Analysis
-
max time kernel
130s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 21:46
Behavioral task
behavioral1
Sample
ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
ad6ef12cf7a949c7c81031cf356e7ba0
-
SHA1
749214f44093844f23cae9745564181fe8f76e48
-
SHA256
76a54ee4f1e1db1cf0f31c2a49c986c0ec18bce4e5c6260c3ace4553be58539f
-
SHA512
cf596585f323525947bc171cb086fc8f3c5378f757d3898fff85a513f8a7befa5c2516827cc7835263b3898b3cfc3789a0dfb5e8b1a5c6cfb3fb1f5ec9a1d437
-
SSDEEP
24576:X2G/nvxW3WL3pNa6DARahVL3Ly+kl7FOONSUzzX+DkChIxy6e97mUPlxtKeG:XbA3ipNa8ARAxHe4k7g6e97mml2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5788 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5660 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5768 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5744 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 452 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5772 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5748 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 516 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5296 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5332 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5720 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5676 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5040 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3388 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5084 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3380 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5156 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3976 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3844 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3880 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6044 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3408 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3396 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5560 4120 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 4120 schtasks.exe -
Processes:
resource yara_rule C:\MsproviderbrowserWinsaves\Surrogatebrowsercommon.exe dcrat behavioral2/memory/4952-13-0x00000000001E0000-0x0000000000312000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Surrogatebrowsercommon.exead6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Surrogatebrowsercommon.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
Processes:
Surrogatebrowsercommon.execonhost.exepid process 4952 Surrogatebrowsercommon.exe 5840 conhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 7 IoCs
Processes:
Surrogatebrowsercommon.exedescription ioc process File created C:\Program Files (x86)\Windows Photo Viewer\uk-UA\9e8d7a4ca61bd9 Surrogatebrowsercommon.exe File created C:\Program Files\Microsoft Office\root\Integration\Addons\OfficeClickToRun.exe Surrogatebrowsercommon.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OfficeClickToRun.exe Surrogatebrowsercommon.exe File created C:\Program Files\Microsoft Office\root\Integration\Addons\e6c9b481da804f Surrogatebrowsercommon.exe File created C:\Program Files\dotnet\swidtag\Registry.exe Surrogatebrowsercommon.exe File created C:\Program Files\dotnet\swidtag\ee2ad38f3d4382 Surrogatebrowsercommon.exe File created C:\Program Files (x86)\Windows Photo Viewer\uk-UA\RuntimeBroker.exe Surrogatebrowsercommon.exe -
Drops file in Windows directory 4 IoCs
Processes:
Surrogatebrowsercommon.exedescription ioc process File created C:\Windows\Migration\WTR\upfc.exe Surrogatebrowsercommon.exe File created C:\Windows\Migration\WTR\ea1d8f6d871115 Surrogatebrowsercommon.exe File created C:\Windows\SchCache\Surrogatebrowsercommon.exe Surrogatebrowsercommon.exe File created C:\Windows\SchCache\83019df36d0fbe Surrogatebrowsercommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5748 schtasks.exe 516 schtasks.exe 5296 schtasks.exe 1632 schtasks.exe 3976 schtasks.exe 3844 schtasks.exe 6044 schtasks.exe 5768 schtasks.exe 3408 schtasks.exe 5040 schtasks.exe 4332 schtasks.exe 1664 schtasks.exe 4524 schtasks.exe 5720 schtasks.exe 452 schtasks.exe 3388 schtasks.exe 5156 schtasks.exe 748 schtasks.exe 1400 schtasks.exe 3380 schtasks.exe 3880 schtasks.exe 1436 schtasks.exe 4908 schtasks.exe 5788 schtasks.exe 5332 schtasks.exe 2308 schtasks.exe 1216 schtasks.exe 3396 schtasks.exe 5660 schtasks.exe 2804 schtasks.exe 5772 schtasks.exe 5676 schtasks.exe 5084 schtasks.exe 3132 schtasks.exe 3752 schtasks.exe 1492 schtasks.exe 5560 schtasks.exe 5744 schtasks.exe 2828 schtasks.exe -
Modifies registry class 2 IoCs
Processes:
ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exeSurrogatebrowsercommon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings Surrogatebrowsercommon.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Surrogatebrowsercommon.execonhost.exepid process 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 4952 Surrogatebrowsercommon.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe 5840 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
conhost.exepid process 5840 conhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Surrogatebrowsercommon.execonhost.exedescription pid process Token: SeDebugPrivilege 4952 Surrogatebrowsercommon.exe Token: SeDebugPrivilege 5840 conhost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exeWScript.execmd.exeSurrogatebrowsercommon.execmd.exedescription pid process target process PID 2072 wrote to memory of 2448 2072 ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe WScript.exe PID 2072 wrote to memory of 2448 2072 ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe WScript.exe PID 2072 wrote to memory of 2448 2072 ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe WScript.exe PID 2448 wrote to memory of 456 2448 WScript.exe cmd.exe PID 2448 wrote to memory of 456 2448 WScript.exe cmd.exe PID 2448 wrote to memory of 456 2448 WScript.exe cmd.exe PID 456 wrote to memory of 4952 456 cmd.exe Surrogatebrowsercommon.exe PID 456 wrote to memory of 4952 456 cmd.exe Surrogatebrowsercommon.exe PID 4952 wrote to memory of 972 4952 Surrogatebrowsercommon.exe cmd.exe PID 4952 wrote to memory of 972 4952 Surrogatebrowsercommon.exe cmd.exe PID 972 wrote to memory of 3208 972 cmd.exe w32tm.exe PID 972 wrote to memory of 3208 972 cmd.exe w32tm.exe PID 972 wrote to memory of 5840 972 cmd.exe conhost.exe PID 972 wrote to memory of 5840 972 cmd.exe conhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ad6ef12cf7a949c7c81031cf356e7ba0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsproviderbrowserWinsaves\VryQRplJMzsaH3y.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\MsproviderbrowserWinsaves\RiZf3vztvgEONjpLmWUxXjcW5RE.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\MsproviderbrowserWinsaves\Surrogatebrowsercommon.exe"C:\MsproviderbrowserWinsaves\Surrogatebrowsercommon.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CNLJStqM9K.bat"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵
-
C:\Recovery\WindowsRE\conhost.exe"C:\Recovery\WindowsRE\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\root\Integration\Addons\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\root\Integration\Addons\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\root\Integration\Addons\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\MsproviderbrowserWinsaves\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\MsproviderbrowserWinsaves\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\MsproviderbrowserWinsaves\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Program Files\dotnet\swidtag\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\dotnet\swidtag\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Program Files\dotnet\swidtag\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Windows\Migration\WTR\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Windows\Migration\WTR\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Users\Default\PrintHood\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\PrintHood\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Users\Default\PrintHood\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SurrogatebrowsercommonS" /sc MINUTE /mo 10 /tr "'C:\Windows\SchCache\Surrogatebrowsercommon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Surrogatebrowsercommon" /sc ONLOGON /tr "'C:\Windows\SchCache\Surrogatebrowsercommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SurrogatebrowsercommonS" /sc MINUTE /mo 8 /tr "'C:\Windows\SchCache\Surrogatebrowsercommon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\MsproviderbrowserWinsaves\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\MsproviderbrowserWinsaves\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\MsproviderbrowserWinsaves\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MsproviderbrowserWinsaves\RiZf3vztvgEONjpLmWUxXjcW5RE.batFilesize
57B
MD505b28af400b64005b9c11137d62947f9
SHA1e6fa4a6992de2fbd18881ccb51d2c8d4e5194e24
SHA256d012c9842afe9c529e3de253b7e9e6794fea7ebac1c43058885892d907d4cd43
SHA51274f82ba15f23881f05a752ece48f6e7b5f7723ad0a270c9b14e1adefb650605d10f9039979cf47190b731d0bb24c7a4b815964b066263cee695c3b62b336452b
-
C:\MsproviderbrowserWinsaves\Surrogatebrowsercommon.exeFilesize
1.2MB
MD5a75639b5e75feaf62b23e393afa8304b
SHA1c62b0f325d84333f9a00ced7b22edb201953163b
SHA25631c7ae9bf5e9886f8a24ae125fa48b08894eac62fc1e833f4e7f1fd5cc7bfb22
SHA5122eaa91bff70326fcb7fc28e9132aa710fb067a6a24c5665971c990bb7ec8d59b0bf78d59330e94c1f4f3713e6bef936515e4141f435988cf4c54c550f70de208
-
C:\MsproviderbrowserWinsaves\VryQRplJMzsaH3y.vbeFilesize
229B
MD52dc9d82d3023616c78492a10ea81aaa5
SHA158b34007cd5850dc1c4829fea011fb2b3648d3f7
SHA25655cc74634296b7692eb7ae2df4f0e760a61d803ade7bddd66fa5c035821d0cd9
SHA512e08160d0c653184f250c95ad5ba6d04040b545a3e92131bf73dc52c5eb4a20d92624f1a6ce2c38a91088502ced75fef67fdc5c62800b2ff5b5b5e6002601ce14
-
C:\Users\Admin\AppData\Local\Temp\CNLJStqM9K.batFilesize
198B
MD546a39f85c753e64b815dae40b5c292ae
SHA17b8636b2c9dfcfb38f2d6f95bac50c393c07bc8f
SHA256aa2191e1043cda3b6e1c021d201f1b79f0e9a96e0d323caf786e542ac33918da
SHA51210bc07e3b0cc5c76d03dfc39f8ac5f7a38139bb79b44b41664fbe9ab2be58ce9f472dda74e0c2f458f8e7393eddb5a2cf5877c95ca4bd5c96bd3dc26ad5ae37c
-
memory/4952-12-0x00007FFF325C3000-0x00007FFF325C5000-memory.dmpFilesize
8KB
-
memory/4952-13-0x00000000001E0000-0x0000000000312000-memory.dmpFilesize
1.2MB
-
memory/4952-14-0x0000000002520000-0x000000000253C000-memory.dmpFilesize
112KB
-
memory/4952-15-0x000000001B500000-0x000000001B550000-memory.dmpFilesize
320KB
-
memory/4952-16-0x000000001AE60000-0x000000001AE76000-memory.dmpFilesize
88KB
-
memory/4952-17-0x00000000023E0000-0x00000000023EC000-memory.dmpFilesize
48KB