Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe
Resource
win7-20240508-en
General
-
Target
13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe
-
Size
1.6MB
-
MD5
a0fc62e3b7ee3716781698677ef0a315
-
SHA1
679ee9e6c503af58943768fac7801a0c85149728
-
SHA256
13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc
-
SHA512
6d5f5cde273aebea5e97561c94e3a068e3b966dc0d8455d90f0bedcefbe2cd888457c60f639e77cdd3e6bd2b79b45fe1467f6eded81ddaf92ff6fde1bd2ba30b
-
SSDEEP
49152:BI3GKRB71HIfHaM+j4av2JIZF9YvOaXdFi:qPRB5HISGauJIn95eo
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 64 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3280 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4212 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4636 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4628 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3892 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3644 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3680 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1424 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 460 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3768 4088 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4200 4088 schtasks.exe -
Processes:
wininit.exeComContainer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ComContainer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ComContainer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ComContainer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe dcrat C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\ComContainer.exe dcrat behavioral2/memory/3020-25-0x0000000000880000-0x0000000000A4E000-memory.dmp dcrat -
Detects executables packed with SmartAssembly 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3020-31-0x000000001B6B0000-0x000000001B6BA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/3020-37-0x000000001BF30000-0x000000001BF3C000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral2/memory/3020-40-0x000000001BF60000-0x000000001BF6A000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exeDCRatBuild.exeWScript.exeComContainer.exewininit.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation DCRatBuild.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ComContainer.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation wininit.exe -
Executes dropped EXE 3 IoCs
Processes:
DCRatBuild.exeComContainer.exewininit.exepid process 1776 DCRatBuild.exe 3020 ComContainer.exe 4452 wininit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
wininit.exeComContainer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ComContainer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ComContainer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe -
Drops file in Program Files directory 6 IoCs
Processes:
ComContainer.exedescription ioc process File created C:\Program Files (x86)\Microsoft.NET\RedistList\wininit.exe ComContainer.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\wininit.exe ComContainer.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\56085415360792 ComContainer.exe File created C:\Program Files (x86)\Windows Defender\uk-UA\dwm.exe ComContainer.exe File created C:\Program Files (x86)\Windows Defender\uk-UA\6cb0b6c459d5d3 ComContainer.exe File created C:\Program Files\ModifiableWindowsApps\sihost.exe ComContainer.exe -
Drops file in Windows directory 10 IoCs
Processes:
ComContainer.exedescription ioc process File created C:\Windows\AppReadiness\SppExtComObj.exe ComContainer.exe File created C:\Windows\AppReadiness\e1ef82546f0b02 ComContainer.exe File created C:\Windows\Globalization\ICU\5b884080fd4f94 ComContainer.exe File created C:\Windows\tracing\OfficeClickToRun.exe ComContainer.exe File created C:\Windows\tracing\e6c9b481da804f ComContainer.exe File created C:\Windows\Setup\SppExtComObj.exe ComContainer.exe File created C:\Windows\Setup\e1ef82546f0b02 ComContainer.exe File created C:\Windows\Globalization\ICU\fontdrvhost.exe ComContainer.exe File created C:\Windows\Migration\WTR\System.exe ComContainer.exe File created C:\Windows\Migration\WTR\27d1bcfc3c54e0 ComContainer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3892 schtasks.exe 1328 schtasks.exe 3680 schtasks.exe 4344 schtasks.exe 3968 schtasks.exe 2744 schtasks.exe 4628 schtasks.exe 3676 schtasks.exe 460 schtasks.exe 3768 schtasks.exe 2028 schtasks.exe 4636 schtasks.exe 2748 schtasks.exe 1424 schtasks.exe 4200 schtasks.exe 1200 schtasks.exe 3612 schtasks.exe 2508 schtasks.exe 4212 schtasks.exe 1012 schtasks.exe 924 schtasks.exe 2592 schtasks.exe 64 schtasks.exe 2420 schtasks.exe 3644 schtasks.exe 3540 schtasks.exe 3280 schtasks.exe -
Modifies registry class 2 IoCs
Processes:
DCRatBuild.exewininit.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings wininit.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
ComContainer.exewininit.exepid process 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 3020 ComContainer.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe 4452 wininit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
wininit.exepid process 4452 wininit.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
ComContainer.exewininit.exevssvc.exedescription pid process Token: SeDebugPrivilege 3020 ComContainer.exe Token: SeDebugPrivilege 4452 wininit.exe Token: SeBackupPrivilege 4092 vssvc.exe Token: SeRestorePrivilege 4092 vssvc.exe Token: SeAuditPrivilege 4092 vssvc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exeDCRatBuild.exeWScript.execmd.exeComContainer.exewininit.exedescription pid process target process PID 3540 wrote to memory of 1776 3540 13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe DCRatBuild.exe PID 3540 wrote to memory of 1776 3540 13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe DCRatBuild.exe PID 3540 wrote to memory of 1776 3540 13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe DCRatBuild.exe PID 1776 wrote to memory of 1864 1776 DCRatBuild.exe WScript.exe PID 1776 wrote to memory of 1864 1776 DCRatBuild.exe WScript.exe PID 1776 wrote to memory of 1864 1776 DCRatBuild.exe WScript.exe PID 1864 wrote to memory of 2680 1864 WScript.exe cmd.exe PID 1864 wrote to memory of 2680 1864 WScript.exe cmd.exe PID 1864 wrote to memory of 2680 1864 WScript.exe cmd.exe PID 2680 wrote to memory of 3020 2680 cmd.exe ComContainer.exe PID 2680 wrote to memory of 3020 2680 cmd.exe ComContainer.exe PID 3020 wrote to memory of 4452 3020 ComContainer.exe wininit.exe PID 3020 wrote to memory of 4452 3020 ComContainer.exe wininit.exe PID 4452 wrote to memory of 1992 4452 wininit.exe WScript.exe PID 4452 wrote to memory of 1992 4452 wininit.exe WScript.exe PID 4452 wrote to memory of 2532 4452 wininit.exe WScript.exe PID 4452 wrote to memory of 2532 4452 wininit.exe WScript.exe -
System policy modification 1 TTPs 6 IoCs
Processes:
ComContainer.exewininit.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ComContainer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ComContainer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ComContainer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe"C:\Users\Admin\AppData\Local\Temp\13cc97185f7caa3a67fb2f2325ae2741db7f880eeab103799cd3a2747056ccbc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\JFcWz5uGBCcQNylIeBn.vbe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\FCDPQha3l1059hFdl7xiPA.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\ComContainer.exe"C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\ComContainer.exe"5⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Microsoft.NET\RedistList\wininit.exe"C:\Program Files (x86)\Microsoft.NET\RedistList\wininit.exe"6⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\af6a99c3-65be-443f-94a2-259974fe0559.vbs"7⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1240ba21-0012-42fa-901f-9e60e5ff73b5.vbs"7⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Windows\AppReadiness\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\AppReadiness\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Windows\AppReadiness\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\Globalization\ICU\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Globalization\ICU\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Windows\Globalization\ICU\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Windows\tracing\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\tracing\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Windows\tracing\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Windows\Setup\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\Setup\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Windows\Setup\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Windows\Migration\WTR\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Windows\Migration\WTR\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1240ba21-0012-42fa-901f-9e60e5ff73b5.vbsFilesize
511B
MD5e9e89945f016947b385b5c02251bb4b9
SHA12e1f2b11bee983a60009163c1f20884d2ce0565a
SHA2562508cf47c73702593baf8d4e4b7f33d039c5e193f1eccbddb56bd558b042fac7
SHA5121224abbde6989196eca411413dd3fc45407224c28a8a10b794e7de7b506e38d51bd52ecda8cc3d9e8fadb1d50fb288d9408495646e085c690bc1e42203c7fc21
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exeFilesize
2.1MB
MD584c02f6e1108d21bc6d871d4f0e67dd1
SHA1fc46781b941cb8b9493d1f89a835e60eebad1fe1
SHA2560b3af1714c58b112a179b1efe5d9b381cba0c06450860ae8134b386fe2fe5e8f
SHA512c4ca21b5b571eaaa58f63134337b2d01f9aba2dd1684a5ca2e57c8df34cf266b846fddc21f2b567cec3c714d08d47103059cb848a1a5e9efcaf6b3efde069510
-
C:\Users\Admin\AppData\Local\Temp\af6a99c3-65be-443f-94a2-259974fe0559.vbsFilesize
735B
MD596bce64f11626779ad4354b95f7567ee
SHA19776e368df24835a8113f70235b74f6266ec09fe
SHA256153bfffdf268af8fd866df3ca4cd01658b7ea70427912926cf445eced9ab0681
SHA512b52e1be2f1dabdb5be62bf6272c2f48e11b034a3d132b45af0319a01b67e13704a06b208f541592d80e8d69d7fb95b643c476fef2f2ee6866f3a53d6cbbe6bb2
-
C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\ComContainer.exeFilesize
1.8MB
MD5d4d11ed815db57efe9580e29900df34e
SHA114b275d8df38bad245b92c1980a1e0eb6491dbce
SHA256fb41a0fd339ab301f2f33eb97a562af1876e394493fe9f114fa6ff5f9f7d82b8
SHA512375d489af26b7c48e8d73f31e2105bab5f84e80e7f8c32813a6ca574583c3ace0dfc23720964fc10000b3eeda70ab34ca692b22c9c696fc046c6509f38f8263b
-
C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\FCDPQha3l1059hFdl7xiPA.batFilesize
52B
MD5b56593dfa47cd5d585cf8f8d88c11b05
SHA1c70b8eec01fe9102c2e7cd3605dab47756f9643e
SHA256bae7494aa08a5d634830c205febb819b546b1633d2d2c74be6b78eee19c5514c
SHA512402da79f69e08391217210a273eb735036760ebfd5115537c8965128e11640071ba76438d7d236b6c93db697e90f9a994a2fcc29fed02edcb7ef6195a703c7b4
-
C:\Users\Admin\AppData\Local\Temp\bridgehyperblockreviewdhcp\JFcWz5uGBCcQNylIeBn.vbeFilesize
229B
MD58f6a53617f67becfab8753b32ce07e70
SHA1111bfba12a529a29baf5c80300dd5f4432be5c20
SHA256146e2cc8c7a342377dde4a2d323fba53afa9833e66539de23d120f414c4ffd4e
SHA512e40ee02738f686db97275ab9c87c2b96081d7395c3fe6365ee19c3348dd3f09ee3d423ad686af4e2f9214a0e1e3078bd4e7e4c2030ea87545b2b57cc60f531dc
-
memory/3020-31-0x000000001B6B0000-0x000000001B6BA000-memory.dmpFilesize
40KB
-
memory/3020-34-0x000000001BCF0000-0x000000001BCFC000-memory.dmpFilesize
48KB
-
memory/3020-25-0x0000000000880000-0x0000000000A4E000-memory.dmpFilesize
1.8MB
-
memory/3020-26-0x0000000002BD0000-0x0000000002BDE000-memory.dmpFilesize
56KB
-
memory/3020-27-0x000000001B670000-0x000000001B68C000-memory.dmpFilesize
112KB
-
memory/3020-28-0x000000001BD30000-0x000000001BD80000-memory.dmpFilesize
320KB
-
memory/3020-29-0x000000001B690000-0x000000001B6A6000-memory.dmpFilesize
88KB
-
memory/3020-30-0x000000001B510000-0x000000001B520000-memory.dmpFilesize
64KB
-
memory/3020-38-0x000000001BF40000-0x000000001BF48000-memory.dmpFilesize
32KB
-
memory/3020-32-0x000000001B6C0000-0x000000001B6CC000-memory.dmpFilesize
48KB
-
memory/3020-33-0x000000001BCE0000-0x000000001BCE8000-memory.dmpFilesize
32KB
-
memory/3020-39-0x000000001BF50000-0x000000001BF5C000-memory.dmpFilesize
48KB
-
memory/3020-35-0x000000001BD00000-0x000000001BD12000-memory.dmpFilesize
72KB
-
memory/3020-36-0x000000001C460000-0x000000001C988000-memory.dmpFilesize
5.2MB
-
memory/3020-37-0x000000001BF30000-0x000000001BF3C000-memory.dmpFilesize
48KB
-
memory/3020-43-0x000000001BF90000-0x000000001BF9E000-memory.dmpFilesize
56KB
-
memory/3020-42-0x000000001BF80000-0x000000001BF88000-memory.dmpFilesize
32KB
-
memory/3020-41-0x000000001BF70000-0x000000001BF7E000-memory.dmpFilesize
56KB
-
memory/3020-40-0x000000001BF60000-0x000000001BF6A000-memory.dmpFilesize
40KB
-
memory/3540-11-0x00007FFAF23C0000-0x00007FFAF2E81000-memory.dmpFilesize
10.8MB
-
memory/3540-0-0x00007FFAF23C3000-0x00007FFAF23C5000-memory.dmpFilesize
8KB
-
memory/3540-7-0x00007FFAF23C0000-0x00007FFAF2E81000-memory.dmpFilesize
10.8MB
-
memory/3540-1-0x0000000000750000-0x00000000008E6000-memory.dmpFilesize
1.6MB
-
memory/4452-83-0x000000001DD20000-0x000000001DEE2000-memory.dmpFilesize
1.8MB