Analysis

  • max time kernel
    117s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2024 13:06

General

  • Target

    EFF7B76160E2B43F723ED55925376133.exe

  • Size

    11.2MB

  • MD5

    eff7b76160e2b43f723ed55925376133

  • SHA1

    214c8c0b3d7c898e415778985d7ce11da7615da5

  • SHA256

    8c8bc051a42578631ab04380a0daef57e67abd8cf1a272e75213285929a74c5e

  • SHA512

    58cc3b35376572f6bd10a59cf24fb45a5f13f40f8052b8b7bd7d1032b7e4f9e1a4624242e6281458fd0e829df77e7410cf037ddcb1461dccedc640494e74df2a

  • SSDEEP

    196608:qW6EaHc9MZoA6Sv1A9d+EMep3MB8dNcb:563Hs5NbMe9MubY

Malware Config

Signatures

  • DcRat 64 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 63 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 11 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 4 IoCs
  • Detects Pyinstaller 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 63 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\EFF7B76160E2B43F723ED55925376133.exe
    "C:\Users\Admin\AppData\Local\Temp\EFF7B76160E2B43F723ED55925376133.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\load1.exe
      "C:\Users\Admin\AppData\Local\Temp\load1.exe"
      2⤵
      • DcRat
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ylMWwIzfwq.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          4⤵
            PID:3032
          • C:\Users\Admin\AppData\Local\Temp\load1.exe
            "C:\Users\Admin\AppData\Local\Temp\load1.exe"
            4⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2104
            • C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\schtasks.exe
              "C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\schtasks.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:964
      • C:\Users\Admin\AppData\Local\Temp\LOADERr.exe
        "C:\Users\Admin\AppData\Local\Temp\LOADERr.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Users\Admin\AppData\Local\Temp\LOADERr.exe
          "C:\Users\Admin\AppData\Local\Temp\LOADERr.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1268
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Common Files\SpeechEngines\Microsoft\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2296
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Common Files\SpeechEngines\Microsoft\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2556
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\SpeechEngines\Microsoft\spoolsv.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2112
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Windows\Registration\CRMLog\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:872
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:704
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Windows\Registration\CRMLog\winlogon.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:548
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Templates\winlogon.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1156
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Templates\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Templates\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2964
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERr" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\es-ES\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2148
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Journal\es-ES\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2816
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2548
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2792
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Windows\AppCompat\Programs\audiodg.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2216
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\AppCompat\Programs\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1924
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Windows\AppCompat\Programs\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1748
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Defender\es-ES\dwm.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2900
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\winlogon.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1244
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Journal\es-ES\LOADERr.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3004
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\es-ES\dwm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:836
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Defender\es-ES\dwm.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:636
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1460
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2108
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2352
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 6 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\LOADERr.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2960
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2336
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3044
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERr" /sc ONLOGON /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1932
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 5 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2432
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERr" /sc ONLOGON /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 14 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:436
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\es-ES\wininit.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1856
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "load1l" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\load1.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1624
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "load1l" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\load1.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2516
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 7 /tr "'C:\Users\Default\My Documents\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1708
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2424
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\spoolsv.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2528
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERr" /sc ONLOGON /tr "'C:\Users\Default\My Documents\LOADERr.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2144
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 6 /tr "'C:\Users\Default\My Documents\LOADERr.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1792
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "load1" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\load1.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:948
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\es-ES\wininit.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1360
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\es-ES\wininit.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:980
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "LOADERrL" /sc MINUTE /mo 11 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\LOADERr.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1788
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\PrintHood\schtasks.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1952
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2356
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\PrintHood\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1968
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\schtasks.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1016
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:280
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2820
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\csrss.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1416
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2520
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\7fa09f22-9ba8-11ee-8a6f-e96ea47544f1\csrss.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1672
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\schtasks.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2004
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\it-IT\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2768
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:832
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\schtasks.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1412
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Program Files\Google\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2096
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2008
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\schtasks.exe'" /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1824
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Users\Public\Libraries\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2220
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Libraries\schtasks.exe'" /rl HIGHEST /f
      1⤵
      • DcRat
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\LOADERr.exe

      Filesize

      446KB

      MD5

      7f4b3d37794c88852849a1275773007f

      SHA1

      22cbcc391c577251d2a8b1a414d08697f94faf63

      SHA256

      b26eb2e7e4ddb691ed85c36599f11dfeb2dcae2146a0c3a03131b7851298f4d5

      SHA512

      eaccf7bd8ec4c77c74cf4814135ea93b6fe28603efd11aa68c2d2f525ae2285eab7339ea26ed1c9a6f6c6695541900673d62108869c3a81218cde982f840afd6

    • C:\Users\Admin\AppData\Local\Temp\LOADERr.exe

      Filesize

      146KB

      MD5

      fc944bd172c8a5f0c3c1e0b220995d07

      SHA1

      2166526c1106a5f51889e15e03803a928adc80e5

      SHA256

      4b34c5d673d662355fd555701e08fe16c718de6fba8d84817535ebb471d3bfaa

      SHA512

      8a42acf4a673c14c69c3d2b3fe681455f62ddd16006ec0f1901eca8fcc8e4029d9af6721b671cc08a36c0db8a59210c827dabfb5cf394a82796ae175591f7ada

    • C:\Users\Admin\AppData\Local\Temp\LOADERr.exe

      Filesize

      106KB

      MD5

      fc22b2ce1040023df51684a732c75c9b

      SHA1

      49ee4477d8058cc0003443e50fa2617826d46d0a

      SHA256

      06a6a02c2eceb9baecdbdf0091ac6816e26df5d47cac6c5910917255c792c329

      SHA512

      43107536307d6762ee12ecf924b63568150f1b0e3f2d822a3d8a14a16bfcfab6bf99514e2a26f5fc779a10554b37a3a146657a8a5a29bbd91160c49884e9bdf7

    • C:\Users\Admin\AppData\Local\Temp\_MEI28402\python311.dll

      Filesize

      199KB

      MD5

      d7b8d0ba9d26c7c4f67df7d68c2ff817

      SHA1

      52cbb0aba48070a0583a1f06351ae5e5afd7ba09

      SHA256

      79ec0df543cf07b9cb60a1f1e5585f25f6bebcbd86edfa9a7394a137a0913286

      SHA512

      3b3cbaa99e42cc4e20b71c72bae6ba5ba3a39c844545571a735d240898c2c301e0ebd9369af9582ed4217ddd1110eb0b8bcc2a9b81a8ddfc2bbfc2d20606eb55

    • C:\Users\Admin\AppData\Local\Temp\load1.exe

      Filesize

      298KB

      MD5

      256be027560231bbf2fea8b9cd3bf8df

      SHA1

      a184607e1e7b945d46404f3744dd7191ec4f86d8

      SHA256

      8208bf52b6b083125f003d3f3fe43e9b7c70f85877461080b1409eaa51644203

      SHA512

      cc75fdbb3f7c4946c72bc6906c2d31198c64cecfb80c6826424a284a11ff9fab052088a2a98c1f9eb2451c9e1927823e7e64b603887faa422173c03da8cb3564

    • C:\Users\Admin\AppData\Local\Temp\load1.exe

      Filesize

      341KB

      MD5

      ddd3862cc3a805bcfb6b280742dc4562

      SHA1

      999caf62491b3c43fa9f918078f3f390ca0224f5

      SHA256

      4681e92cdf767fe003d5805757769d8604cb8395d0045f2a5cfedd0e41241891

      SHA512

      3e577781f5095a147a66f2b110eea51032a9b942a54ce7ccea89612859968c0768fe651f77fbbeab7559c42ea883c328172b11ff6add96a25620dec5cc26bb53

    • C:\Users\Admin\AppData\Local\Temp\load1.exe

      Filesize

      483KB

      MD5

      2ea1f8986470f24940c6662237bbeeaa

      SHA1

      bf263e0373343b473f8883d6f3704513994169e7

      SHA256

      6c010077644eb976933340b07d8e79b7bfa5fa133fe310293b74a4fc8ac7d1a5

      SHA512

      a357cf595f238a77dfe9d064234e97a01ec5d825f7b7bcac9946a718dd393ec3b14282194697a3b7a2da99ff2c0b10a1aae820962639172b80d992d6dc8cfe79

    • C:\Users\Admin\AppData\Local\Temp\load1.exe

      Filesize

      828KB

      MD5

      081bf291f81a3d2212e822de32d2f334

      SHA1

      48dc2be4910026979c9b59b8c1c59655d587ab6a

      SHA256

      aee979241ef4c6b80e9cf874484c6036d7423c1895fc02ae8f3f6f88802cc749

      SHA512

      dcc5ff3a93d68fe09703f868c9ce492b105c002401f204b4d63e1db5448127627d01e5338a41b929369666cdb7cba0fa15aba5f7b1775bbd8e5557dfd1a947f4

    • C:\Users\Admin\AppData\Local\Temp\ylMWwIzfwq.bat

      Filesize

      208B

      MD5

      2f939503047698516f0af69d6fb644ce

      SHA1

      46c6c42c8fa65820037ed197f6110e381eeeabc7

      SHA256

      94318fc844e86d0519be6447e2138047030750fad284e84711a7b46eae7936d7

      SHA512

      cfe835b3b7829c9cbc4a5008d303373f8ae85fcef0a28fe7064ccdec9af7981b90679fd496b426581d4ba39a3840abfc8599b6872288085c03ac2096377da3b3

    • \Users\Admin\AppData\Local\Temp\LOADERr.exe

      Filesize

      189KB

      MD5

      b20ed079c451407ba498d807cc2d24fc

      SHA1

      d66d23d1ab14ca6e418b8e661b0dd7de9b340065

      SHA256

      3484bbc4d878be9c3f8b0997dbddc43271cbce5a3146663cfa4a002599fd1dc8

      SHA512

      131ab1bd2be64323ec47201ed8f7ca6170d8ad53455bf9669dd724a4532dc437193bc23d6768095ff397ceb8c205dcf5a83a309d80690eb63b6e3e6e29ebfa44

    • \Users\Admin\AppData\Local\Temp\LOADERr.exe

      Filesize

      274KB

      MD5

      3343049ee52e67debd7076a62d7fc66e

      SHA1

      3b4fb2be07a134b269db8b203a61f93101f9e826

      SHA256

      3e3afd83db0808ad0fa5ff86fc76e06810b004accb7f2b1b6d2e0318abdf4173

      SHA512

      98edd2d27693cb45380a71dc94887ec79ccf232fbec229974a7aef5986de229a5ac904f637f2b8c0b430d43a5fdbb7feee8a2c479b5c5e8f051cff78bff8e816

    • \Users\Admin\AppData\Local\Temp\LOADERr.exe

      Filesize

      107KB

      MD5

      97bd1cbee8c4b36c5ef8a06a09b9c5c7

      SHA1

      2af451dc96428e1308c881fd79862331d7529e2d

      SHA256

      13f6612acda49c896ee24e7aee32a26a6afc0cd70102b89d9dc136bc13b05b8d

      SHA512

      628a15f4fffa4fe7868096813ae2a4f06d913e092c4d26d456ff5f044c42edffba9bf1e9e424e05e9edac5dbba513b44151fa46ca198bc8110942cdd7c6fda70

    • \Users\Admin\AppData\Local\Temp\_MEI28402\python311.dll

      Filesize

      886KB

      MD5

      640339ad845fcdd892c5ce260fe037b8

      SHA1

      307490f9e8cdc1c6ab412a5cca734f397b2da4e0

      SHA256

      dbd6735fa045b52bf0bea77be97c471ea29b786f493f7a9deaaa8aa48a95a836

      SHA512

      33581d8fec3b46039204a94fc7922f6c25561821f19fc4a8dbc11e3e14081b1946f26d1b8d2c6c6a4b5853dda2e70f2899d98de9867cffa5419025a86d9e1103

    • \Users\Admin\AppData\Local\Temp\load1.exe

      Filesize

      448KB

      MD5

      54174da5288634ac374e85ec03ea0a78

      SHA1

      e04c7f6b4aea92898ad203a4f1d86c3a0d2e0b6f

      SHA256

      f9411ba870108a1447c809ff6a5b39de325ca236a8896a638bd4fcc692cef366

      SHA512

      2a05773dd9aa08a48d862e17f34bf0068753c1d7ae4b719a6cf6cd5e86d8d206a6f3a115272e056d81319dc829ed3a4bd35d54c0134d8241039103c5282c7ef5

    • \Users\Admin\AppData\Local\Temp\load1.exe

      Filesize

      443KB

      MD5

      596905046c634159bc3b1793cd3fba82

      SHA1

      b1435bbf075f4a3de5e8a7cbc1829961e35b4a23

      SHA256

      9fb60ba0ee6fc8b2b28d761f63ae1fac5503de79e6761f821c47c669795a6667

      SHA512

      b5c86b8f57542af370fac386e7b401b9e13040c43f9d0ccadc4dea647353023ab05202e44547d52107551d47d80e9585315604766bee923e1e7c98dea5aa178d

    • memory/964-104-0x0000000000960000-0x0000000000A36000-memory.dmp

      Filesize

      856KB

    • memory/964-110-0x000000001B000000-0x000000001B080000-memory.dmp

      Filesize

      512KB

    • memory/964-108-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

      Filesize

      9.9MB

    • memory/964-107-0x000000001B000000-0x000000001B080000-memory.dmp

      Filesize

      512KB

    • memory/964-106-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

      Filesize

      9.9MB

    • memory/2104-84-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

      Filesize

      9.9MB

    • memory/2104-85-0x000000001AE10000-0x000000001AE90000-memory.dmp

      Filesize

      512KB

    • memory/2104-83-0x0000000000BD0000-0x0000000000CA6000-memory.dmp

      Filesize

      856KB

    • memory/2104-105-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

      Filesize

      9.9MB

    • memory/2260-0-0x0000000000400000-0x0000000000F2E000-memory.dmp

      Filesize

      11.2MB

    • memory/2388-32-0x0000000000920000-0x00000000009F6000-memory.dmp

      Filesize

      856KB

    • memory/2388-80-0x000007FEF5D90000-0x000007FEF677C000-memory.dmp

      Filesize

      9.9MB

    • memory/2388-35-0x000000001A6D0000-0x000000001A750000-memory.dmp

      Filesize

      512KB

    • memory/2388-34-0x000007FEF5D90000-0x000007FEF677C000-memory.dmp

      Filesize

      9.9MB