Malware Analysis Report

2024-10-10 12:59

Sample ID 240602-p87qrsdg95
Target 1deb00cff6555ece35fe0efab318157f.exe
SHA256 6b244947ef595c13d24c2121da10beebb1ab3b10c52a04e6b1a104d3c237798b
Tags
rat dcrat infostealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6b244947ef595c13d24c2121da10beebb1ab3b10c52a04e6b1a104d3c237798b

Threat Level: Known bad

The file 1deb00cff6555ece35fe0efab318157f.exe was found to be: Known bad.

Malicious Activity Summary

rat dcrat infostealer spyware stealer

Dcrat family

DcRat

Process spawned unexpected child process

DCRat payload

DCRat payload

Checks computer location settings

Executes dropped EXE

Reads user/profile data of web browsers

Drops file in Windows directory

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-02 13:01

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 13:01

Reported

2024-06-02 13:03

Platform

win7-20240221-en

Max time kernel

119s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\MSOCache\All Users\wininit.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Windows NT\TableTextService\sppsvc.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Common Files\Services\taskhost.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Idle.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files\Windows NT\TableTextService\0a1fd5f707cd16 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Common Files\Services\b75386f1303e64 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\6ccacd8608530f C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files\Windows Sidebar\Shared Gadgets\886983d96e3d3e C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Internet Explorer\spoolsv.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Internet Explorer\f3b6ecef712a24 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Windows Media Player\Media Renderer\dllhost.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Windows Media Player\Media Renderer\5940a34987c991 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\taskhost.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\b75386f1303e64 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Windows\Speech\Common\de-DE\smss.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Windows\Boot\PCAT\smss.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\MSOCache\All Users\wininit.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
Token: SeDebugPrivilege N/A C:\MSOCache\All Users\wininit.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe

"C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\wininit.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\wininit.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\wininit.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\taskhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows NT\TableTextService\sppsvc.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\sppsvc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\TableTextService\sppsvc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Common Files\Services\taskhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Services\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Common Files\Services\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Idle.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\Media Renderer\dllhost.exe'" /rl HIGHEST /f

C:\MSOCache\All Users\wininit.exe

"C:\MSOCache\All Users\wininit.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 a0988419.xsph.ru udp
RU 141.8.194.203:80 a0988419.xsph.ru tcp
RU 141.8.194.203:80 a0988419.xsph.ru tcp
RU 141.8.194.203:80 a0988419.xsph.ru tcp
RU 141.8.194.203:80 a0988419.xsph.ru tcp

Files

memory/1740-0-0x000007FEF58C3000-0x000007FEF58C4000-memory.dmp

memory/1740-1-0x00000000009F0000-0x0000000000B40000-memory.dmp

memory/1740-2-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp

memory/1740-3-0x0000000000250000-0x000000000026C000-memory.dmp

memory/1740-4-0x0000000000270000-0x0000000000286000-memory.dmp

memory/1740-5-0x0000000000290000-0x00000000002A2000-memory.dmp

memory/1740-6-0x00000000002A0000-0x00000000002AE000-memory.dmp

C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Idle.exe

MD5 1deb00cff6555ece35fe0efab318157f
SHA1 612c66abb6befaefa48af8fe5f5aac9a48fa9846
SHA256 6b244947ef595c13d24c2121da10beebb1ab3b10c52a04e6b1a104d3c237798b
SHA512 0639c0646d7dc6925dfc4fd3f3886321b8b9612727d50b0b619d850419d96dadf58ab17f918001b8094d8450934b1b83c9102fe135823151334358545d1a655d

memory/992-29-0x0000000000260000-0x00000000003B0000-memory.dmp

memory/1740-30-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp

memory/992-31-0x0000000000250000-0x0000000000262000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 13:01

Reported

2024-06-02 13:03

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Windows Mail\dllhost.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Windows Mail\5940a34987c991 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\5b884080fd4f94 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SearchApp.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\38384e6a620884 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Logs\SettingSync\Registry.exe C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
File created C:\Windows\Logs\SettingSync\ee2ad38f3d4382 C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Public\AccountPictures\dwm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Public\AccountPictures\dwm.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe

"C:\Users\Admin\AppData\Local\Temp\1deb00cff6555ece35fe0efab318157f.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Windows\Logs\SettingSync\Registry.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\Logs\SettingSync\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Windows\Logs\SettingSync\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Default\NetHood\csrss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\NetHood\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Default\NetHood\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Users\Public\AccountPictures\dwm.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\dwm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Public\AccountPictures\dwm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Mail\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "1deb00cff6555ece35fe0efab318157f1" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\1deb00cff6555ece35fe0efab318157f.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "1deb00cff6555ece35fe0efab318157f" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\1deb00cff6555ece35fe0efab318157f.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "1deb00cff6555ece35fe0efab318157f1" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\1deb00cff6555ece35fe0efab318157f.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SearchApp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Saved Games\smss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Admin\Saved Games\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Saved Games\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\SearchApp.exe'" /rl HIGHEST /f

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ghtY4impui.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Users\Public\AccountPictures\dwm.exe

"C:\Users\Public\AccountPictures\dwm.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 a0988419.xsph.ru udp
RU 141.8.194.203:80 a0988419.xsph.ru tcp
RU 141.8.194.203:80 a0988419.xsph.ru tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 203.194.8.141.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
RU 141.8.194.203:80 a0988419.xsph.ru tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
RU 141.8.194.203:80 a0988419.xsph.ru tcp
US 8.8.8.8:53 63.141.182.52.in-addr.arpa udp

Files

memory/636-0-0x0000000000210000-0x0000000000360000-memory.dmp

memory/636-1-0x00007FFED2853000-0x00007FFED2855000-memory.dmp

memory/636-2-0x00007FFED2850000-0x00007FFED3311000-memory.dmp

memory/636-3-0x0000000002580000-0x000000000259C000-memory.dmp

memory/636-6-0x000000001AFA0000-0x000000001AFB2000-memory.dmp

memory/636-5-0x000000001AF80000-0x000000001AF96000-memory.dmp

memory/636-4-0x000000001AFD0000-0x000000001B020000-memory.dmp

memory/636-7-0x000000001BC30000-0x000000001C158000-memory.dmp

memory/636-8-0x000000001B020000-0x000000001B02E000-memory.dmp

C:\Program Files (x86)\Windows Mail\dllhost.exe

MD5 1deb00cff6555ece35fe0efab318157f
SHA1 612c66abb6befaefa48af8fe5f5aac9a48fa9846
SHA256 6b244947ef595c13d24c2121da10beebb1ab3b10c52a04e6b1a104d3c237798b
SHA512 0639c0646d7dc6925dfc4fd3f3886321b8b9612727d50b0b619d850419d96dadf58ab17f918001b8094d8450934b1b83c9102fe135823151334358545d1a655d

memory/636-34-0x00007FFED2850000-0x00007FFED3311000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ghtY4impui.bat

MD5 fac43bf60b1fbd0473d4842dde642897
SHA1 cbc7865b9a55c453e1a86160121f438e2e0134f7
SHA256 1cc0f898c86cd50302b298b38fd31a1155950c0c52f1212fb847cac388123a57
SHA512 dfa9534c706503761e37a8196334a2ba2c130fc8f50f591d24c179e7c62832ce2cac97e2cb49e575eaf5d5d14b07f324b7566727cb4246eb9d825348e8ada28f

memory/4948-39-0x0000000000950000-0x0000000000962000-memory.dmp