Analysis
-
max time kernel
139s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 01:38
Behavioral task
behavioral1
Sample
951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe
Resource
win10v2004-20240508-en
General
-
Target
951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe
-
Size
2.0MB
-
MD5
7a92d788bf63e3e0446c25e4b7dd3f9a
-
SHA1
482860a3d765b91779840f3510690a4130fcfdc4
-
SHA256
951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba
-
SHA512
171d61faaa7812c4045d6a552a4e166786ab2c11cd89ac89adcc545a2222e0c81e880de4b4eba2118f0df5716ab54591c84ab852bd47f9bc57f6b26dd1eb034a
-
SSDEEP
24576:kn2XTCHM4xT9V3XzsHhVmatCELYIXVelAtgbHHd:SaTUv0jmtEttc
Malware Config
Signatures
-
DcRat 41 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 3692 schtasks.exe 1216 schtasks.exe 1444 schtasks.exe 444 schtasks.exe 2864 schtasks.exe 2220 schtasks.exe 1508 schtasks.exe 4356 schtasks.exe 1044 schtasks.exe 4412 schtasks.exe 336 schtasks.exe 2180 schtasks.exe 2156 schtasks.exe 2536 schtasks.exe 696 schtasks.exe 5060 schtasks.exe 2688 schtasks.exe 4688 schtasks.exe 3452 schtasks.exe 536 schtasks.exe 1876 schtasks.exe 1488 schtasks.exe 4504 schtasks.exe 4860 schtasks.exe 3688 schtasks.exe 4540 schtasks.exe 1796 schtasks.exe 2292 schtasks.exe 4092 schtasks.exe 2996 schtasks.exe 2828 schtasks.exe 3588 schtasks.exe 4772 schtasks.exe 3440 schtasks.exe 5108 schtasks.exe File created C:\Program Files\Common Files\services.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\Common Files\c5b4cb5e9653cc 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 2684 schtasks.exe 3924 schtasks.exe 4952 schtasks.exe 4028 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\", \"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\", \"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\fontdrvhost.exe\", \"C:\\Windows\\Downloaded Program Files\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\", \"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\", \"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\fontdrvhost.exe\", \"C:\\Windows\\Downloaded Program Files\\dllhost.exe\", \"C:\\Program Files\\Windows Media Player\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\", \"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\", \"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\fontdrvhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\", \"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\", \"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\", \"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\", \"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\", \"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\fontdrvhost.exe\", \"C:\\Windows\\Downloaded Program Files\\dllhost.exe\", \"C:\\Program Files\\Windows Media Player\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\spoolsv.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Common Files\\services.exe\", \"C:\\Program Files (x86)\\Google\\winlogon.exe\", \"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\", \"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\", \"C:\\Users\\Public\\Pictures\\csrss.exe\", \"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\", \"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\", \"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe -
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 696 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 336 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3924 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4860 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5060 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3588 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4092 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4504 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4952 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3452 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3440 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5108 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 3088 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 3088 schtasks.exe 84 -
resource yara_rule behavioral2/memory/1480-1-0x0000000000260000-0x000000000046C000-memory.dmp dcrat behavioral2/files/0x00070000000233f1-23.dat dcrat behavioral2/files/0x000a000000023411-67.dat dcrat behavioral2/files/0x00090000000233e6-78.dat dcrat behavioral2/files/0x00080000000233ec-100.dat dcrat behavioral2/files/0x00090000000233ed-111.dat dcrat behavioral2/files/0x00090000000233f1-122.dat dcrat behavioral2/files/0x00080000000233f9-133.dat dcrat behavioral2/files/0x00090000000233fc-144.dat dcrat behavioral2/files/0x0009000000023404-166.dat dcrat behavioral2/memory/4848-242-0x0000000000F80000-0x000000000118C000-memory.dmp dcrat -
Detects executables containing bas64 encoded gzip files 11 IoCs
resource yara_rule behavioral2/memory/1480-1-0x0000000000260000-0x000000000046C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x00070000000233f1-23.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x000a000000023411-67.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x00090000000233e6-78.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x00080000000233ec-100.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x00090000000233ed-111.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x00090000000233f1-122.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x00080000000233f9-133.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x00090000000233fc-144.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/files/0x0009000000023404-166.dat INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File behavioral2/memory/4848-242-0x0000000000F80000-0x000000000118C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File -
Detects executables packed with SmartAssembly 3 IoCs
resource yara_rule behavioral2/memory/1480-6-0x00000000026C0000-0x00000000026D0000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/1480-11-0x000000001B600000-0x000000001B60C000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/1480-14-0x000000001B6D0000-0x000000001B6DA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe -
Executes dropped EXE 1 IoCs
pid Process 4848 sihost.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Windows Media Player\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Google\\winlogon.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Public\\Pictures\\csrss.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Common Files\\services.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Windows\\GameBarPresenceWriter\\sihost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Program Files\\Windows Defender\\uk-UA\\backgroundTaskHost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\7-Zip\\Lang\\sppsvc.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Common Files\\services.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\SoftwareDistribution\\Download\\sppsvc.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\SystemApps\\Microsoft.ECApp_8wekyb3d8bbwe\\lsass.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Google\\winlogon.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Reference Assemblies\\fontdrvhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Downloaded Program Files\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Recovery\\WindowsRE\\spoolsv.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Public\\Pictures\\csrss.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Reference Assemblies\\fontdrvhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Downloaded Program Files\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Windows Media Player\\dllhost.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Recovery\\WindowsRE\\spoolsv.exe\"" 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\sppsvc.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\7-Zip\Lang\0a1fd5f707cd16 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\Windows Media Player\dllhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Google\RCX5A1A.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\backgroundTaskHost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\dllhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\Common Files\services.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files (x86)\Google\winlogon.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Common Files\RCX57E6.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCX69A8.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Windows Media Player\dllhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Common Files\services.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\Windows Defender\uk-UA\backgroundTaskHost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\Windows Media Player\5940a34987c991 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Common Files\RCX57E7.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Google\RCX5A98.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX64B2.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX6434.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\RCX6BAD.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files (x86)\Google\cc11b995f2a76d 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\Windows Defender\uk-UA\eddb19405b7ce1 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files (x86)\Windows Portable Devices\dllhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files (x86)\Windows Portable Devices\5940a34987c991 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files (x86)\Reference Assemblies\fontdrvhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files (x86)\Reference Assemblies\5b884080fd4f94 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\fontdrvhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\Common Files\c5b4cb5e9653cc 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Google\winlogon.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Windows Media Player\RCX714F.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\smss.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\RCX61A2.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Windows Media Player\RCX70D1.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\RCX6220.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\RCX6C2B.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files\7-Zip\Lang\sppsvc.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCX693A.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\Downloaded Program Files\dllhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\lsass.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\RCX6735.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\Downloaded Program Files\RCX6ECD.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\Downloaded Program Files\dllhost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\GameBarPresenceWriter\sihost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\GameBarPresenceWriter\66fc9ff0ee96c2 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\6203df4a6bafc7 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\GameBarPresenceWriter\sihost.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\lsass.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\SoftwareDistribution\Download\sppsvc.exe 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\SoftwareDistribution\Download\0a1fd5f707cd16 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\GameBarPresenceWriter\RCX5D0B.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\Downloaded Program Files\RCX6E4F.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File created C:\Windows\Downloaded Program Files\5940a34987c991 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\GameBarPresenceWriter\RCX5C9D.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe File opened for modification C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\RCX66B7.tmp 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1796 schtasks.exe 2156 schtasks.exe 2180 schtasks.exe 1876 schtasks.exe 4504 schtasks.exe 1488 schtasks.exe 2220 schtasks.exe 5060 schtasks.exe 2684 schtasks.exe 444 schtasks.exe 4028 schtasks.exe 2864 schtasks.exe 4860 schtasks.exe 4772 schtasks.exe 2536 schtasks.exe 4540 schtasks.exe 1508 schtasks.exe 4356 schtasks.exe 3692 schtasks.exe 3452 schtasks.exe 3688 schtasks.exe 5108 schtasks.exe 2688 schtasks.exe 696 schtasks.exe 3588 schtasks.exe 2828 schtasks.exe 4688 schtasks.exe 2996 schtasks.exe 4952 schtasks.exe 3440 schtasks.exe 1216 schtasks.exe 3924 schtasks.exe 536 schtasks.exe 2292 schtasks.exe 336 schtasks.exe 1444 schtasks.exe 4092 schtasks.exe 4412 schtasks.exe 1044 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 4848 sihost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe Token: SeDebugPrivilege 4848 sihost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1480 wrote to memory of 4848 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 131 PID 1480 wrote to memory of 4848 1480 951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe"C:\Users\Admin\AppData\Local\Temp\951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\GameBarPresenceWriter\sihost.exe"C:\Windows\GameBarPresenceWriter\sihost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Common Files\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Windows\GameBarPresenceWriter\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\GameBarPresenceWriter\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Windows\GameBarPresenceWriter\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Windows\SoftwareDistribution\Download\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\Download\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Windows\SoftwareDistribution\Download\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Pictures\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\Pictures\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Pictures\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\uk-UA\backgroundTaskHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\uk-UA\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\uk-UA\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\Lang\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\SystemApps\Microsoft.ECApp_8wekyb3d8bbwe\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\Downloaded Program Files\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Windows\Downloaded Program Files\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5c03024ff7d58a4baff1b40a77ddd673c
SHA1643629b25534535ff882077d87f81c07f922beb9
SHA256c12023087cbf371548ef0e6ff0fac6a8b87f5d0a208ac59eedddb8cbe646c9e2
SHA512308e2ee8020aab856ddba7f34b4cd91e3a2c2ac4741a229a7204fd16f5737b7b569ab4bf7f9348c63fa0ea7b5436da6e9f76f1217675700ab0e3aa9c2f618916
-
Filesize
2.0MB
MD5b1dde1fd67a9bf7977d3dee14208713b
SHA10477648014c687fce729872496012ad868eea768
SHA2569aa6c4396dd3a46c8edca8eb502b6adab638bb004febb7b3b3a1169d9cc983d4
SHA512316656892997900a5790bd2782b71d3ca40139ed085edfad0f0b4ec3954937d6036484d0cc3c457eea4cf4e02833b49d071245bb67a89c77e7271e48a1eb3b3a
-
Filesize
2.0MB
MD5c87e8c43ca46ec4b38af20d79a7d7f02
SHA136539d4f6c0407b3d289fbba229f8b021bc89a80
SHA256e21f8823db4ea2c0ff606ab40a0e2454cea52e19adde47214320ccb885e50869
SHA512dccdf8b94688b5cac0095c4723091c797daa7f85599eff83e6119978f1644add11e3397be67addd939ef9812fc122ad5b78f49aee0133f778432d78054951a2e
-
Filesize
2.0MB
MD51382b470dac7f0131e5f51c9a26a57dc
SHA15ec604e018979d89fa00a1bb1ad84957815cc3a7
SHA25625e7eb7e7d4698b7d3444ce67ac48d2ce725654f313644e934905d5117378bf9
SHA512404f779f059cdbc909ba36d2ccd6f58a8d894d0f31934d06a5e186c2fd41079c83c42c9d7d50176fe7fe2bfe85a5d787642f642cf340a42d9b918516e52fa797
-
Filesize
2.0MB
MD55617d8a4d168defbccf1ae857675e214
SHA1fe7284981ed21a244324525fb5a42bf9907f7b6d
SHA256bc891e9d2d7d396d59af2e66c22c20229dcfbbc7eb1c9782d191b7640b336a24
SHA512c6a1729f6cc00a8be4514d52617e4de7de0dee95c87300a13e8199308d1d9f9a6386ca6a0ab8e2e92ae910f3232f1225b80ff31a9c1205116bd8669ae1a0b219
-
Filesize
2.0MB
MD589f4f31cad843d18be12ad87fa44ab83
SHA1e056afb389c366bf988bf1756e294ec71f3b6887
SHA256151391586e64bae9f78f6ba8b0d325febf1afdfacb576bd91cbeaab46fe2e273
SHA5124fb2f59c72248476273836f7a5e4a23069eb86f46b1f7c06cf9103c0815d9729d83f2d1a56622e24f4744c314b1357928ea09486ba5340a12a198ed65688a972
-
Filesize
2.0MB
MD57a92d788bf63e3e0446c25e4b7dd3f9a
SHA1482860a3d765b91779840f3510690a4130fcfdc4
SHA256951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba
SHA512171d61faaa7812c4045d6a552a4e166786ab2c11cd89ac89adcc545a2222e0c81e880de4b4eba2118f0df5716ab54591c84ab852bd47f9bc57f6b26dd1eb034a
-
Filesize
2.0MB
MD542a3309404968b1db33f1b00b15984cf
SHA19f419520d7a8cbd62d4af83f2d8f36ca6df8f4ff
SHA25684b3df302c5fa7bf031e9031a8c8a857b11af7603f33ab7681fdbd98e400d705
SHA5129941103c378640407bafa2025f7eb73798e1662708dd5fb29cdafbf6883b047f9d59399cc7a42b934f2b03787ff2183bc4ed2d1473fc4489fad9ad36e0e34073
-
Filesize
2.0MB
MD526e0bd39107933e7442f205e49206331
SHA1228ddf9f46ed5fa5428d161b7751f05d647b83e2
SHA2569fd04fe08b58bc95afd51751c70b64ac1a1ad33c4027bb3aeb272a0505cbf1af
SHA5128970ff9dacd1db762ed93fc5a93507c24c76925d919fd08e6a107c9c68af1f6b94c545a5eb0379ed7466d3461fd2d0a6034d69e22b2ace5e8a6dbfd38047c64d