Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
1d6590415fa189e9c982e883dc3bcdde.exe
Resource
win7-20240221-en
General
-
Target
1d6590415fa189e9c982e883dc3bcdde.exe
-
Size
3.3MB
-
MD5
1d6590415fa189e9c982e883dc3bcdde
-
SHA1
8261a5718af6eb9ebee4e822e5bd0138f7915dc3
-
SHA256
7803d28b1cfcb0c4f3a63515fea88508357e02dc2ee982f7ff1f0c2f40af3649
-
SHA512
304611cfa8c130dde5e4de5282d3d92a555b85d50889ea097dec9908d619c7d36ec28886c64aa0364d631c289d9bbf509c0ea0aeb7887c92fd91ee3d7834d07e
-
SSDEEP
98304:oZ1HRsp8NbXaaIptoNMrF4NOgmwCof84h:oZVIaIpeOrmNOTwCol
Malware Config
Signatures
-
DcRat 35 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1860 schtasks.exe 2940 schtasks.exe 3592 schtasks.exe 324 schtasks.exe 4624 schtasks.exe 3268 schtasks.exe 3044 schtasks.exe 3476 schtasks.exe 4296 schtasks.exe 4636 schtasks.exe 4360 schtasks.exe 1624 schtasks.exe 4060 schtasks.exe 2572 schtasks.exe 4144 schtasks.exe 832 schtasks.exe 2644 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 1d6590415fa189e9c982e883dc3bcdde.exe 1392 schtasks.exe 4172 schtasks.exe 800 schtasks.exe 3184 schtasks.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\66fc9ff0ee96c2 hyperInto.exe 3632 schtasks.exe 2112 schtasks.exe 4688 schtasks.exe 3224 schtasks.exe 1556 schtasks.exe 4952 schtasks.exe 4712 schtasks.exe 2844 schtasks.exe 4448 schtasks.exe 736 schtasks.exe 2336 schtasks.exe 2980 schtasks.exe -
Detect Umbral payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023217-25.dat family_umbral behavioral2/memory/2700-34-0x000001E2048B0000-0x000001E2048F0000-memory.dmp family_umbral -
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3224 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3632 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1392 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3268 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3592 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4060 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4296 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4952 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 324 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4636 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 800 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3476 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4624 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4144 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3184 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 736 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4712 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 4864 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 4864 schtasks.exe 91 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hyperInto.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hyperInto.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hyperInto.exe -
resource yara_rule behavioral2/files/0x000a000000023211-58.dat dcrat behavioral2/files/0x000a000000023211-66.dat dcrat behavioral2/files/0x000700000002321b-82.dat dcrat behavioral2/memory/4876-85-0x0000000000670000-0x00000000009DA000-memory.dmp dcrat behavioral2/files/0x0007000000023234-154.dat dcrat behavioral2/files/0x0007000000023234-155.dat dcrat -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 1d6590415fa189e9c982e883dc3bcdde.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Injector.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation hyperInto.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe -
Executes dropped EXE 4 IoCs
pid Process 2700 Saransk.exe 3592 Injector.exe 4876 hyperInto.exe 556 RuntimeBroker.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hyperInto.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hyperInto.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ip-api.com -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\RedistList\sihost.exe hyperInto.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\sihost.exe hyperInto.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\66fc9ff0ee96c2 hyperInto.exe File created C:\Program Files\Common Files\Services\wininit.exe hyperInto.exe File created C:\Program Files\Common Files\Services\56085415360792 hyperInto.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\WmiPrvSE.exe hyperInto.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\24dbde2999530e hyperInto.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Prefetch\ReadyBoot\OfficeClickToRun.exe hyperInto.exe File created C:\Windows\Prefetch\ReadyBoot\e6c9b481da804f hyperInto.exe File created C:\Windows\Registration\TrustedInstaller.exe hyperInto.exe File created C:\Windows\Registration\04c1e7795967e4 hyperInto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe 1556 schtasks.exe 4144 schtasks.exe 3184 schtasks.exe 4360 schtasks.exe 3044 schtasks.exe 4952 schtasks.exe 2572 schtasks.exe 4624 schtasks.exe 4172 schtasks.exe 4712 schtasks.exe 2644 schtasks.exe 2336 schtasks.exe 3632 schtasks.exe 4448 schtasks.exe 2112 schtasks.exe 4636 schtasks.exe 1624 schtasks.exe 2940 schtasks.exe 4296 schtasks.exe 800 schtasks.exe 4688 schtasks.exe 1860 schtasks.exe 3476 schtasks.exe 736 schtasks.exe 832 schtasks.exe 2980 schtasks.exe 3224 schtasks.exe 1392 schtasks.exe 4060 schtasks.exe 324 schtasks.exe 3268 schtasks.exe 3592 schtasks.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings Injector.exe Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings hyperInto.exe Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings RuntimeBroker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4980 powershell.exe 4980 powershell.exe 4980 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 4876 hyperInto.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe 556 RuntimeBroker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 556 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2012 1d6590415fa189e9c982e883dc3bcdde.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeDebugPrivilege 2700 Saransk.exe Token: SeIncreaseQuotaPrivilege 3504 wmic.exe Token: SeSecurityPrivilege 3504 wmic.exe Token: SeTakeOwnershipPrivilege 3504 wmic.exe Token: SeLoadDriverPrivilege 3504 wmic.exe Token: SeSystemProfilePrivilege 3504 wmic.exe Token: SeSystemtimePrivilege 3504 wmic.exe Token: SeProfSingleProcessPrivilege 3504 wmic.exe Token: SeIncBasePriorityPrivilege 3504 wmic.exe Token: SeCreatePagefilePrivilege 3504 wmic.exe Token: SeBackupPrivilege 3504 wmic.exe Token: SeRestorePrivilege 3504 wmic.exe Token: SeShutdownPrivilege 3504 wmic.exe Token: SeDebugPrivilege 3504 wmic.exe Token: SeSystemEnvironmentPrivilege 3504 wmic.exe Token: SeRemoteShutdownPrivilege 3504 wmic.exe Token: SeUndockPrivilege 3504 wmic.exe Token: SeManageVolumePrivilege 3504 wmic.exe Token: 33 3504 wmic.exe Token: 34 3504 wmic.exe Token: 35 3504 wmic.exe Token: 36 3504 wmic.exe Token: SeIncreaseQuotaPrivilege 3504 wmic.exe Token: SeSecurityPrivilege 3504 wmic.exe Token: SeTakeOwnershipPrivilege 3504 wmic.exe Token: SeLoadDriverPrivilege 3504 wmic.exe Token: SeSystemProfilePrivilege 3504 wmic.exe Token: SeSystemtimePrivilege 3504 wmic.exe Token: SeProfSingleProcessPrivilege 3504 wmic.exe Token: SeIncBasePriorityPrivilege 3504 wmic.exe Token: SeCreatePagefilePrivilege 3504 wmic.exe Token: SeBackupPrivilege 3504 wmic.exe Token: SeRestorePrivilege 3504 wmic.exe Token: SeShutdownPrivilege 3504 wmic.exe Token: SeDebugPrivilege 3504 wmic.exe Token: SeSystemEnvironmentPrivilege 3504 wmic.exe Token: SeRemoteShutdownPrivilege 3504 wmic.exe Token: SeUndockPrivilege 3504 wmic.exe Token: SeManageVolumePrivilege 3504 wmic.exe Token: 33 3504 wmic.exe Token: 34 3504 wmic.exe Token: 35 3504 wmic.exe Token: 36 3504 wmic.exe Token: SeDebugPrivilege 4876 hyperInto.exe Token: SeDebugPrivilege 556 RuntimeBroker.exe Token: SeBackupPrivilege 4112 vssvc.exe Token: SeRestorePrivilege 4112 vssvc.exe Token: SeAuditPrivilege 4112 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4980 2012 1d6590415fa189e9c982e883dc3bcdde.exe 92 PID 2012 wrote to memory of 4980 2012 1d6590415fa189e9c982e883dc3bcdde.exe 92 PID 2012 wrote to memory of 2700 2012 1d6590415fa189e9c982e883dc3bcdde.exe 96 PID 2012 wrote to memory of 2700 2012 1d6590415fa189e9c982e883dc3bcdde.exe 96 PID 2012 wrote to memory of 3680 2012 1d6590415fa189e9c982e883dc3bcdde.exe 98 PID 2012 wrote to memory of 3680 2012 1d6590415fa189e9c982e883dc3bcdde.exe 98 PID 2700 wrote to memory of 3504 2700 Saransk.exe 101 PID 2700 wrote to memory of 3504 2700 Saransk.exe 101 PID 2012 wrote to memory of 3592 2012 1d6590415fa189e9c982e883dc3bcdde.exe 104 PID 2012 wrote to memory of 3592 2012 1d6590415fa189e9c982e883dc3bcdde.exe 104 PID 2012 wrote to memory of 3592 2012 1d6590415fa189e9c982e883dc3bcdde.exe 104 PID 3592 wrote to memory of 4112 3592 Injector.exe 106 PID 3592 wrote to memory of 4112 3592 Injector.exe 106 PID 3592 wrote to memory of 4112 3592 Injector.exe 106 PID 3592 wrote to memory of 2352 3592 Injector.exe 107 PID 3592 wrote to memory of 2352 3592 Injector.exe 107 PID 3592 wrote to memory of 2352 3592 Injector.exe 107 PID 4112 wrote to memory of 2424 4112 WScript.exe 109 PID 4112 wrote to memory of 2424 4112 WScript.exe 109 PID 4112 wrote to memory of 2424 4112 WScript.exe 109 PID 2424 wrote to memory of 4876 2424 cmd.exe 112 PID 2424 wrote to memory of 4876 2424 cmd.exe 112 PID 4876 wrote to memory of 4640 4876 hyperInto.exe 146 PID 4876 wrote to memory of 4640 4876 hyperInto.exe 146 PID 4640 wrote to memory of 2356 4640 cmd.exe 148 PID 4640 wrote to memory of 2356 4640 cmd.exe 148 PID 4640 wrote to memory of 556 4640 cmd.exe 149 PID 4640 wrote to memory of 556 4640 cmd.exe 149 PID 556 wrote to memory of 5080 556 RuntimeBroker.exe 150 PID 556 wrote to memory of 5080 556 RuntimeBroker.exe 150 PID 556 wrote to memory of 2428 556 RuntimeBroker.exe 151 PID 556 wrote to memory of 2428 556 RuntimeBroker.exe 151 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hyperInto.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hyperInto.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hyperInto.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d6590415fa189e9c982e883dc3bcdde.exe"C:\Users\Admin\AppData\Local\Temp\1d6590415fa189e9c982e883dc3bcdde.exe"1⤵
- DcRat
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Saransk.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\Saransk.exe"C:\Users\Admin\AppData\Local\Temp\Saransk.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Injector.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\Injector.exe"C:\Users\Admin\AppData\Local\Temp\Injector.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Chainnet\8f9Z3.vbe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Chainnet\oniRrs8nIuzVsaH8sYiTK.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Chainnet\hyperInto.exe"C:\Chainnet\hyperInto.exe"5⤵
- DcRat
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\35gbisF1f8.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2356
-
-
C:\Chainnet\RuntimeBroker.exe"C:\Chainnet\RuntimeBroker.exe"7⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:556 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7e37d544-eb03-41bb-9204-9f5058e45c37.vbs"8⤵PID:5080
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\50fa1efc-28ec-42da-ae77-36f8a08a1342.vbs"8⤵PID:2428
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Chainnet\file.vbs"3⤵PID:2352
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\odt\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\odt\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\odt\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Windows\Prefetch\ReadyBoot\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\Prefetch\ReadyBoot\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Windows\Prefetch\ReadyBoot\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 10 /tr "'C:\odt\TrustedInstaller.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\odt\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 13 /tr "'C:\odt\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\Services\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Common Files\Services\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\Services\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Chainnet\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Chainnet\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Chainnet\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Chainnet\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Chainnet\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Chainnet\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 13 /tr "'C:\Windows\Registration\TrustedInstaller.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\Windows\Registration\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 11 /tr "'C:\Windows\Registration\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Chainnet\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Chainnet\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Chainnet\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2980
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD5b3080903ab3740f3f1346f2f61834c2b
SHA1a5b37c9ea7a58c9194de44382d75dc4863d3d5b7
SHA256505642ffc3c57426bb6575eb3ac48ea1f3e303fa5b34ea6ccd3fe2f7021619a1
SHA512a33ace44bf4936bb2747586d590d762da473840179d9553d0b213f12f11a2d10713fb6bb5637058a40bf0b12f710dfe07930476d8ea5765f0dba816389f9e419
-
Filesize
704KB
MD540c603885f6d7d5cb0508c84436feda9
SHA1b1fab7b715b6f09e851d38fccfd8d8bd2c13b28a
SHA256087ba66edfc5e58a3b073d9a98b07020424fb291b19659e96a624bd41be82dcc
SHA5120f223b7b9d69a41184f3b10c9f1c996c414e4b1d171ebaa3f7c8244cc3fcd02e8f5d8b5c0a9c06c6b68b9e20a10b80c4601ad5bd0955ff4ff74b1ea6b6b086cc
-
Filesize
64KB
MD5e20aaa15f7df9906c624899eb6f380c5
SHA1e8cd8ff0d3bbfd526492085aaf7293d812895fc3
SHA25699d3cad1a43ed63f00dfd048c10aba4f4adc1f6ff00fdc6e83e4e5a2f36face9
SHA51258ec1cb4ca05859a1071c0c024b0827f5ed04562b06ca5c97354a09a8e03704d30202bc1cc235d6ca45824d7f20c09abb94ad48a7f1b1eda5fdbaef93cacbec5
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
3.4MB
MD5d63861446161da73423a6378ab06af5e
SHA18d3116fa2ac5d4e7fb9684498f69edf3e976f977
SHA256c46e261e262516989fb8205f6e939b13fc19326f936229f024b41b9d4956f8bd
SHA5127bf3f16a5c455dbf902284ba581097b7ecdefcfb9df55053c868f4ae84e9097b4fb6214c9896cc344ea65979516b20df8e35d19c97de79d52ee27fb86e61eb88
-
Filesize
27B
MD594db4d897ca54289c945a06574084128
SHA1d4168950c994dacea1402a9570a4735350b86c10
SHA256a759a78b129faaa486102e6486d595070e7c923bf4159ae7b8eb78fec3c2a461
SHA5122548059003c4bff60dbe0e9aa5c097bac130ecb7bae7896b83f577bb2aa0e3c1b356545ebc92e3487ef937026c96ef48d2df750b31f0acea9166bfb9342cd28a
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
194B
MD5e22af88f06bfaf8ab6792406dbd00a46
SHA1baf5def1fa803e7169a8a2d017b80bfe13345f50
SHA2560c425fa9ede709397af35efbf3f22ee3ea28994b1e330b69e933c0edd9f8e731
SHA51208c6ef6e6298bf3ca477d15c8529828ee738a326cb876a47d856e3479662096d93121a223f9ae696da97ae3817c630ea405f24caea3ddcba2b5167d9182fbdb6
-
Filesize
481B
MD52729c97d3a35e9b5a00e55148b2b0a7e
SHA1096d8022b852ac1678919993e54fda3b4634703f
SHA2569bf1499754948f1921e65ca3d967407e6093c143db7d5cdf2ba8714d64f47828
SHA51231325710773b9589e0f6f5e43041e3387000586c0b181a4efa258b0dcad0203316dd10b3af9e657ebad3995ed8cc5ae5d9be2398e21d31245cd09b55e95dc438
-
Filesize
704B
MD5f6285f4b987917037e49d4a05e41b6aa
SHA147df750fe66768247e184cdbc9fcd644bfbd3821
SHA256cd1be04e6e858c4ae5da709f48f20b062c22dfb64e09334f2ac247b22c230847
SHA512ff7f8334e1a3b378d33172701cafecd9402890be9e27eae0b5287953ac7901956d631546af4f4aac8d40e270cb2da5d01c31e76e2ecca7c3f97177a0fa65b266
-
Filesize
3.7MB
MD5323e22b442e4d4f9930c5b65f6d1028c
SHA17dadf78756dd00c68d5094a59dc7bcccf3c8346d
SHA256eaedca12a90cf9afa1d7e42358571269e726ccd5a5c96b6d98c7b242f08e9e00
SHA5122da37cfe8005ed1e299ad6c3e676abeafd6160b47bb9888d1cbdcb7a82e7955feedb4286ee6dfbe64a1b62814ff1af11a718074854d2699a4a2975d4fbfd5b2e
-
Filesize
3.6MB
MD5d1af83dc80d3c0ed8e223b24a9fcd1d1
SHA19e59970836e02bec76ab4623de7d88e4b92f98e6
SHA2562be5af77d12f1141fc7f323e8782f195a465b8ad6f08c8fceaa371c56ba86400
SHA512db1412d06426ad1dabf08bacc014e6eb2fc971ddb1b468b3c44383d71bf85148bdd3c4cb261618ea01ce9167de95348401cbf07870909f8c409c75d2fd3f746e
-
Filesize
227KB
MD505c183f8c0d871d6081f1ea4096805e4
SHA14a05aba815c8471fca4fcc9a789683385b0c24ca
SHA256eff59569967501a5e21ff3f8be9cc487e30d23e1538aeb121f9ab0955c308849
SHA512ef35359087662c4213f667c49182ab794fbb28dfe2a5b9e1fad5729e516b1ef08c2d7230a84e4808b693832d7b4ad43530377886cd2c993407a7fe38333ad347
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82