Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 03:00
Behavioral task
behavioral1
Sample
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe
Resource
win10v2004-20231215-en
General
-
Target
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe
-
Size
1.9MB
-
MD5
03fd9c7c9d838f3e7d4a2e42c317b6be
-
SHA1
66976024383f4557cd20089d9621c63cbe69ef1f
-
SHA256
0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc
-
SHA512
177a7f955a5060e96279262cf2fc6a34a59535c93412b1afc8f6c51c7adad1548906d25413f6b43e944154816aba98964da203f42f71192c2ef8eaaac6c40654
-
SSDEEP
49152:tbA3D8ThjyY3Bh5m7Uqbs3Ed/v1/hTTBxjkndCV/WY:tbpThjyY3soqbsUX1/t3jknYV/F
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\", \"C:\\msref\\wininit.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\sppsvc.exe\", \"C:\\Program Files\\Windows Sidebar\\en-US\\audiodg.exe\", \"C:\\Windows\\tracing\\csrss.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\cmd.exe\", \"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\dwm.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\", \"C:\\msref\\wininit.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\", \"C:\\msref\\wininit.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\sppsvc.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\", \"C:\\msref\\wininit.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\sppsvc.exe\", \"C:\\Program Files\\Windows Sidebar\\en-US\\audiodg.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\", \"C:\\msref\\wininit.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\sppsvc.exe\", \"C:\\Program Files\\Windows Sidebar\\en-US\\audiodg.exe\", \"C:\\Windows\\tracing\\csrss.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\", \"C:\\msref\\wininit.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\sppsvc.exe\", \"C:\\Program Files\\Windows Sidebar\\en-US\\audiodg.exe\", \"C:\\Windows\\tracing\\csrss.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\cmd.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\", \"C:\\Users\\Default\\Application Data\\Idle.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\", \"C:\\Program Files\\Common Files\\Services\\winlogon.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\", \"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\", \"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\", \"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\", \"C:\\Users\\Admin\\fontreviewHost.exe\", \"C:\\msref\\wininit.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\"" fontreviewHost.exe -
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 564 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2876 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1356 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 632 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 592 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 960 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 3064 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 3064 schtasks.exe 33 -
resource yara_rule behavioral1/files/0x0007000000016c05-14.dat dcrat behavioral1/memory/2888-18-0x00000000001C0000-0x0000000000312000-memory.dmp dcrat behavioral1/memory/2576-68-0x00000000012C0000-0x0000000001412000-memory.dmp dcrat behavioral1/files/0x002d000000016578-67.dat dcrat behavioral1/memory/2576-71-0x0000000000B90000-0x0000000000C10000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2888 fontreviewHost.exe 2576 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2724 cmd.exe 2724 cmd.exe -
Adds Run key to start application 2 TTPs 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Common Files\\Services\\winlogon.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\msref\\wininit.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\sppsvc.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontreviewHost = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Users\\Admin\\Documents\\My Pictures\\audiodg.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\msref\\wininit.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\dwm.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Google\\Chrome\\Application\\SetupMetrics\\sppsvc.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\cmd.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontreviewHost = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\fontreviewHost.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontreviewHost = "\"C:\\Users\\Admin\\fontreviewHost.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\cmd.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\dwm.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files\\Windows Photo Viewer\\es-ES\\System.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\Windows Sidebar\\en-US\\audiodg.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default\\Application Data\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\tracing\\csrss.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\tracing\\csrss.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\spoolsv.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Default\\Application Data\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontreviewHost = "\"C:\\Users\\Admin\\fontreviewHost.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\Windows Sidebar\\en-US\\audiodg.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\dwm.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Common Files\\Services\\winlogon.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Idle.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\System.exe\"" fontreviewHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\\winlogon.exe\"" fontreviewHost.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\es-ES\System.exe fontreviewHost.exe File created C:\Program Files\Windows Sidebar\en-US\audiodg.exe fontreviewHost.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\cmd.exe fontreviewHost.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dwm.exe fontreviewHost.exe File created C:\Program Files\Windows Sidebar\en-US\42af1c969fbb7b fontreviewHost.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\ebf1f9fa8afd6d fontreviewHost.exe File created C:\Program Files\Common Files\Services\winlogon.exe fontreviewHost.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Idle.exe fontreviewHost.exe File created C:\Program Files (x86)\MSBuild\Microsoft\6ccacd8608530f fontreviewHost.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6cb0b6c459d5d3 fontreviewHost.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\spoolsv.exe fontreviewHost.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\f3b6ecef712a24 fontreviewHost.exe File created C:\Program Files\Common Files\Services\cc11b995f2a76d fontreviewHost.exe File created C:\Program Files\Windows Photo Viewer\es-ES\27d1bcfc3c54e0 fontreviewHost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\diagnostics\system\DeviceCenter\lsm.exe fontreviewHost.exe File created C:\Windows\tracing\csrss.exe fontreviewHost.exe File created C:\Windows\tracing\886983d96e3d3e fontreviewHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2876 schtasks.exe 2416 schtasks.exe 2028 schtasks.exe 2280 schtasks.exe 2740 schtasks.exe 1968 schtasks.exe 2748 schtasks.exe 532 schtasks.exe 1696 schtasks.exe 3052 schtasks.exe 1624 schtasks.exe 2096 schtasks.exe 1944 schtasks.exe 1212 schtasks.exe 2044 schtasks.exe 960 schtasks.exe 2928 schtasks.exe 2216 schtasks.exe 2124 schtasks.exe 2828 schtasks.exe 564 schtasks.exe 1940 schtasks.exe 920 schtasks.exe 2908 schtasks.exe 772 schtasks.exe 2968 schtasks.exe 2820 schtasks.exe 2644 schtasks.exe 592 schtasks.exe 2776 schtasks.exe 1356 schtasks.exe 588 schtasks.exe 2300 schtasks.exe 836 schtasks.exe 1688 schtasks.exe 860 schtasks.exe 2108 schtasks.exe 2020 schtasks.exe 2904 schtasks.exe 1752 schtasks.exe 2148 schtasks.exe 2320 schtasks.exe 2432 schtasks.exe 2592 schtasks.exe 1600 schtasks.exe 632 schtasks.exe 1340 schtasks.exe 1520 schtasks.exe 2144 schtasks.exe 3044 schtasks.exe 2920 schtasks.exe 1824 schtasks.exe 1608 schtasks.exe 2528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2888 fontreviewHost.exe 2888 fontreviewHost.exe 2888 fontreviewHost.exe 2888 fontreviewHost.exe 2888 fontreviewHost.exe 2888 fontreviewHost.exe 2888 fontreviewHost.exe 2576 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2888 fontreviewHost.exe Token: SeDebugPrivilege 2576 winlogon.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2668 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 28 PID 1672 wrote to memory of 2668 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 28 PID 1672 wrote to memory of 2668 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 28 PID 1672 wrote to memory of 2668 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 28 PID 1672 wrote to memory of 2792 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 29 PID 1672 wrote to memory of 2792 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 29 PID 1672 wrote to memory of 2792 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 29 PID 1672 wrote to memory of 2792 1672 0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe 29 PID 2668 wrote to memory of 2724 2668 WScript.exe 30 PID 2668 wrote to memory of 2724 2668 WScript.exe 30 PID 2668 wrote to memory of 2724 2668 WScript.exe 30 PID 2668 wrote to memory of 2724 2668 WScript.exe 30 PID 2724 wrote to memory of 2888 2724 cmd.exe 32 PID 2724 wrote to memory of 2888 2724 cmd.exe 32 PID 2724 wrote to memory of 2888 2724 cmd.exe 32 PID 2724 wrote to memory of 2888 2724 cmd.exe 32 PID 2888 wrote to memory of 2576 2888 fontreviewHost.exe 88 PID 2888 wrote to memory of 2576 2888 fontreviewHost.exe 88 PID 2888 wrote to memory of 2576 2888 fontreviewHost.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe"C:\Users\Admin\AppData\Local\Temp\0842c1cd11517bdde54e9143f4a1dc9c4a1ac387ae96f972f65d5b49337648cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\msref\16OqJ.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\msref\WEr8EqInsZG3PEmvxO6Zoo.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\msref\fontreviewHost.exe"C:\msref\fontreviewHost.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\winlogon.exe"C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\winlogon.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\msref\file.vbs"2⤵PID:2792
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\Application Data\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Application Data\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Application Data\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\Services\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Common Files\Services\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\Services\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontreviewHostf" /sc MINUTE /mo 7 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\fontreviewHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontreviewHostf" /sc MINUTE /mo 11 /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\fontreviewHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Documents\My Pictures\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Pictures\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Documents\My Pictures\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontreviewHost" /sc ONLOGON /tr "'C:\Recovery\7a4fb4e2-9ba1-11ee-8f7f-cd885a34f592\fontreviewHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontreviewHost" /sc ONLOGON /tr "'C:\Users\Admin\fontreviewHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontreviewHostf" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\fontreviewHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontreviewHostf" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\fontreviewHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\msref\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\msref\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\msref\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\en-US\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\tracing\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\tracing\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\tracing\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58b4decec6f29a0785c5fd6c191d5995a
SHA14b64d77924ef7ccd88665ef5ecb39c8a3021d657
SHA256a5ce12ae9d4b98a0f6ed5c04cd296229f76587656c989e913c81e3fea558cd23
SHA512aa35fbafc1cc019cfe4dfb4567d4a7110d3179cdbed762033a8417a20dad5f46815032025ce2ebc34f3de77317e57b6a16b7cc2792a148fa5d611e4b43e02ae7
-
Filesize
204B
MD58dc56faa119fd7cb2d6ebb11760b11aa
SHA1514a9097a27efe40016589701e155ccf5778de01
SHA256ed50861fa5d1a5e52d9e91917a03a1c0eca8d2c08231ff778b8c8540d3b5dcd8
SHA512927b73c0cb41eb3ed8289bde8296071e59011c41440c8fd6e46e7b26a125a226fe31effe856235e294d0439d4821c48272d58bf1e8e7c2eab6ba03cb1893c9f0
-
Filesize
29B
MD583e5b7bb2a52763b9c5d656d5553179e
SHA1f0588a7031ac500b4fc4fa038cdfe8733624c1dc
SHA256a0619904fb8be5d1380941ad83d000b23bd223fe0f9c6a75d166056ec2f5ac84
SHA51256a7b16ce444a3bbac9b0de2e929e869e4def5378ab044e66a253283adaeb6436e83e041090db73f80f905c9d40e80ddcfa432ef0ad85a1d076660b035244803
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
1.3MB
MD54db3230683f87082e1c24fac6f0a1304
SHA1c0c259ccf54aad4732825e00c316338f872cfd7a
SHA25612f056e68cc558dbfd426bc4bcc4d1ecb539d808caeac809431dd8a670a278f8
SHA5128ac942967c35de5a42bedba0e609e68e5af8eee10ea9ef85c1d263ced082bdad34f6ace04f3f4b4401c351f9bfbb1a55338f871013bb22f5b5afaffe4aa5ab74