Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 01:14
Behavioral task
behavioral1
Sample
36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe
Resource
win10v2004-20240508-en
General
-
Target
36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe
-
Size
3.4MB
-
MD5
1b57989c5c9ef0b64db6fbc2c88b346b
-
SHA1
75818e0eedd98f90c338edbc2ad6882f6a11fb06
-
SHA256
36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20
-
SHA512
269cc8c6918a00a1df3e932ca3c7aec08913dfe2d545bc7bdcb9ced00b1038ada214ed167619b96a38a0c865889c0a590d3b8be1aaaa3c036db3ba0c9d65be7a
-
SSDEEP
49152:h7/RbqaJqrkG24yhaf1hD3uR4S1o+NO6QolF2YpwCgOGE2/xB/r/4ri:F1t5Qa4YowtJwCHG5xBj/4
Malware Config
Signatures
-
DcRat 56 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 3132 schtasks.exe 1088 schtasks.exe 2932 schtasks.exe 4700 schtasks.exe 4956 schtasks.exe 4512 schtasks.exe 4944 schtasks.exe 4684 schtasks.exe 4064 schtasks.exe 3576 schtasks.exe 4808 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 1888 schtasks.exe 4576 schtasks.exe 5084 schtasks.exe 448 schtasks.exe 5044 schtasks.exe 4472 schtasks.exe 3384 schtasks.exe 3848 schtasks.exe 2384 schtasks.exe 1664 schtasks.exe 4604 schtasks.exe 1084 schtasks.exe 5052 schtasks.exe 2044 schtasks.exe File created C:\Program Files (x86)\Windows Portable Devices\e1ef82546f0b02 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 1904 schtasks.exe 4916 schtasks.exe 1444 schtasks.exe 3440 schtasks.exe 2936 schtasks.exe 4520 schtasks.exe 1096 schtasks.exe 468 schtasks.exe 4776 schtasks.exe 4448 schtasks.exe 1572 schtasks.exe 4024 schtasks.exe 5100 schtasks.exe 2976 schtasks.exe 2120 schtasks.exe 1640 schtasks.exe 1740 schtasks.exe 3456 schtasks.exe 2852 schtasks.exe 5028 schtasks.exe 2560 schtasks.exe 3124 schtasks.exe 2600 schtasks.exe 680 schtasks.exe 3336 schtasks.exe 1176 schtasks.exe 2968 schtasks.exe 1948 schtasks.exe 232 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\", \"C:\\Program Files\\Uninstall Information\\fontdrvhost.exe\", \"C:\\Users\\Default\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Recovery\\WindowsRE\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Recovery\\WindowsRE\\smss.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\", \"C:\\Program Files\\Uninstall Information\\fontdrvhost.exe\", \"C:\\Users\\Default\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Recovery\\WindowsRE\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\", \"C:\\Program Files\\Uninstall Information\\fontdrvhost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\", \"C:\\Program Files\\Uninstall Information\\fontdrvhost.exe\", \"C:\\Users\\Default\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\", \"C:\\Windows\\LiveKernelReports\\Idle.exe\", \"C:\\Users\\All Users\\Idle.exe\", \"C:\\Windows\\de-DE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\", \"C:\\Recovery\\WindowsRE\\csrss.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\", \"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\", \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1572 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 468 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3384 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4576 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 448 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1096 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5052 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3440 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4024 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4944 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3456 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3124 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4684 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3848 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4472 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3336 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1176 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4064 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4604 3948 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 3948 schtasks.exe 80 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
resource yara_rule behavioral2/memory/432-1-0x0000000000D30000-0x000000000109A000-memory.dmp dcrat behavioral2/files/0x00070000000233ed-48.dat dcrat -
Detects executables packed with SmartAssembly 9 IoCs
resource yara_rule behavioral2/memory/432-9-0x000000001C310000-0x000000001C320000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-16-0x000000001C4E0000-0x000000001C4EA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-24-0x000000001C5A0000-0x000000001C5AC000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-25-0x000000001C5B0000-0x000000001C5BC000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-28-0x000000001C5E0000-0x000000001C5EC000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-30-0x000000001C600000-0x000000001C60C000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-31-0x000000001C610000-0x000000001C61A000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-36-0x000000001C870000-0x000000001C87C000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/432-38-0x000000001C990000-0x000000001C99A000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Executes dropped EXE 3 IoCs
pid Process 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 3624 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 2220 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Adds Run key to start application 2 TTPs 36 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20 = "\"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Recovery\\WindowsRE\\spoolsv.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\Uninstall Information\\fontdrvhost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20 = "\"C:\\Recovery\\WindowsRE\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20 = "\"C:\\Users\\Default\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\WindowsRE\\smss.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\WindowsRE\\csrss.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Recovery\\WindowsRE\\sysmon.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Recovery\\WindowsRE\\System.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\Uninstall Information\\fontdrvhost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Recovery\\WindowsRE\\csrss.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20 = "\"C:\\Program Files\\WindowsPowerShell\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20 = "\"C:\\Users\\Default\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Windows Portable Devices\\SppExtComObj.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Recovery\\WindowsRE\\System.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\LiveKernelReports\\Idle.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Recovery\\WindowsRE\\spoolsv.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\All Users\\Idle.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\All Users\\Idle.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\upfc.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files\\Google\\Chrome\\Application\\wininit.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20 = "\"C:\\Recovery\\WindowsRE\\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Recovery\\WindowsRE\\smss.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\LiveKernelReports\\Idle.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\de-DE\\fontdrvhost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\de-DE\\fontdrvhost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\unsecapp.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\sihost.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Recovery\\WindowsRE\\sysmon.exe\"" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\e1ef82546f0b02 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files\Google\Chrome\Application\wininit.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files\Google\Chrome\Application\56085415360792 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files (x86)\Windows Multimedia Platform\ea1d8f6d871115 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\29c1c3cc0f7685 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files\Uninstall Information\fontdrvhost.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files\WindowsPowerShell\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files\Uninstall Information\5b884080fd4f94 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\66fc9ff0ee96c2 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\unsecapp.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files\WindowsPowerShell\d1db6997ba8742 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\sihost.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\LiveKernelReports\Idle.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Windows\LiveKernelReports\6ccacd8608530f 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Windows\de-DE\fontdrvhost.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Windows\de-DE\5b884080fd4f94 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe File created C:\Windows\System\Speech\StartMenuExperienceHost.exe 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2932 schtasks.exe 2968 schtasks.exe 1572 schtasks.exe 2384 schtasks.exe 1444 schtasks.exe 1888 schtasks.exe 468 schtasks.exe 2120 schtasks.exe 680 schtasks.exe 1740 schtasks.exe 5052 schtasks.exe 4024 schtasks.exe 2976 schtasks.exe 4916 schtasks.exe 5044 schtasks.exe 2560 schtasks.exe 4684 schtasks.exe 1664 schtasks.exe 4472 schtasks.exe 2044 schtasks.exe 2600 schtasks.exe 3384 schtasks.exe 4776 schtasks.exe 3124 schtasks.exe 4448 schtasks.exe 4604 schtasks.exe 448 schtasks.exe 4520 schtasks.exe 4944 schtasks.exe 5084 schtasks.exe 3848 schtasks.exe 1096 schtasks.exe 2852 schtasks.exe 3336 schtasks.exe 1948 schtasks.exe 5100 schtasks.exe 1904 schtasks.exe 1084 schtasks.exe 3440 schtasks.exe 4956 schtasks.exe 3456 schtasks.exe 5028 schtasks.exe 232 schtasks.exe 3576 schtasks.exe 1088 schtasks.exe 4576 schtasks.exe 1176 schtasks.exe 4064 schtasks.exe 4808 schtasks.exe 2936 schtasks.exe 3132 schtasks.exe 1640 schtasks.exe 4700 schtasks.exe 4512 schtasks.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Token: SeDebugPrivilege 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Token: SeDebugPrivilege 3624 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Token: SeDebugPrivilege 2220 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 432 wrote to memory of 4380 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 135 PID 432 wrote to memory of 4380 432 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 135 PID 4380 wrote to memory of 2532 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 136 PID 4380 wrote to memory of 2532 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 136 PID 4380 wrote to memory of 972 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 137 PID 4380 wrote to memory of 972 4380 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 137 PID 2532 wrote to memory of 3624 2532 WScript.exe 139 PID 2532 wrote to memory of 3624 2532 WScript.exe 139 PID 3624 wrote to memory of 4924 3624 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 140 PID 3624 wrote to memory of 4924 3624 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 140 PID 3624 wrote to memory of 412 3624 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 141 PID 3624 wrote to memory of 412 3624 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 141 PID 4924 wrote to memory of 2220 4924 WScript.exe 142 PID 4924 wrote to memory of 2220 4924 WScript.exe 142 PID 2220 wrote to memory of 2044 2220 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 143 PID 2220 wrote to memory of 2044 2220 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 143 PID 2220 wrote to memory of 1152 2220 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 144 PID 2220 wrote to memory of 1152 2220 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe 144 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe"C:\Users\Admin\AppData\Local\Temp\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:432 -
C:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe"C:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe"2⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4380 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\feb39b76-81a7-4f70-a897-2c94470ed257.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exeC:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe4⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3624 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\717e380e-41b6-4b50-afad-1a2dfbe9c93a.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exeC:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe6⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2220 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f0b2fda8-eaef-4c9a-9769-f187db347b1a.vbs"7⤵PID:2044
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d6da322d-3551-498b-8d70-e3de05794f61.vbs"7⤵PID:1152
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d7409e1-4fb9-4dcb-b9f4-4a36276a6382.vbs"5⤵PID:412
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e73ff563-a852-47b8-90e7-ecf63c601524.vbs"3⤵PID:972
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Windows\LiveKernelReports\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\LiveKernelReports\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Windows\de-DE\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\de-DE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\de-DE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c203" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c203" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files\Google\Chrome\Application\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\Chrome\Application\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c203" /sc MINUTE /mo 8 /tr "'C:\Users\Default\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20" /sc ONLOGON /tr "'C:\Users\Default\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c203" /sc MINUTE /mo 14 /tr "'C:\Users\Default\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c203" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c203" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD51b57989c5c9ef0b64db6fbc2c88b346b
SHA175818e0eedd98f90c338edbc2ad6882f6a11fb06
SHA25636b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20
SHA512269cc8c6918a00a1df3e932ca3c7aec08913dfe2d545bc7bdcb9ced00b1038ada214ed167619b96a38a0c865889c0a590d3b8be1aaaa3c036db3ba0c9d65be7a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\36b4c1632f6121f74305e5af623f983c9b97b01080470c7daae076dff51b8c20.exe.log
Filesize1KB
MD5655010c15ea0ca05a6e5ddcd84986b98
SHA1120bf7e516aeed462c07625fbfcdab5124ad05d3
SHA2562b1ffeab025cc7c61c50e3e2e4c9253046d9174cf00181a8c1de733a4c0daa14
SHA512e52c26718d7d1e979837b5ac626dde26920fe7413b8aa7be6f1be566a1b0f035582f4d313400e3ad6b92552abb1dfaf186b60b875fb955a2a94fd839fe841437
-
Filesize
766B
MD561edeeb9ad341f0b3bff94b459723923
SHA1d25e0c83fc7d53894d58b9320077657c63b61383
SHA256127833b018b2a0fc01047995624c3c61ebc7944b85a468026f8efd23b65b3181
SHA512303970c78785550975161e049e0968c1f0fce3c49d8362c20b77c834b3c8031eaf1d5ad3952104c2ad5466b7bebbcce52a0e3c169a12b0b03869de7736477642
-
Filesize
542B
MD529aba3b55f6629a2d500c21f65c89e05
SHA10714fe59c724c156b3e024ffc02745035e4303c6
SHA25652063e9367ad145b932e7dfc398c66b6794b97f1d5a7fd388194035bdb6c998e
SHA5125cdc0ee6f5db00741c1afcc9b9450a9349dd5f38857dbe9f2eb8dc82ba5fe1f21f57c0ca75cce61e6d53050b026e0145f84eb4717c7044bb764fc4c469292482
-
Filesize
766B
MD576a0cc381ce2aea96879439c46b21ab2
SHA1cf212aee32ad0c187faea915ba4f0014dbc574f5
SHA2560f6bcb4eb1a678e9d2f987fdc45d6385f8ad875a0b17da00d4b2e84580b46a10
SHA5126587890e5b700dab4c354eba2a55801e831de24dc6243a5f58a2777f7e8446a7d07d413654d3f4c6be5b55b51bfc7827d9a1f9b226b06a43afb6fa6e8bde21a7
-
Filesize
766B
MD5e325c9b7b0c023c258105f27a1093990
SHA14f8daa67ca45eef76293f534759572efb08e9ef1
SHA256f069d71cd63de8edf8b87144ddcd665cf6839f5ed6e1fc8d38e9269a3866b9d5
SHA5126cc3fb8bd0392dcf39c0527c9bac6a00b183817f4baf492dc36fc7d9145ffa6179a7eefc74a128954e6bf80b2f7fb25928726f1eb0d592bb3e8f49513e47da88