Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 23:12
Behavioral task
behavioral1
Sample
pOIK3KqYhOU5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
pOIK3KqYhOU5.exe
Resource
win10v2004-20231215-en
General
-
Target
pOIK3KqYhOU5.exe
-
Size
1.5MB
-
MD5
78776612b260f09e939629b036c3c4a2
-
SHA1
bb671b7d0385cacc4756481df29dcc62bacfb4bb
-
SHA256
af2a0d3a997ab4aacd34c2cb383ff7572f46898035ce7b958a98df6b431591f5
-
SHA512
14714d0e3c57aa55294f274364c464464f3a74e45a2ed30daa6ea7075128c205d7a70a82c6b753526706180c1636c621068692ee372a0feacf785305116ec496
-
SSDEEP
24576:Dex5rAoPwujnJN0bArlSm/iwCU7IINgSr59bOFJjcOZCaI:D89Ak+mlWw11Ng6al
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2248 schtasks.exe 5840 schtasks.exe 5716 schtasks.exe 6124 schtasks.exe 1308 schtasks.exe 3688 schtasks.exe 772 schtasks.exe 2148 schtasks.exe 5488 schtasks.exe 3116 schtasks.exe 3872 schtasks.exe 4252 schtasks.exe 5664 schtasks.exe 3724 schtasks.exe 636 schtasks.exe File created C:\Program Files (x86)\Windows Multimedia Platform\4c0d8d4a4fc820 pOIK3KqYhOU5.exe 4540 schtasks.exe 2368 schtasks.exe 4120 schtasks.exe 5476 schtasks.exe 5784 schtasks.exe 1560 schtasks.exe 3928 schtasks.exe 4236 schtasks.exe File created C:\Program Files (x86)\Microsoft.NET\eddb19405b7ce1 pOIK3KqYhOU5.exe 2300 schtasks.exe 4972 schtasks.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\55b276f4edf653 pOIK3KqYhOU5.exe 3768 schtasks.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\9e8d7a4ca61bd9 pOIK3KqYhOU5.exe 1540 schtasks.exe 3472 schtasks.exe File created C:\Program Files\7-Zip\Lang\886983d96e3d3e pOIK3KqYhOU5.exe 1460 schtasks.exe 5684 schtasks.exe 1800 schtasks.exe 2404 schtasks.exe File created C:\Program Files\7-Zip\e6c9b481da804f pOIK3KqYhOU5.exe File created C:\Windows\Tasks\7a0fd90576e088 pOIK3KqYhOU5.exe 2332 schtasks.exe 1684 schtasks.exe 936 schtasks.exe 2172 schtasks.exe 408 schtasks.exe 1012 schtasks.exe 4160 schtasks.exe 1380 schtasks.exe 4724 schtasks.exe 4136 schtasks.exe 1492 schtasks.exe 4244 schtasks.exe 3464 schtasks.exe 5204 schtasks.exe 560 schtasks.exe 4272 schtasks.exe 2004 schtasks.exe 4812 schtasks.exe 5480 schtasks.exe 5148 schtasks.exe 3460 schtasks.exe 6120 schtasks.exe 4380 schtasks.exe File created C:\Program Files (x86)\Windows Multimedia Platform\29c1c3cc0f7685 pOIK3KqYhOU5.exe 5400 schtasks.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3536 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3104 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4136 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5108 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4724 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4404 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4272 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4396 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3472 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 636 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3136 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4244 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 368 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3724 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1308 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3428 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4972 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3768 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5408 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5204 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5840 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5148 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3724 4856 schtasks.exe 93 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 4856 schtasks.exe 93 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sppsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" sppsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" sppsvc.exe -
resource yara_rule behavioral2/memory/4544-0-0x0000000000AA0000-0x0000000000C2A000-memory.dmp dcrat behavioral2/files/0x000200000001e800-24.dat dcrat behavioral2/files/0x000700000002315c-79.dat dcrat behavioral2/files/0x000600000002313c-581.dat dcrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation pOIK3KqYhOU5.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation pOIK3KqYhOU5.exe -
Executes dropped EXE 2 IoCs
pid Process 5216 pOIK3KqYhOU5.exe 5992 sppsvc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sppsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sppsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pOIK3KqYhOU5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pOIK3KqYhOU5.exe -
Drops file in Program Files directory 52 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MSBuild\RCXD394.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\MSBuild\smss.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RCXEB3D.tmp pOIK3KqYhOU5.exe File created C:\Program Files\Windows Media Player\de-DE\66fc9ff0ee96c2 pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Microsoft.NET\backgroundTaskHost.exe pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Windows Multimedia Platform\pOIK3KqYhOU5.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCXEEF8.tmp pOIK3KqYhOU5.exe File created C:\Program Files\Windows Media Player\de-DE\sihost.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe pOIK3KqYhOU5.exe File created C:\Program Files (x86)\MSBuild\69ddcba757bf72 pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\55b276f4edf653 pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Windows Multimedia Platform\29c1c3cc0f7685 pOIK3KqYhOU5.exe File created C:\Program Files\7-Zip\Lang\csrss.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\RCXDABB.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\pOIK3KqYhOU5.exe pOIK3KqYhOU5.exe File created C:\Program Files\7-Zip\e6c9b481da804f pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\backgroundTaskHost.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files\7-Zip\RCX894.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\sihost.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files\7-Zip\Lang\csrss.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files\Windows Portable Devices\RuntimeBroker.exe pOIK3KqYhOU5.exe File created C:\Program Files (x86)\MSBuild\smss.exe pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Microsoft.NET\eddb19405b7ce1 pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCX632.tmp pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Internet Explorer\winlogon.exe pOIK3KqYhOU5.exe File created C:\Program Files\Windows Defender\csrss.exe pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe pOIK3KqYhOU5.exe File created C:\Program Files\7-Zip\OfficeClickToRun.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\RCXDC14.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files\7-Zip\RCXAA8.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCXF0F.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX1375.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX14FD.tmp pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Internet Explorer\cc11b995f2a76d pOIK3KqYhOU5.exe File created C:\Program Files\Windows Defender\886983d96e3d3e pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Internet Explorer\winlogon.exe pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\StartMenuExperienceHost.exe pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\9e8d7a4ca61bd9 pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\StartMenuExperienceHost.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCXEE1D.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCXE1.tmp pOIK3KqYhOU5.exe File opened for modification C:\Program Files\7-Zip\OfficeClickToRun.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCXEFF.tmp pOIK3KqYhOU5.exe File created C:\Program Files\Windows Portable Devices\RuntimeBroker.exe pOIK3KqYhOU5.exe File created C:\Program Files\7-Zip\Lang\886983d96e3d3e pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\MSBuild\RCXD057.tmp pOIK3KqYhOU5.exe File created C:\Program Files (x86)\Windows Multimedia Platform\4c0d8d4a4fc820 pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RCXEA71.tmp pOIK3KqYhOU5.exe File created C:\Program Files\Windows Portable Devices\9e8d7a4ca61bd9 pOIK3KqYhOU5.exe File opened for modification C:\Program Files\Windows Defender\csrss.exe pOIK3KqYhOU5.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe pOIK3KqYhOU5.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\RCXBF75.tmp pOIK3KqYhOU5.exe File opened for modification C:\Windows\Tasks\RCXBFE3.tmp pOIK3KqYhOU5.exe File created C:\Windows\appcompat\encapsulation\dllhost.exe pOIK3KqYhOU5.exe File created C:\Windows\appcompat\encapsulation\5940a34987c991 pOIK3KqYhOU5.exe File opened for modification C:\Windows\appcompat\encapsulation\dllhost.exe pOIK3KqYhOU5.exe File created C:\Windows\Tasks\explorer.exe pOIK3KqYhOU5.exe File opened for modification C:\Windows\Tasks\explorer.exe pOIK3KqYhOU5.exe File created C:\Windows\Tasks\7a0fd90576e088 pOIK3KqYhOU5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3688 schtasks.exe 3768 schtasks.exe 5148 schtasks.exe 2332 schtasks.exe 1560 schtasks.exe 5480 schtasks.exe 5204 schtasks.exe 1308 schtasks.exe 4236 schtasks.exe 368 schtasks.exe 3140 schtasks.exe 888 schtasks.exe 4980 schtasks.exe 2404 schtasks.exe 2248 schtasks.exe 3472 schtasks.exe 5400 schtasks.exe 3116 schtasks.exe 5684 schtasks.exe 1460 schtasks.exe 5716 schtasks.exe 2424 schtasks.exe 2624 schtasks.exe 2344 schtasks.exe 772 schtasks.exe 5092 schtasks.exe 3928 schtasks.exe 2820 schtasks.exe 1492 schtasks.exe 3872 schtasks.exe 2368 schtasks.exe 5108 schtasks.exe 4404 schtasks.exe 2148 schtasks.exe 936 schtasks.exe 5476 schtasks.exe 3104 schtasks.exe 1888 schtasks.exe 4244 schtasks.exe 5840 schtasks.exe 6124 schtasks.exe 4252 schtasks.exe 1976 schtasks.exe 4396 schtasks.exe 5784 schtasks.exe 4272 schtasks.exe 4380 schtasks.exe 2004 schtasks.exe 5408 schtasks.exe 5556 schtasks.exe 1380 schtasks.exe 3464 schtasks.exe 4724 schtasks.exe 1992 schtasks.exe 636 schtasks.exe 3724 schtasks.exe 2172 schtasks.exe 1012 schtasks.exe 1540 schtasks.exe 4136 schtasks.exe 3724 schtasks.exe 2300 schtasks.exe 560 schtasks.exe 2336 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings pOIK3KqYhOU5.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings pOIK3KqYhOU5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4544 pOIK3KqYhOU5.exe 4544 pOIK3KqYhOU5.exe 4544 pOIK3KqYhOU5.exe 4544 pOIK3KqYhOU5.exe 4544 pOIK3KqYhOU5.exe 4544 pOIK3KqYhOU5.exe 4544 pOIK3KqYhOU5.exe 4576 powershell.exe 4576 powershell.exe 2052 powershell.exe 2052 powershell.exe 116 powershell.exe 116 powershell.exe 3472 powershell.exe 3472 powershell.exe 4812 powershell.exe 4812 powershell.exe 3464 powershell.exe 3464 powershell.exe 3224 powershell.exe 3224 powershell.exe 392 powershell.exe 392 powershell.exe 700 powershell.exe 700 powershell.exe 3996 powershell.exe 3996 powershell.exe 2220 powershell.exe 2220 powershell.exe 672 powershell.exe 672 powershell.exe 1992 powershell.exe 1992 powershell.exe 3768 powershell.exe 3768 powershell.exe 4884 powershell.exe 4884 powershell.exe 4276 powershell.exe 4276 powershell.exe 1604 powershell.exe 1604 powershell.exe 1308 powershell.exe 1308 powershell.exe 4712 powershell.exe 4712 powershell.exe 4812 powershell.exe 116 powershell.exe 116 powershell.exe 4576 powershell.exe 4576 powershell.exe 3472 powershell.exe 3472 powershell.exe 3464 powershell.exe 2052 powershell.exe 2052 powershell.exe 4884 powershell.exe 3224 powershell.exe 2220 powershell.exe 4276 powershell.exe 392 powershell.exe 672 powershell.exe 3996 powershell.exe 700 powershell.exe 3768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 4544 pOIK3KqYhOU5.exe Token: SeDebugPrivilege 4576 powershell.exe Token: SeDebugPrivilege 2052 powershell.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 4276 powershell.exe Token: SeDebugPrivilege 116 powershell.exe Token: SeDebugPrivilege 3472 powershell.exe Token: SeDebugPrivilege 4812 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeDebugPrivilege 3224 powershell.exe Token: SeDebugPrivilege 392 powershell.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 672 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 3768 powershell.exe Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeDebugPrivilege 4712 powershell.exe Token: SeDebugPrivilege 5216 pOIK3KqYhOU5.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeDebugPrivilege 3400 powershell.exe Token: SeDebugPrivilege 4028 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 5768 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 5992 sppsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4712 4544 pOIK3KqYhOU5.exe 152 PID 4544 wrote to memory of 4712 4544 pOIK3KqYhOU5.exe 152 PID 4544 wrote to memory of 392 4544 pOIK3KqYhOU5.exe 153 PID 4544 wrote to memory of 392 4544 pOIK3KqYhOU5.exe 153 PID 4544 wrote to memory of 3464 4544 pOIK3KqYhOU5.exe 190 PID 4544 wrote to memory of 3464 4544 pOIK3KqYhOU5.exe 190 PID 4544 wrote to memory of 2412 4544 pOIK3KqYhOU5.exe 189 PID 4544 wrote to memory of 2412 4544 pOIK3KqYhOU5.exe 189 PID 4544 wrote to memory of 3224 4544 pOIK3KqYhOU5.exe 188 PID 4544 wrote to memory of 3224 4544 pOIK3KqYhOU5.exe 188 PID 4544 wrote to memory of 1308 4544 pOIK3KqYhOU5.exe 187 PID 4544 wrote to memory of 1308 4544 pOIK3KqYhOU5.exe 187 PID 4544 wrote to memory of 4576 4544 pOIK3KqYhOU5.exe 186 PID 4544 wrote to memory of 4576 4544 pOIK3KqYhOU5.exe 186 PID 4544 wrote to memory of 3472 4544 pOIK3KqYhOU5.exe 185 PID 4544 wrote to memory of 3472 4544 pOIK3KqYhOU5.exe 185 PID 4544 wrote to memory of 116 4544 pOIK3KqYhOU5.exe 154 PID 4544 wrote to memory of 116 4544 pOIK3KqYhOU5.exe 154 PID 4544 wrote to memory of 3768 4544 pOIK3KqYhOU5.exe 183 PID 4544 wrote to memory of 3768 4544 pOIK3KqYhOU5.exe 183 PID 4544 wrote to memory of 2052 4544 pOIK3KqYhOU5.exe 182 PID 4544 wrote to memory of 2052 4544 pOIK3KqYhOU5.exe 182 PID 4544 wrote to memory of 4884 4544 pOIK3KqYhOU5.exe 181 PID 4544 wrote to memory of 4884 4544 pOIK3KqYhOU5.exe 181 PID 4544 wrote to memory of 4276 4544 pOIK3KqYhOU5.exe 180 PID 4544 wrote to memory of 4276 4544 pOIK3KqYhOU5.exe 180 PID 4544 wrote to memory of 700 4544 pOIK3KqYhOU5.exe 179 PID 4544 wrote to memory of 700 4544 pOIK3KqYhOU5.exe 179 PID 4544 wrote to memory of 1992 4544 pOIK3KqYhOU5.exe 178 PID 4544 wrote to memory of 1992 4544 pOIK3KqYhOU5.exe 178 PID 4544 wrote to memory of 3996 4544 pOIK3KqYhOU5.exe 170 PID 4544 wrote to memory of 3996 4544 pOIK3KqYhOU5.exe 170 PID 4544 wrote to memory of 2220 4544 pOIK3KqYhOU5.exe 169 PID 4544 wrote to memory of 2220 4544 pOIK3KqYhOU5.exe 169 PID 4544 wrote to memory of 4812 4544 pOIK3KqYhOU5.exe 168 PID 4544 wrote to memory of 4812 4544 pOIK3KqYhOU5.exe 168 PID 4544 wrote to memory of 672 4544 pOIK3KqYhOU5.exe 163 PID 4544 wrote to memory of 672 4544 pOIK3KqYhOU5.exe 163 PID 4544 wrote to memory of 1604 4544 pOIK3KqYhOU5.exe 157 PID 4544 wrote to memory of 1604 4544 pOIK3KqYhOU5.exe 157 PID 4544 wrote to memory of 5296 4544 pOIK3KqYhOU5.exe 192 PID 4544 wrote to memory of 5296 4544 pOIK3KqYhOU5.exe 192 PID 5296 wrote to memory of 5976 5296 cmd.exe 194 PID 5296 wrote to memory of 5976 5296 cmd.exe 194 PID 5296 wrote to memory of 5216 5296 cmd.exe 196 PID 5296 wrote to memory of 5216 5296 cmd.exe 196 PID 5216 wrote to memory of 3148 5216 pOIK3KqYhOU5.exe 228 PID 5216 wrote to memory of 3148 5216 pOIK3KqYhOU5.exe 228 PID 5216 wrote to memory of 3400 5216 pOIK3KqYhOU5.exe 229 PID 5216 wrote to memory of 3400 5216 pOIK3KqYhOU5.exe 229 PID 5216 wrote to memory of 2812 5216 pOIK3KqYhOU5.exe 230 PID 5216 wrote to memory of 2812 5216 pOIK3KqYhOU5.exe 230 PID 5216 wrote to memory of 4028 5216 pOIK3KqYhOU5.exe 231 PID 5216 wrote to memory of 4028 5216 pOIK3KqYhOU5.exe 231 PID 5216 wrote to memory of 4988 5216 pOIK3KqYhOU5.exe 232 PID 5216 wrote to memory of 4988 5216 pOIK3KqYhOU5.exe 232 PID 5216 wrote to memory of 5768 5216 pOIK3KqYhOU5.exe 233 PID 5216 wrote to memory of 5768 5216 pOIK3KqYhOU5.exe 233 PID 5216 wrote to memory of 772 5216 pOIK3KqYhOU5.exe 234 PID 5216 wrote to memory of 772 5216 pOIK3KqYhOU5.exe 234 PID 5216 wrote to memory of 1784 5216 pOIK3KqYhOU5.exe 235 PID 5216 wrote to memory of 1784 5216 pOIK3KqYhOU5.exe 235 PID 5216 wrote to memory of 2400 5216 pOIK3KqYhOU5.exe 246 PID 5216 wrote to memory of 2400 5216 pOIK3KqYhOU5.exe 246 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sppsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" sppsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" sppsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pOIK3KqYhOU5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pOIK3KqYhOU5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\pOIK3KqYhOU5.exe"C:\Users\Admin\AppData\Local\Temp\pOIK3KqYhOU5.exe"1⤵
- DcRat
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\pOIK3KqYhOU5.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Tasks\explorer.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\StartMenuExperienceHost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\Lang\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\pOIK3KqYhOU5.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\OfficeClickToRun.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\RuntimeBroker.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Adobe\RuntimeBroker.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\sihost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\backgroundTaskHost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\pOIK3KqYhOU5.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Desktop\services.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\Idle.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\smss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\unsecapp.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\AccountPictures\backgroundTaskHost.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\WmiPrvSE.exe'2⤵PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\sysmon.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3cSGxVKOt0.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5296 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:5976
-
-
C:\Users\Admin\AppData\Local\Temp\pOIK3KqYhOU5.exe"C:\Users\Admin\AppData\Local\Temp\pOIK3KqYhOU5.exe"3⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\pOIK3KqYhOU5.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\conhost.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\winlogon.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender\csrss.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\sppsvc.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\smss.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\appcompat\encapsulation\dllhost.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Pictures\SearchApp.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\de-DE\sihost.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uRWOxc209p.bat"4⤵PID:6056
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:1492
-
-
C:\Recovery\WindowsRE\sppsvc.exe"C:\Recovery\WindowsRE\sppsvc.exe"5⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:5992
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Windows\Tasks\explorer.exe'" /f1⤵
- Process spawned unexpected child process
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Tasks\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:4512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\Tasks\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\odt\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
PID:3536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\odt\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\odt\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\odt\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\odt\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\odt\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Users\Public\AccountPictures\backgroundTaskHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Users\Public\AccountPictures\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\odt\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\odt\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\odt\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\StartMenuExperienceHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Desktop\services.exe'" /f1⤵
- Process spawned unexpected child process
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\Desktop\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:3136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Desktop\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pOIK3KqYhOU5p" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\pOIK3KqYhOU5.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pOIK3KqYhOU5" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\pOIK3KqYhOU5.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pOIK3KqYhOU5p" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\pOIK3KqYhOU5.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\backgroundTaskHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Adobe\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Adobe\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\7-Zip\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pOIK3KqYhOU5p" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\pOIK3KqYhOU5.exe'" /f1⤵
- Process spawned unexpected child process
PID:3428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pOIK3KqYhOU5" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\pOIK3KqYhOU5.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pOIK3KqYhOU5p" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\pOIK3KqYhOU5.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\Lang\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\Lang\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\odt\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:5716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Defender\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:6124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵PID:4076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:5684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\smss.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\All Users\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:4120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:5400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\appcompat\encapsulation\dllhost.exe'" /f1⤵
- DcRat
PID:6120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\appcompat\encapsulation\dllhost.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\appcompat\encapsulation\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:4380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Pictures\SearchApp.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:5480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Default\Pictures\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:5488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Pictures\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /f1⤵
- DcRat
PID:5664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:5476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\de-DE\sihost.exe'" /f1⤵
- Creates scheduled task(s)
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\de-DE\sihost.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:5556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\de-DE\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:5784
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57800fca2323a4130444c572374a030f4
SHA140c9b8e0e5e7d72a5293f4010f2ccf21e637b4aa
SHA25629f5645ac14353ac460858f52c856548f3aeb144b09eef672a6b4849bafe742e
SHA512c8a7ad930b8c07007c7a67d8c32a2a4a401dcc34ab966e0e80901655fcbe1f5c95b72a195e6381b1de56c2c987eeab093d8e89891bec9e9684785c5d824b3554
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD561e06aa7c42c7b2a752516bcbb242cc1
SHA102c54f8b171ef48cad21819c20b360448418a068
SHA2565bb0254e8f0220caab64dcc785f432820350471bfcdcb98240c3e0e71a709f5d
SHA51203731f49999ec895370100a4dfeee674bbe5baa50d82007256e6914c323412eef8936b320d2738774758fbbfd76d4c3d391d9e144e65587eba700d98d0362346
-
Filesize
944B
MD5f6b5bbcd2386512d0b9af775e45d3770
SHA1a3f6c4f46c10ce9d9b7d8a0a7b8a922dbbdd3d43
SHA25650adabd48c94301dd4c4338e23583a702f7626abf793e6ae2eb919a18c8db999
SHA5123775a27e3ad5a6149b88214f8bc6e45335e02af4589468ca8c140db758f152a59adf3c56361523b09c6ac2b316bd6c66886f9755a1823fc2c4468a1fad417add
-
Filesize
944B
MD563d5afdd42b24e7446787c07335bc175
SHA1df4753e97375ec706839dbe70b1c6dc828372f12
SHA2562dd056e730cbe6b12c0b3a46faf05aed1f02677924a5d2f33051f707f4dfcb12
SHA5129a7c4d23bfd5b2098649727bec531b1b3925c901ffee319f4fc58d5c4be5a0fdb2aa497c75e71128df9a3d46f4f881984257f5074db70a9f391f43b3ddba05a9
-
Filesize
944B
MD54a40b6dc9559e70af09a5466cba5abc6
SHA1d4cfd42fe9afe6c43489950849d9cd38302cb4d6
SHA256743601e30b004830c766fe094f50404ab1e82eefb07f113417c11c1b70fbf861
SHA51270387883cfdbc3ebbf46d73cc0bd9039db5fc02f48bdafb20f0f50c4c4368ddf834e2675a061e1feb3c7865d0187554e0656f5962327f28a3538b29e994f8519
-
Filesize
944B
MD5ed75df6460ae1a8159eee17daca696d6
SHA1ff117141176c4e75d67d935c7311df191e641820
SHA2569a15da41ac61a90afc18cb817c5885f3e32394257b1f3871c2141ebe5420c0cd
SHA512082b3920587dbbe1a7605017d09f64448b976f40cb97a1e027dfb10bab8521c8a69a4bbe4990346bd629e5edbde7ea82a505e1f9287399e59d0439005f494eca
-
Filesize
944B
MD576de0d381ca270b0d7daa729b8040090
SHA13aefa584da0da87c1ef7b24b5eff0fca29348f54
SHA25601768f5b8af8d74fe499a48537bf897f995ebab0ce3054c3a54fb48d2d7e7d93
SHA512c305a3a6193bef8766e90e378735b2e343fa22134c177f977a1ccd6394717b33d523071374dcca5759cf7050745d496995f0c9eed944550d44cfe7b7766e01d7
-
Filesize
215B
MD5109d65d055b141b5aa2493a5dccedded
SHA15a283823001e4ab6a67022a8d2340a66a589a1d1
SHA256c0a5f9a89c24df33325b6e6eefc5c1616c19b898d2e8de65f65fe813e06935f9
SHA5123f6450a60883bdb86d7555b867ea167797474a2f4706e9cb4fbbea801e869147bfe79e0b8db2863c8fcb41f448afa43f498de532dd877f03380a7978a1b7e128
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
512KB
MD5b42976c9dbbc1d35cc50c854b9998711
SHA1eec52085e0399b4c7cc67759d05098bad47db121
SHA256e86cedb86cb9c80c0a9f28a5822f8eaca1e413b19e7ab80a7b1d579d971438ef
SHA512b568421a0155cf8d5d2de6fab62370c5b28c7078c78bc02fe3de622456f9d3ce0de490f625ebb700b513a4b0a328589174ec0dee19342ef6a2a08e90c4c8edce
-
Filesize
197B
MD5a267c3a5e94832fc212572a79b15727a
SHA1001373ac53be602d8146728d338930f126ac859e
SHA256a35945a8b4f63e5cb66c97246aaa711bec130d1fc9c2af9f32837b014547aa0d
SHA5127acddaa6863202f37c959e5b3da93e4356bd5a11a07be3f363490606e30d6c4d837988d6aaf75ebe69ce0642a60d02fb53690c5b68afbca493292eab3d6dd8ed
-
Filesize
1.5MB
MD53fcc2cd6ab918b6b50d900e71d607dcc
SHA1817aa25b5262a3210e96376b0e9df109c966331b
SHA256ad9bbd24cfd9a512ea91dfa623d41908b520404761af2393ccb1c0dbd05fd3b3
SHA51291325ae4d213ec24283c57a918b75933e1401a5d38694f7015c14d0162ee71339be196749ba8814194bce23803010b28bb1ab69e1bb192cd4d0904a593cc82d5
-
Filesize
1.5MB
MD578776612b260f09e939629b036c3c4a2
SHA1bb671b7d0385cacc4756481df29dcc62bacfb4bb
SHA256af2a0d3a997ab4aacd34c2cb383ff7572f46898035ce7b958a98df6b431591f5
SHA51214714d0e3c57aa55294f274364c464464f3a74e45a2ed30daa6ea7075128c205d7a70a82c6b753526706180c1636c621068692ee372a0feacf785305116ec496