b28f36e81f7a87cda9dda26bc135637738dc3e7ac6db1a3e68b8428ace6b1661
-
Filesize
829KB
MD5c3a26c0b9b0ce9f3b31c145e52738b83
SHA12879f4807b934535cd9911b92d63b29e35abb6ef
SHA2566c2ad2d3ab11bebf0af68754a2f7da5dc9199ee7b1d13a5b6ef46d544b52723a
SHA512ac8b19325294ef22dfcfb33caeeaebf78100c464df64b230b838ee83a5996ef1b28f36e81f7a87cda9dda26bc135637738dc3e7ac6db1a3e68b8428ace6b1661
-
Filesize
227B
MD5bd50e69a66a943950073e751ab00b3a1
SHA1ac6b0187d5517c7eb077d7ac59aa88f0c81c3792
SHA2565dd5beb9e6f9fee59e825a46d28821e38f6ac0a11d75bbffc91216c91676e983
SHA512a8a396586914cc2803e1126050f0f028617d23de03802a1e3d6f716f2f5bc93e2ac28f28d667931d948ab882b95e81dffd60985e720e4fc5782dbc7f7ee6e8ec
-
Filesize
211B
MD56cc8bbce5319ea246e1c28be8af35250
SHA1812bb66ac1f7eb9fe1485a2e1c02caae4958054b
SHA256b7abb57921741fcad9163030c4dfcc51316dac186682d37994e390342bad318c
SHA512302bc1d85caee6e8e0f91b8cf790b7db2b99ae551930c07ef345a0bd1c73e6362a9faf87b6680b47bbb26251d4204159c3020567929b1b220d3f162d9c4003cd
-
Filesize
829KB
MD5c3a26c0b9b0ce9f3b31c145e52738b83
SHA12879f4807b934535cd9911b92d63b29e35abb6ef
SHA2566c2ad2d3ab11bebf0af68754a2f7da5dc9199ee7b1d13a5b6ef46d544b52723a
SHA512ac8b19325294ef22dfcfb33caeeaebf78100c464df64b230b838ee83a5996ef1b28f36e81f7a87cda9dda26bc135637738dc3e7ac6db1a3e68b8428ace6b1661
-
Filesize
829KB
MD5c3a26c0b9b0ce9f3b31c145e52738b83
SHA12879f4807b934535cd9911b92d63b29e35abb6ef
SHA2566c2ad2d3ab11bebf0af68754a2f7da5dc9199ee7b1d13a5b6ef46d544b52723a
SHA512ac8b19325294ef22dfcfb33caeeaebf78100c464df64b230b838ee83a5996ef1b28f36e81f7a87cda9dda26bc135637738dc3e7ac6db1a3e68b8428ace6b1661
-
Filesize
36B
MD54978f7e13658c4f051f27be121f2c19e
SHA102f183ee8c15761badc2baf12d5392689fedfb09
SHA256e9b60d2b6cfdbff864e589072556784300778f70aefd8e8eb5b51d1a1b13557a
SHA5126bfda393b93aab7c57e217bbe49af1944f284bf030b0561c4fb53ea41cff9d5c838c76cdd7a8052e40a1952184448e1f00565ca7f00b0a623fce37771877da32