Malware Analysis Report

2025-06-15 19:46

Sample ID 240325-e5cfcagb47
Target d7a0ca18ae95c63d25af6782b7bd6b8d.bin
SHA256 0530878595bd050de51d1bc83c86e77e1ac2bb5ce48188bc659be02616aed972
Tags
dcrat infostealer persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0530878595bd050de51d1bc83c86e77e1ac2bb5ce48188bc659be02616aed972

Threat Level: Known bad

The file d7a0ca18ae95c63d25af6782b7bd6b8d.bin was found to be: Known bad.

Malicious Activity Summary

dcrat infostealer persistence rat

Dcrat family

DCRat payload

Process spawned unexpected child process

DcRat

DCRat payload

Loads dropped DLL

Executes dropped EXE

Checks computer location settings

Adds Run key to start application

Drops file in System32 directory

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-25 04:31

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-25 04:31

Reported

2024-03-25 04:33

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\WScript.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
N/A N/A C:\Documents and Settings\dllhost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\Phoneutil\\dllhost.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\globinputhost\\dllhost.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\All Users\\Package Cache\\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\\dllhost.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\winlogon\\dllhost.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\comuid\\RuntimeBroker.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Documents and Settings\\dllhost.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\winlogon\dllhost.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\winlogon\5940a34987c99120d96dace90a3f93f329dcad63 C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\comuid\RuntimeBroker.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\comuid\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\Phoneutil\dllhost.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\Phoneutil\5940a34987c99120d96dace90a3f93f329dcad63 C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\globinputhost\dllhost.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\globinputhost\5940a34987c99120d96dace90a3f93f329dcad63 C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Token: SeDebugPrivilege N/A C:\Documents and Settings\dllhost.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe

"C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\winsessionperfcrtdhcp\H4eizCYuNaDysMfGy8i9P9o.vbe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\winsessionperfcrtdhcp\USu4u0OJi5iSZO.bat" "

C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe

"C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Documents and Settings\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\Phoneutil\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\globinputhost\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Documents and Settings\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\winlogon\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\comuid\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Documents and Settings\dllhost.exe

"C:\Documents and Settings\dllhost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
RU 212.109.193.246:80 212.109.193.246 tcp
US 8.8.8.8:53 246.193.109.212.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 217.238.32.23.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
N/A 13.89.179.8:443 tcp

Files

C:\winsessionperfcrtdhcp\H4eizCYuNaDysMfGy8i9P9o.vbe

MD5 7b821ef7118b960e5707288a81e136cc
SHA1 6251f2f8d2cf3a107b26a53b09feae748bfb8088
SHA256 a6bbcf93787d3e116fe20798611f286a07f95388bf4fe0695af6a55a0d1f3d4d
SHA512 892d97be3dff4a2e2596becdcf65114a29f2ae6536c187587addfe5017d35ef73148106df0f5c37536ca530e146a081d9a33a68eea54ecbb037fb6b951bc38de

C:\winsessionperfcrtdhcp\USu4u0OJi5iSZO.bat

MD5 0286dfaabb2eaca6be6162d5872aaeba
SHA1 75ab5fa416ec4e9e3df83f28cc67e71c593cfda4
SHA256 a07930110496f899d363e0120709c95eca5fdd7ce127e51457647a9eec103622
SHA512 6b5999896ca5d3c2d38054769ba76402d6e53406a5bed281dd17fa5d3db0c7dcc711acc997bf7f9e602643a896da4de5cd0c59d393bbea82a3e03474ecfbbb6f

C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe

MD5 13ba0d9074cdbfeae9f78242af80afb6
SHA1 ec312cbd990aa9b5dd03d7bd73ffbe79d7ddc27c
SHA256 a57b942025856c8ba21f897830a67cd4d3e317587f0bb6a7fce37f53d9e9d026
SHA512 03e00bb2dbd43249489fe0a32a9277134eb026b1322bee5a208718e05ba9a4077ad4e02075c1e12cf6e3d941329a1203a3210ea932ea86b8855d01867dfe37c9

memory/3728-12-0x0000000000DA0000-0x0000000000E8A000-memory.dmp

memory/3728-13-0x00007FF871BE0000-0x00007FF8726A1000-memory.dmp

memory/3728-14-0x0000000002F80000-0x0000000002F90000-memory.dmp

memory/3728-43-0x00007FF871BE0000-0x00007FF8726A1000-memory.dmp

memory/2272-45-0x000000001BB10000-0x000000001BB20000-memory.dmp

memory/2272-44-0x00007FF871BE0000-0x00007FF8726A1000-memory.dmp

memory/2272-47-0x00007FF871BE0000-0x00007FF8726A1000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-25 04:31

Reported

2024-03-25 04:33

Platform

win7-20240221-en

Max time kernel

118s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe"

Signatures

DcRat

rat infostealer dcrat
Description Indicator Process Target
File created C:\Windows\System32\kdusb\spoolsv.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
N/A N/A C:\Windows\System32\avicap32\csrss.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\kdusb\\spoolsv.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\avicap32\\csrss.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\authui\\taskhost.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Admin\\Searches\\Idle.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\System32\\ntoskrnl\\services.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\MSBuild\\sppsvc.exe\"" C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\kdusb\spoolsv.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\avicap32\csrss.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\avicap32\886983d96e3d3e31032c679b2d4ea91b6c05afef C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\ntoskrnl\services.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File opened for modification C:\Windows\System32\kdusb\spoolsv.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\kdusb\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\authui\taskhost.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\authui\b75386f1303e64d8139363b71e44ac16341adf4e C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Windows\System32\ntoskrnl\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\MSBuild\sppsvc.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
File created C:\Program Files\MSBuild\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\avicap32\csrss.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2164 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe C:\Windows\SysWOW64\WScript.exe
PID 2164 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe C:\Windows\SysWOW64\WScript.exe
PID 2164 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe C:\Windows\SysWOW64\WScript.exe
PID 2164 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe C:\Windows\SysWOW64\WScript.exe
PID 2960 wrote to memory of 2544 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 2960 wrote to memory of 2544 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 2960 wrote to memory of 2544 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 2960 wrote to memory of 2544 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 2544 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe
PID 2544 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe
PID 2544 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe
PID 2544 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe
PID 2600 wrote to memory of 668 N/A C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe C:\Windows\System32\avicap32\csrss.exe
PID 2600 wrote to memory of 668 N/A C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe C:\Windows\System32\avicap32\csrss.exe
PID 2600 wrote to memory of 668 N/A C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe C:\Windows\System32\avicap32\csrss.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe

"C:\Users\Admin\AppData\Local\Temp\131604f5f6612d1f2973e76bedcdd7f1d78deda8c4465eb28f4dfda1051a3fa3.exe"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\winsessionperfcrtdhcp\H4eizCYuNaDysMfGy8i9P9o.vbe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\winsessionperfcrtdhcp\USu4u0OJi5iSZO.bat" "

C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe

"C:\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\kdusb\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\avicap32\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\authui\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Searches\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\ntoskrnl\services.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\MSBuild\sppsvc.exe'" /rl HIGHEST /f

C:\Windows\System32\avicap32\csrss.exe

"C:\Windows\System32\avicap32\csrss.exe"

Network

Country Destination Domain Proto
RU 212.109.193.246:80 212.109.193.246 tcp

Files

C:\winsessionperfcrtdhcp\H4eizCYuNaDysMfGy8i9P9o.vbe

MD5 7b821ef7118b960e5707288a81e136cc
SHA1 6251f2f8d2cf3a107b26a53b09feae748bfb8088
SHA256 a6bbcf93787d3e116fe20798611f286a07f95388bf4fe0695af6a55a0d1f3d4d
SHA512 892d97be3dff4a2e2596becdcf65114a29f2ae6536c187587addfe5017d35ef73148106df0f5c37536ca530e146a081d9a33a68eea54ecbb037fb6b951bc38de

C:\winsessionperfcrtdhcp\USu4u0OJi5iSZO.bat

MD5 0286dfaabb2eaca6be6162d5872aaeba
SHA1 75ab5fa416ec4e9e3df83f28cc67e71c593cfda4
SHA256 a07930110496f899d363e0120709c95eca5fdd7ce127e51457647a9eec103622
SHA512 6b5999896ca5d3c2d38054769ba76402d6e53406a5bed281dd17fa5d3db0c7dcc711acc997bf7f9e602643a896da4de5cd0c59d393bbea82a3e03474ecfbbb6f

\winsessionperfcrtdhcp\winsessionperfcrtdhcpFontmonitornet.exe

MD5 13ba0d9074cdbfeae9f78242af80afb6
SHA1 ec312cbd990aa9b5dd03d7bd73ffbe79d7ddc27c
SHA256 a57b942025856c8ba21f897830a67cd4d3e317587f0bb6a7fce37f53d9e9d026
SHA512 03e00bb2dbd43249489fe0a32a9277134eb026b1322bee5a208718e05ba9a4077ad4e02075c1e12cf6e3d941329a1203a3210ea932ea86b8855d01867dfe37c9

memory/2600-13-0x00000000003C0000-0x00000000004AA000-memory.dmp

memory/2600-14-0x000007FEF5E60000-0x000007FEF684C000-memory.dmp

memory/2600-15-0x000000001AFC0000-0x000000001B040000-memory.dmp

memory/668-34-0x000007FEF5E60000-0x000007FEF684C000-memory.dmp

memory/668-35-0x0000000000EB0000-0x0000000000F9A000-memory.dmp

memory/668-36-0x000000001AE00000-0x000000001AE80000-memory.dmp

memory/2600-37-0x000007FEF5E60000-0x000007FEF684C000-memory.dmp

memory/668-38-0x000007FEF5E60000-0x000007FEF684C000-memory.dmp