Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 01:43
Behavioral task
behavioral1
Sample
b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe
Resource
win10v2004-20240508-en
General
-
Target
b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe
-
Size
827KB
-
MD5
582c913be188005eda626aa5b6934e64
-
SHA1
da0e36b1d48501386a2392c801dd5401946a3450
-
SHA256
b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb
-
SHA512
b9a9d60263b0a24317e2ec3842165da52a4c747684276a4ca90a780ec32e2f3fc2d52a60304d05f2d4e22f6eb3fb5432adbf38dfff3e5c647a5f187ce9d3b495
-
SSDEEP
12288:azqajGp5VwujJnmtVHGJQChr6UHR4leVr8+VA7qHnkGyTbJ9fztDsJUU:azqaji+uj5mtRCherled8+6ocVNzlsH
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4352 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1220 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 740 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4224 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3192 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4080 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 456 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3240 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3740 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3972 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3288 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4472 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4460 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4620 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4408 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3788 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3420 4152 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 4152 schtasks.exe 80 -
resource yara_rule behavioral2/memory/3256-1-0x0000000000530000-0x0000000000606000-memory.dmp dcrat behavioral2/files/0x000700000002341f-11.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe -
Executes dropped EXE 1 IoCs
pid Process 3020 unsecapp.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Windows Mail\fontdrvhost.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\38384e6a620884 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\9e8d7a4ca61bd9 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Google\RuntimeBroker.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Google\9e8d7a4ca61bd9 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File opened for modification C:\Program Files\Windows Mail\fontdrvhost.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files\MSBuild\69ddcba757bf72 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\SppExtComObj.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files\7-Zip\Lang\System.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files\7-Zip\Lang\27d1bcfc3c54e0 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files\Windows Mail\5b884080fd4f94 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SearchApp.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\5940a34987c991 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RuntimeBroker.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\7ed7544c2c03c6 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files\MSBuild\smss.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\e1ef82546f0b02 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\ShellExperiences\9e8d7a4ca61bd9 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\assembly\RuntimeBroker.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\assembly\9e8d7a4ca61bd9 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\WaaS\services\b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\ShellExperiences\RuntimeBroker.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\rescache\_merged\2181205234\SearchApp.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\rescache\_merged\services.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\uk-UA\csrss.exe b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe File created C:\Windows\uk-UA\886983d96e3d3e b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3552 schtasks.exe 2052 schtasks.exe 4460 schtasks.exe 4620 schtasks.exe 740 schtasks.exe 2384 schtasks.exe 4080 schtasks.exe 3240 schtasks.exe 3576 schtasks.exe 4844 schtasks.exe 3420 schtasks.exe 3688 schtasks.exe 2492 schtasks.exe 2884 schtasks.exe 5028 schtasks.exe 5076 schtasks.exe 4872 schtasks.exe 4900 schtasks.exe 2212 schtasks.exe 4224 schtasks.exe 4656 schtasks.exe 2300 schtasks.exe 2608 schtasks.exe 2068 schtasks.exe 964 schtasks.exe 3172 schtasks.exe 2204 schtasks.exe 1112 schtasks.exe 2928 schtasks.exe 3152 schtasks.exe 4524 schtasks.exe 4408 schtasks.exe 2956 schtasks.exe 624 schtasks.exe 2652 schtasks.exe 4512 schtasks.exe 1220 schtasks.exe 3192 schtasks.exe 3972 schtasks.exe 4472 schtasks.exe 1992 schtasks.exe 1528 schtasks.exe 3740 schtasks.exe 4352 schtasks.exe 3788 schtasks.exe 2120 schtasks.exe 3288 schtasks.exe 2168 schtasks.exe 4800 schtasks.exe 456 schtasks.exe 4560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 3020 unsecapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe Token: SeDebugPrivilege 3020 unsecapp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3256 wrote to memory of 3060 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 132 PID 3256 wrote to memory of 3060 3256 b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe 132 PID 3060 wrote to memory of 1304 3060 cmd.exe 134 PID 3060 wrote to memory of 1304 3060 cmd.exe 134 PID 3060 wrote to memory of 3020 3060 cmd.exe 135 PID 3060 wrote to memory of 3020 3060 cmd.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe"C:\Users\Admin\AppData\Local\Temp\b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6AuwwWvDG7.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1304
-
-
C:\Recovery\WindowsRE\unsecapp.exe"C:\Recovery\WindowsRE\unsecapp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Mail\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fbb" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fbb" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\uk-UA\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\uk-UA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\uk-UA\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\ShellExperiences\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Windows\ShellExperiences\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Admin\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files\MSBuild\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files\MSBuild\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\assembly\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\assembly\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Windows\assembly\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD545afdaa964ff8e7abe5baf2206205262
SHA1319fb4e9cfbaaf27ec5e2d73e7c238c30f68c301
SHA2567bf8272f45ae36abce3336ae0bc592fc60fe5c4e6db25eecc9119ec689d4337f
SHA5129a682ef24803ecf7e88d41ef1271b63c247f536d43e5f2d4e0eee91bb6664b45ec207fa4c5127c1c76bd6f1f64d83a3548c58911338aec2e07f494b03f53c6e2
-
Filesize
827KB
MD5582c913be188005eda626aa5b6934e64
SHA1da0e36b1d48501386a2392c801dd5401946a3450
SHA256b01c6743c332dac114f0126e5b03a64aca44b02cc1168f381bbec7f1d7d713fb
SHA512b9a9d60263b0a24317e2ec3842165da52a4c747684276a4ca90a780ec32e2f3fc2d52a60304d05f2d4e22f6eb3fb5432adbf38dfff3e5c647a5f187ce9d3b495