Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
446s -
max time network
452s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 12:07
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
DCRatBuild.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
DCRatBuild.exe
Resource
win11-20240426-en
General
-
Target
DCRatBuild.exe
-
Size
3.8MB
-
MD5
3da1cda32190d9ba346889a7df20c952
-
SHA1
f26a7f5ece93071f40b8cf3c5cf74af1e7589797
-
SHA256
84d18110d3087cb912cc8cdcc3dae4e4ed4d0a4d20b514291eb7958590960607
-
SHA512
540a4c0372ce6a8e6b651b7aaad62d9a119cf8a6589a50cab1a83c2eec6c52ac9e662f789e06ab196bbac82766cfc74b0a177fc94fe944de206c7100b2d929c6
-
SSDEEP
98304:yQ8b58R7g9ksxqxTqIlyOBYFF+2hvc8Tf:58b5gc6TqjFFL
Malware Config
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023b6e-10.dat family_zgrat_v1 behavioral2/memory/1912-12-0x00000000006A0000-0x0000000000A28000-memory.dmp family_zgrat_v1 -
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Web\\Wallpaper\\explorer.exe\", \"C:\\Program Files\\Internet Explorer\\fr-FR\\cmd.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Web\\Wallpaper\\explorer.exe\", \"C:\\Program Files\\Internet Explorer\\fr-FR\\cmd.exe\", \"C:\\Program Files (x86)\\Common Files\\Oracle\\Java\\javapath\\dllhost.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Web\\Wallpaper\\explorer.exe\", \"C:\\Program Files\\Internet Explorer\\fr-FR\\cmd.exe\", \"C:\\Program Files (x86)\\Common Files\\Oracle\\Java\\javapath\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Web\\Wallpaper\\explorer.exe\", \"C:\\Program Files\\Internet Explorer\\fr-FR\\cmd.exe\", \"C:\\Program Files (x86)\\Common Files\\Oracle\\Java\\javapath\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\explorer.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Web\\Wallpaper\\explorer.exe\"" ChainSurrogateAgentSaves.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4328 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1468 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3704 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4804 2168 schtasks.exe 94 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4644 2168 schtasks.exe 94 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation DCRatBuild.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation ChainSurrogateAgentSaves.exe -
Executes dropped EXE 2 IoCs
pid Process 1912 ChainSurrogateAgentSaves.exe 1640 csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Recovery\\WindowsRE\\explorer.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Recovery\\WindowsRE\\explorer.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\Web\\Wallpaper\\explorer.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Common Files\\Oracle\\Java\\javapath\\dllhost.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\WindowsRE\\csrss.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Common Files\\Oracle\\Java\\javapath\\dllhost.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\WindowsRE\\csrss.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\Web\\Wallpaper\\explorer.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files\\Internet Explorer\\fr-FR\\cmd.exe\"" ChainSurrogateAgentSaves.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files\\Internet Explorer\\fr-FR\\cmd.exe\"" ChainSurrogateAgentSaves.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC36DEE845FEB14D9181B20FDCD36E86.TMP csc.exe File created \??\c:\Windows\System32\hzg0bk.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\fr-FR\cmd.exe ChainSurrogateAgentSaves.exe File created C:\Program Files\Internet Explorer\fr-FR\ebf1f9fa8afd6d ChainSurrogateAgentSaves.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath\dllhost.exe ChainSurrogateAgentSaves.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\javapath\5940a34987c991 ChainSurrogateAgentSaves.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Web\Wallpaper\explorer.exe ChainSurrogateAgentSaves.exe File opened for modification C:\Windows\Web\Wallpaper\explorer.exe ChainSurrogateAgentSaves.exe File created C:\Windows\Web\Wallpaper\7a0fd90576e088 ChainSurrogateAgentSaves.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe 2316 schtasks.exe 1468 schtasks.exe 3008 schtasks.exe 3704 schtasks.exe 3196 schtasks.exe 2308 schtasks.exe 2820 schtasks.exe 2808 schtasks.exe 2760 schtasks.exe 4804 schtasks.exe 4644 schtasks.exe 4328 schtasks.exe 4812 schtasks.exe 2880 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\Local Settings ChainSurrogateAgentSaves.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1916 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe 1912 ChainSurrogateAgentSaves.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1640 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1912 ChainSurrogateAgentSaves.exe Token: SeDebugPrivilege 1640 csrss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 888 wrote to memory of 4464 888 DCRatBuild.exe 84 PID 888 wrote to memory of 4464 888 DCRatBuild.exe 84 PID 888 wrote to memory of 4464 888 DCRatBuild.exe 84 PID 4464 wrote to memory of 532 4464 WScript.exe 88 PID 4464 wrote to memory of 532 4464 WScript.exe 88 PID 4464 wrote to memory of 532 4464 WScript.exe 88 PID 532 wrote to memory of 1912 532 cmd.exe 90 PID 532 wrote to memory of 1912 532 cmd.exe 90 PID 1912 wrote to memory of 1556 1912 ChainSurrogateAgentSaves.exe 98 PID 1912 wrote to memory of 1556 1912 ChainSurrogateAgentSaves.exe 98 PID 1556 wrote to memory of 3472 1556 csc.exe 100 PID 1556 wrote to memory of 3472 1556 csc.exe 100 PID 1912 wrote to memory of 4420 1912 ChainSurrogateAgentSaves.exe 113 PID 1912 wrote to memory of 4420 1912 ChainSurrogateAgentSaves.exe 113 PID 4420 wrote to memory of 4360 4420 cmd.exe 115 PID 4420 wrote to memory of 4360 4420 cmd.exe 115 PID 4420 wrote to memory of 1916 4420 cmd.exe 116 PID 4420 wrote to memory of 1916 4420 cmd.exe 116 PID 4420 wrote to memory of 1640 4420 cmd.exe 120 PID 4420 wrote to memory of 1640 4420 cmd.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\fonthostdll\ZxYhCBKjdxZObPEn9rwvPOXpSTg7EbRJyULpGWziJq.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\fonthostdll\cDjK63EiRnHUwKm2BmlGhi2Z7Zsm9LN.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\fonthostdll\ChainSurrogateAgentSaves.exe"C:\fonthostdll/ChainSurrogateAgentSaves.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gedlnlxk\gedlnlxk.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E9F.tmp" "c:\Windows\System32\CSC36DEE845FEB14D9181B20FDCD36E86.TMP"6⤵PID:3472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4aHiaViwNS.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:4360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:1916
-
-
C:\Recovery\WindowsRE\csrss.exe"C:\Recovery\WindowsRE\csrss.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\Web\Wallpaper\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Web\Wallpaper\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Windows\Web\Wallpaper\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\fr-FR\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\fr-FR\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\fr-FR\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\Oracle\Java\javapath\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159B
MD5bb84fad9d2d50ae60d4faaa903ec9b8e
SHA1a8dfef78ba6c37235321298eeb04da7e61e735c1
SHA2566e1389cca29e570ed2c6d267362b9a58ae46699648056d912d472657dad5d1bd
SHA51236ffcfc1c5e5e71b1a932e0055eb0dfca7845364d87201e771340e6feb465de340dce71d9cf761843e8673eb5594d998b5b2b8f8d1f998d781819764e74e93bc
-
Filesize
1KB
MD596a7a2f74cdfed58328a6ea522cf83b5
SHA11f9001858e261695490263ecbc35aecafd2ad4ae
SHA256a40dfb0b99004702e10d2932aef3f04870d0d654571ac6c2d347adfc22aaed51
SHA5124acec47f396878806563833481f85449774248ddc7bb9633daaaff99ef627c176e618e191080d434ab7b0989e35e78d2d2d20ffe2b7ac2fa48b764df3ff00d2a
-
Filesize
3.5MB
MD5fbcc1d265e960f799d44f2b41f494b63
SHA189a7cb2b74d65cadf96e18af1f317c296eea6261
SHA2566fb0005df41defdc5866dd4ff3c590925d2ea1ad51176412a905f1e850698318
SHA512ca3cd33aa7746b4d9372c7f6d919da3605bf84f6fb86f9a57dcad71731ddac570ba7a0505b7b435d58e75596ec96ebddae5124b566924802756a9e298ce64632
-
Filesize
220B
MD5f5975f5e04426d677d03382c3d5f9f65
SHA140a2df9165257acacffdecb7d1cdfe6ee09bb57b
SHA25643e307995b3688d72c71bf0d3715178d944a6560dac01925d35df847cff05163
SHA512c221fe1e51eceffaab0bb46209f0368a62d8ba1e983c78dd0f9f8f0f482a59432e543f9a836fc0f33d92e2ef2bb49c088e868563f6dfea4a5af22ce57862a390
-
Filesize
106B
MD59ff96846900e41d5f9f9c291b8efea33
SHA1b581cd1d80e5a6eb01e062d438435ade5c6ed22a
SHA2560a8dcc94b789d4a5f442701f4842935d83e9e14e9bd42b60d1ac221b21f5c13c
SHA512a3f4ce62d1cadeb3b4e6f5467d661d82430a7c98bc8c3eef8b208a0703ad03206120a367a7f2783a49b30f4db4679025a1de0ed10aefcf408d4012e991e5f368
-
Filesize
369B
MD5d213106a31ca287bc1c39dd925d4aafc
SHA159f6d64bc3dd2d967b5fe8208b6e3414d2547373
SHA2565fb3091a1da2eb9e040ec18dc2f71fb148bfa99da0c321b1731f53ab20ccd570
SHA51241f407a56556c108e14020db9aea8b99c7aaf03258c23acc56940ff04a7696c1e41d4e3c53f1bc34f5b0e58ed62520174494a991cd4f73d183cf6274a589f422
-
Filesize
235B
MD5181029b21f7dde3bbfc2a72c9a20e8dc
SHA1f079c1e9c96b570d82ef6b3703ce91052daf7d60
SHA256c1ceacb0632032e3bb59a062b884c936a654b7474300ecaa03f6d5500fad2c38
SHA512eee66e9087ed67159f497b78389a9053e50e488daeb7f758f83bd73000d7cbffd39658cb83ef329d827e49b956af5f28f3daaf24a23b51bf921dba925b084c7d
-
Filesize
1KB
MD59cfa5e15dc4ed124c8bdfe18f72a350a
SHA16a5cbdd955e1a692ef9fa61e97a5cfdac0577424
SHA256c7674c323df2fe7503fd386f137d954e7749fe3d2be1492fe5bc528dfa01951c
SHA51246600797ee2edc13fde586cdd0c44cfd03323c91b3250564d0c5277fc2e28173c96d8b37dd6e341164b6fdb41a89316fb47a0c2721d80a06395ba4bf2117b2ff