Malware Analysis Report

2024-10-10 13:03

Sample ID 240619-nj2msazake
Target dc.exe
SHA256 29c1eca587a0180b5cdfc0e939ef5b1bb201335d2dea2a1c6427ce37af68325a
Tags
rat dcrat evasion infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

29c1eca587a0180b5cdfc0e939ef5b1bb201335d2dea2a1c6427ce37af68325a

Threat Level: Known bad

The file dc.exe was found to be: Known bad.

Malicious Activity Summary

rat dcrat evasion infostealer trojan

Dcrat family

DcRat

DCRat payload

UAC bypass

Process spawned unexpected child process

DCRat payload

Executes dropped EXE

Checks computer location settings

Checks whether UAC is enabled

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Scheduled Task/Job: Scheduled Task

Suspicious use of AdjustPrivilegeToken

System policy modification

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-19 11:26

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 11:26

Reported

2024-06-19 11:28

Platform

win7-20240508-en

Max time kernel

118s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dc.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Program Files\Uninstall Information\Idle.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Program Files\Uninstall Information\Idle.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Program Files\Uninstall Information\Idle.exe N/A

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Program Files\Uninstall Information\Idle.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Program Files\Uninstall Information\Idle.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Uninstall Information\Idle.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files\Uninstall Information\6ccacd8608530f C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files\Windows Journal\es-ES\Idle.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files\Windows Journal\es-ES\6ccacd8608530f C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\it-IT\smss.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\it-IT\69ddcba757bf72 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Portable Devices\dllhost.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Portable Devices\5940a34987c991 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\fr-FR\b75386f1303e64 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Windows\fr-FR\taskhost.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A
N/A N/A C:\Program Files\Uninstall Information\Idle.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Uninstall Information\Idle.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Program Files\Uninstall Information\Idle.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Program Files\Uninstall Information\Idle.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Program Files\Uninstall Information\Idle.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\dc.exe

"C:\Users\Admin\AppData\Local\Temp\dc.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Journal\es-ES\Idle.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\es-ES\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Journal\es-ES\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\smss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\NetHood\lsass.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Admin\NetHood\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\NetHood\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\spoolsv.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\spoolsv.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Windows\fr-FR\taskhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\fr-FR\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Windows\fr-FR\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\Idle.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\Idle.exe'" /rl HIGHEST /f

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uNqveKhxnf.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Program Files\Uninstall Information\Idle.exe

"C:\Program Files\Uninstall Information\Idle.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 a0995830.xsph.ru udp
US 8.8.8.8:53 a0995830.xsph.ru udp

Files

memory/2228-0-0x000007FEF5793000-0x000007FEF5794000-memory.dmp

memory/2228-1-0x0000000000130000-0x00000000003B6000-memory.dmp

memory/2228-2-0x000007FEF5790000-0x000007FEF617C000-memory.dmp

memory/2228-3-0x0000000000470000-0x000000000048C000-memory.dmp

memory/2228-4-0x0000000000490000-0x00000000004A6000-memory.dmp

memory/2228-5-0x0000000000450000-0x0000000000462000-memory.dmp

memory/2228-6-0x00000000004B0000-0x00000000004B8000-memory.dmp

memory/2228-7-0x0000000000840000-0x000000000084A000-memory.dmp

memory/2228-8-0x0000000000850000-0x00000000008A6000-memory.dmp

memory/2228-9-0x00000000004C0000-0x00000000004CC000-memory.dmp

memory/2228-10-0x00000000007B0000-0x00000000007B8000-memory.dmp

memory/2228-11-0x00000000008A0000-0x00000000008B2000-memory.dmp

memory/2228-12-0x00000000008B0000-0x00000000008BC000-memory.dmp

memory/2228-13-0x00000000023A0000-0x00000000023AC000-memory.dmp

C:\Program Files (x86)\Windows Sidebar\it-IT\smss.exe

MD5 0dfb562500251ae8c085e6e8db7fe3d1
SHA1 00a1c6bb0bd7d99d54e96b714592f4a070b81641
SHA256 29c1eca587a0180b5cdfc0e939ef5b1bb201335d2dea2a1c6427ce37af68325a
SHA512 05578a1553b38cd22570cb5b8bc6e3d4064ab6cf5d05a8537a5a4dd849aac4eda933ccf94d7f765ed03c40b67c6cd89412e15bdbad3a493681cad17387270004

C:\Users\Admin\AppData\Local\Temp\uNqveKhxnf.bat

MD5 9219f6131ad3735190f36504cc3a9db0
SHA1 cee4309a97f547c61f2c171f1a1ba28851690495
SHA256 9f60b4ad42de62c42121ca99bfea7b905f50b1967e8e4abd6edfb5eee7f777a7
SHA512 b161159af348344ae8ff96c6cd57acdff842f09914ed6612b09f05de82541c5699567b9e558e11e6c98c3815a268cac8e7f347a5753e818c3e238cea0aff44c6

memory/2228-39-0x000007FEF5790000-0x000007FEF617C000-memory.dmp

memory/1104-42-0x0000000001390000-0x0000000001616000-memory.dmp

memory/1104-43-0x00000000003E0000-0x00000000003F2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 11:26

Reported

2024-06-19 11:29

Platform

win10v2004-20240508-en

Max time kernel

146s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dc.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Windows\Performance\WinSAT\lsass.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\Performance\WinSAT\lsass.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Windows\Performance\WinSAT\lsass.exe N/A

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Performance\WinSAT\lsass.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\Performance\WinSAT\lsass.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\WindowsApps\sppsvc.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files\Windows Defender\fr-FR\TextInputHost.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Mail\upfc.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Mail\ea1d8f6d871115 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Multimedia Platform\6ccacd8608530f C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files\Windows Defender\fr-FR\22eafd247d37c3 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\9e8d7a4ca61bd9 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Program Files (x86)\Windows Multimedia Platform\Idle.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Performance\WinSAT\lsass.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File opened for modification C:\Windows\Performance\WinSAT\lsass.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Windows\Performance\WinSAT\6203df4a6bafc7 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Windows\bcastdvr\SppExtComObj.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Windows\bcastdvr\e1ef82546f0b02 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Windows\AppReadiness\RuntimeBroker.exe C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
File created C:\Windows\AppReadiness\9e8d7a4ca61bd9 C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\dc.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A
N/A N/A C:\Windows\Performance\WinSAT\lsass.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Performance\WinSAT\lsass.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4376 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\dc.exe C:\Windows\System32\cmd.exe
PID 4376 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\dc.exe C:\Windows\System32\cmd.exe
PID 1932 wrote to memory of 3016 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1932 wrote to memory of 3016 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1932 wrote to memory of 2992 N/A C:\Windows\System32\cmd.exe C:\Windows\Performance\WinSAT\lsass.exe
PID 1932 wrote to memory of 2992 N/A C:\Windows\System32\cmd.exe C:\Windows\Performance\WinSAT\lsass.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\dc.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\Performance\WinSAT\lsass.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Windows\Performance\WinSAT\lsass.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Windows\Performance\WinSAT\lsass.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\dc.exe

"C:\Users\Admin\AppData\Local\Temp\dc.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\lsass.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\Performance\WinSAT\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Windows\bcastdvr\SppExtComObj.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\bcastdvr\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Windows\bcastdvr\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\fr-FR\TextInputHost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\fr-FR\TextInputHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\fr-FR\TextInputHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\upfc.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\upfc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\upfc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Desktop\TextInputHost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Public\Desktop\TextInputHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Desktop\TextInputHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Idle.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Microsoft\MapData\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\MapData\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft\MapData\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Windows\AppReadiness\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\AppReadiness\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\AppReadiness\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FIBwHfliDK.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Performance\WinSAT\lsass.exe

"C:\Windows\Performance\WinSAT\lsass.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 a0995830.xsph.ru udp
RU 141.8.192.58:80 a0995830.xsph.ru tcp
US 8.8.8.8:53 58.192.8.141.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 138.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp

Files

memory/4376-0-0x00007FF84DBE3000-0x00007FF84DBE5000-memory.dmp

memory/4376-1-0x0000000000DC0000-0x0000000001046000-memory.dmp

memory/4376-2-0x00007FF84DBE0000-0x00007FF84E6A1000-memory.dmp

memory/4376-3-0x0000000001810000-0x000000000182C000-memory.dmp

memory/4376-4-0x000000001C230000-0x000000001C280000-memory.dmp

memory/4376-6-0x00000000032B0000-0x00000000032C2000-memory.dmp

memory/4376-5-0x0000000001840000-0x0000000001856000-memory.dmp

memory/4376-7-0x000000001BCA0000-0x000000001BCA8000-memory.dmp

memory/4376-8-0x000000001C1F0000-0x000000001C1FA000-memory.dmp

memory/4376-9-0x000000001C380000-0x000000001C3D6000-memory.dmp

memory/4376-10-0x000000001BCB0000-0x000000001BCBC000-memory.dmp

memory/4376-11-0x000000001BCC0000-0x000000001BCC8000-memory.dmp

memory/4376-12-0x000000001C1E0000-0x000000001C1F2000-memory.dmp

memory/4376-13-0x000000001CBB0000-0x000000001D0D8000-memory.dmp

memory/4376-14-0x000000001C220000-0x000000001C22C000-memory.dmp

memory/4376-15-0x000000001C540000-0x000000001C54C000-memory.dmp

C:\Recovery\WindowsRE\RuntimeBroker.exe

MD5 0dfb562500251ae8c085e6e8db7fe3d1
SHA1 00a1c6bb0bd7d99d54e96b714592f4a070b81641
SHA256 29c1eca587a0180b5cdfc0e939ef5b1bb201335d2dea2a1c6427ce37af68325a
SHA512 05578a1553b38cd22570cb5b8bc6e3d4064ab6cf5d05a8537a5a4dd849aac4eda933ccf94d7f765ed03c40b67c6cd89412e15bdbad3a493681cad17387270004

memory/4376-45-0x00007FF84DBE0000-0x00007FF84E6A1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FIBwHfliDK.bat

MD5 42ac9cb88052b2df8be408757c311b1f
SHA1 593375919c121bc536d9be462fd8c1e6f2e58ace
SHA256 905f93a960b0e725f5808247c965bd17ced880a0ee359b2139d45f0493ac1c8f
SHA512 8e114f078f47069723815b676ee8c0c29132eead73bb504d9397db549b18b47fd28b79c4d09980ba291dc8c12a872f7f9bbdc85c3829f835c10304c609653dd9

memory/2992-50-0x000000001CB70000-0x000000001CB82000-memory.dmp

memory/2992-51-0x000000001CF00000-0x000000001CF12000-memory.dmp