Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
B4E04DE4587E063DB108E9EB85C7203C.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
B4E04DE4587E063DB108E9EB85C7203C.exe
Resource
win10v2004-20231215-en
General
-
Target
B4E04DE4587E063DB108E9EB85C7203C.exe
-
Size
1.5MB
-
MD5
b4e04de4587e063db108e9eb85c7203c
-
SHA1
f557073fe11b2cb1a41ad8336ef58bead962b80f
-
SHA256
1bd1ae392a1cad614831e936fb8783abdcdbe7de3b39e069ae008670342b0854
-
SHA512
2a6340c2ea662519b9a6cb75fb8188048232fea2ee0ad1b4107a19ae2473cec194923041e0c165a0cc0de4a22d4b6c4e6781f65f91b9b8a02946a91a6d9b43c2
-
SSDEEP
24576:1ZX3kGr+WWpXwbTusB9cmbcgE+qhBXLM8y5f16ODj2+4w77QAO/gUm3FYrrZmXe:HnRr+/XB6G+sLQ1l9XUm3yxB
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3184 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3628 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1236 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3972 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3704 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3376 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3088 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3320 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3200 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 768 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4308 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3988 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4684 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3328 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4836 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4068 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 1856 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 1856 schtasks.exe 89 -
resource yara_rule behavioral2/memory/4412-2-0x0000000000030000-0x000000000046C000-memory.dmp dcrat behavioral2/memory/4412-58-0x0000000000030000-0x000000000046C000-memory.dmp dcrat behavioral2/memory/3776-60-0x0000000000710000-0x0000000000B4C000-memory.dmp dcrat behavioral2/memory/3776-62-0x0000000000710000-0x0000000000B4C000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation B4E04DE4587E063DB108E9EB85C7203C.exe -
Executes dropped EXE 1 IoCs
pid Process 3776 RuntimeBroker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File created C:\Program Files\Windows Multimedia Platform\cc11b995f2a76d B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\9e8d7a4ca61bd9 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\WindowsPowerShell\Configuration\Schema\ee2ad38f3d4382 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\56085415360792 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Windows Mail\f3b6ecef712a24 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\9e8d7a4ca61bd9 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Windows Mail\OfficeClickToRun.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Windows Multimedia Platform\winlogon.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\7-Zip\Lang\lsass.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\RuntimeBroker.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\wininit.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Windows Mail\e6c9b481da804f B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Windows Mail\spoolsv.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files (x86)\Internet Explorer\en-US\spoolsv.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Java\jdk-1.8\bin\lsass.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Java\jdk-1.8\bin\6203df4a6bafc7 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\RuntimeBroker.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\WindowsPowerShell\Configuration\Schema\Registry.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files (x86)\Internet Explorer\en-US\f3b6ecef712a24 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\7-Zip\Lang\6203df4a6bafc7 B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Microsoft Office 15\ClientX64\csrss.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Program Files\Microsoft Office 15\ClientX64\886983d96e3d3e B4E04DE4587E063DB108E9EB85C7203C.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.WSMan.Man#\a58e7ee3da68f0652eb20fee5787ba4b\taskhostw.exe B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.WSMan.Man#\a58e7ee3da68f0652eb20fee5787ba4b\ea9f0e6c9e2dcd B4E04DE4587E063DB108E9EB85C7203C.exe File created C:\Windows\CSC\MusNotification.exe B4E04DE4587E063DB108E9EB85C7203C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2452 schtasks.exe 2736 schtasks.exe 1580 schtasks.exe 1324 schtasks.exe 3012 schtasks.exe 4464 schtasks.exe 5052 schtasks.exe 1100 schtasks.exe 2108 schtasks.exe 5092 schtasks.exe 936 schtasks.exe 3184 schtasks.exe 3704 schtasks.exe 4908 schtasks.exe 1144 schtasks.exe 2300 schtasks.exe 3988 schtasks.exe 4984 schtasks.exe 2688 schtasks.exe 4752 schtasks.exe 1948 schtasks.exe 4068 schtasks.exe 1896 schtasks.exe 832 schtasks.exe 2980 schtasks.exe 3320 schtasks.exe 768 schtasks.exe 2120 schtasks.exe 2204 schtasks.exe 1232 schtasks.exe 3200 schtasks.exe 4308 schtasks.exe 2236 schtasks.exe 4568 schtasks.exe 3328 schtasks.exe 1876 schtasks.exe 2644 schtasks.exe 4416 schtasks.exe 4836 schtasks.exe 3216 schtasks.exe 3376 schtasks.exe 4684 schtasks.exe 3628 schtasks.exe 1236 schtasks.exe 3972 schtasks.exe 3096 schtasks.exe 1416 schtasks.exe 1112 schtasks.exe 4560 schtasks.exe 3748 schtasks.exe 1636 schtasks.exe 3088 schtasks.exe 1632 schtasks.exe 3460 schtasks.exe 216 schtasks.exe 5100 schtasks.exe 1520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe 3776 RuntimeBroker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3776 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4412 B4E04DE4587E063DB108E9EB85C7203C.exe Token: SeDebugPrivilege 3776 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 3776 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4412 wrote to memory of 3776 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 147 PID 4412 wrote to memory of 3776 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 147 PID 4412 wrote to memory of 3776 4412 B4E04DE4587E063DB108E9EB85C7203C.exe 147 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\B4E04DE4587E063DB108E9EB85C7203C.exe"C:\Users\Admin\AppData\Local\Temp\B4E04DE4587E063DB108E9EB85C7203C.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Internet Explorer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Internet Explorer\de-DE\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3776
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\PrintHood\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\PrintHood\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\odt\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jdk-1.8\bin\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\bin\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\jdk-1.8\bin\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Mail\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Local Settings\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Default\Local Settings\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Local Settings\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Schema\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Configuration\Schema\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files\WindowsPowerShell\Configuration\Schema\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.WSMan.Man#\a58e7ee3da68f0652eb20fee5787ba4b\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.WSMan.Man#\a58e7ee3da68f0652eb20fee5787ba4b\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.WSMan.Man#\a58e7ee3da68f0652eb20fee5787ba4b\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\en-US\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Mail\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Multimedia Platform\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD55176d756c09ffb1461f32e5dde8cd6f0
SHA15cbc3a5b99a1a699ccd5d836f24c37be823f3f7c
SHA256045ab24b718a68f4e32ed01a1534a3ffb1e5c0b12e0d46235b77292835e17db1
SHA512587e28583451dec131b4ade3a5af1c21daeeb2c6b7951f4b2e812886be203fd48b1fd01f8f162a031aeae64b664dabc47a059cfb10a475b34b05d2a934eabf87
-
Filesize
1.5MB
MD5b4e04de4587e063db108e9eb85c7203c
SHA1f557073fe11b2cb1a41ad8336ef58bead962b80f
SHA2561bd1ae392a1cad614831e936fb8783abdcdbe7de3b39e069ae008670342b0854
SHA5122a6340c2ea662519b9a6cb75fb8188048232fea2ee0ad1b4107a19ae2473cec194923041e0c165a0cc0de4a22d4b6c4e6781f65f91b9b8a02946a91a6d9b43c2