Analysis
-
max time kernel
39s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 22:51
Behavioral task
behavioral1
Sample
2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe
Resource
win10v2004-20240508-en
General
-
Target
2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe
-
Size
1.2MB
-
MD5
2f77b6ba0d6b4cf6cb232c0e5aa2f999
-
SHA1
4bb0d8a5c6e42374d1a58b8b025bbf99cda42b77
-
SHA256
d5e776aa38d141a5621e492af32685568f2c527864caa72dad17ec08172bd223
-
SHA512
d434e987bcd3f8ee09501e2c4b600b7781d228bc465e54d0d016ae086d2eef18500832ebd78e1b7d75956ffb3ad621c77bb3cca45ca0dc57b00826aa2f2e8e8a
-
SSDEEP
24576:GiRX4ONyMaJtHAWwIh1zunez5ma3Z1tzVSzWdPnG:GiRX4jMD7R/a3Z1hf
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files\\Windows Mail\\dllhost.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files\\Windows Mail\\dllhost.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\", \"C:\\Windows\\fr-FR\\SppExtComObj.exe\", \"C:\\Users\\Default\\unsecapp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files\\Windows Mail\\dllhost.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\", \"C:\\Windows\\fr-FR\\SppExtComObj.exe\", \"C:\\Users\\Default\\unsecapp.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\services.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files\\Windows Mail\\dllhost.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\", \"C:\\Windows\\fr-FR\\SppExtComObj.exe\", \"C:\\Users\\Default\\unsecapp.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\services.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\MusNotification.exe\", \"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files\\Windows Mail\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files\\Windows Mail\\dllhost.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\", \"C:\\Windows\\fr-FR\\SppExtComObj.exe\", \"C:\\Users\\Default\\unsecapp.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\services.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\MusNotification.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Program Files\\Windows Mail\\dllhost.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\", \"C:\\Windows\\fr-FR\\SppExtComObj.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\", \"C:\\Users\\Public\\Pictures\\taskhostw.exe\", \"C:\\Windows\\tracing\\SearchApp.exe\", \"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\", \"C:\\Windows\\addins\\spoolsv.exe\", \"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\", \"C:\\Users\\Default User\\RuntimeBroker.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4272 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3396 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3316 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 816 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4404 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 980 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4188 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2400 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4792 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4928 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4080 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3764 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4516 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3204 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4108 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3352 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3312 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 3876 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 3876 schtasks.exe 80 -
resource yara_rule behavioral2/memory/4628-1-0x0000000000740000-0x0000000000874000-memory.dmp dcrat behavioral2/files/0x000700000002343d-17.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Executes dropped EXE 1 IoCs
pid Process 4056 SppExtComObj.exe -
Adds Run key to start application 2 TTPs 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\fr-FR\\SppExtComObj.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\fr-FR\\SppExtComObj.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Users\\Default\\unsecapp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\addins\\spoolsv.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Windows Mail\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Google\\Temp\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Program Files (x86)\\Windows Portable Devices\\MusNotification.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Users\\Public\\Pictures\\taskhostw.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\addins\\spoolsv.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\Default User\\RuntimeBroker.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Users\\Default\\unsecapp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\tracing\\SearchApp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Defender\\de-DE\\csrss.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files\\Windows Mail\\dllhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\SearchApp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files (x86)\\Internet Explorer\\services.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Program Files (x86)\\Windows Portable Devices\\MusNotification.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\WindowsRE\\sppsvc.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\tracing\\SearchApp.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Microsoft Office\\OfficeClickToRun.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\Default User\\RuntimeBroker.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files (x86)\\Internet Explorer\\services.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\fontdrvhost.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Users\\Public\\Pictures\\taskhostw.exe\"" 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\5b884080fd4f94 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\Microsoft Office\e6c9b481da804f 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Microsoft\Edge\5b884080fd4f94 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\5b884080fd4f94 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\Microsoft Office\OfficeClickToRun.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\Windows Defender\de-DE\886983d96e3d3e 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\38384e6a620884 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Internet Explorer\c5b4cb5e9653cc 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Windows Portable Devices\MusNotification.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\fontdrvhost.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Microsoft\Edge\fontdrvhost.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Google\Temp\dllhost.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Google\Temp\5940a34987c991 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\Windows Mail\5940a34987c991 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\SearchApp.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Internet Explorer\services.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files (x86)\Windows Portable Devices\aa97147c4c782d 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\fontdrvhost.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\Windows Defender\de-DE\csrss.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Program Files\Windows Mail\dllhost.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\fr-FR\SppExtComObj.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Windows\fr-FR\e1ef82546f0b02 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Windows\tracing\SearchApp.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Windows\tracing\38384e6a620884 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Windows\Boot\EFI\qps-ploc\SearchApp.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Windows\addins\spoolsv.exe 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe File created C:\Windows\addins\f3b6ecef712a24 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2212 schtasks.exe 816 schtasks.exe 4188 schtasks.exe 4976 schtasks.exe 2328 schtasks.exe 4776 schtasks.exe 4416 schtasks.exe 1556 schtasks.exe 624 schtasks.exe 4904 schtasks.exe 756 schtasks.exe 2248 schtasks.exe 1872 schtasks.exe 4404 schtasks.exe 980 schtasks.exe 4516 schtasks.exe 3204 schtasks.exe 4108 schtasks.exe 3396 schtasks.exe 1732 schtasks.exe 1996 schtasks.exe 1716 schtasks.exe 3312 schtasks.exe 3316 schtasks.exe 4276 schtasks.exe 2152 schtasks.exe 4356 schtasks.exe 1816 schtasks.exe 2932 schtasks.exe 2480 schtasks.exe 2744 schtasks.exe 4080 schtasks.exe 4272 schtasks.exe 4792 schtasks.exe 2832 schtasks.exe 1436 schtasks.exe 2820 schtasks.exe 2816 schtasks.exe 2068 schtasks.exe 2004 schtasks.exe 2400 schtasks.exe 1196 schtasks.exe 4692 schtasks.exe 3044 schtasks.exe 2216 schtasks.exe 1512 schtasks.exe 3352 schtasks.exe 3692 schtasks.exe 3764 schtasks.exe 4928 schtasks.exe 1140 schtasks.exe 1056 schtasks.exe 4344 schtasks.exe 1304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe 4056 SppExtComObj.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe Token: SeDebugPrivilege 4056 SppExtComObj.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4628 wrote to memory of 2784 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 135 PID 4628 wrote to memory of 2784 4628 2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe 135 PID 2784 wrote to memory of 4688 2784 cmd.exe 137 PID 2784 wrote to memory of 4688 2784 cmd.exe 137 PID 2784 wrote to memory of 4056 2784 cmd.exe 138 PID 2784 wrote to memory of 4056 2784 cmd.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe"C:\Users\Admin\AppData\Local\Temp\2f77b6ba0d6b4cf6cb232c0e5aa2f999.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CFAg7uBRVH.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:4688
-
-
C:\Windows\fr-FR\SppExtComObj.exe"C:\Windows\fr-FR\SppExtComObj.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Pictures\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\Pictures\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Pictures\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Windows\tracing\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\tracing\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Windows\tracing\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft\Edge\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft\Edge\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Windows\addins\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\addins\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\addins\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Defender\de-DE\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\de-DE\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Temp\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Temp\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Mail\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Mail\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Windows\fr-FR\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\fr-FR\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Windows\fr-FR\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Users\Default\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Default\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Users\Default\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Portable Devices\MusNotification.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Portable Devices\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52f77b6ba0d6b4cf6cb232c0e5aa2f999
SHA14bb0d8a5c6e42374d1a58b8b025bbf99cda42b77
SHA256d5e776aa38d141a5621e492af32685568f2c527864caa72dad17ec08172bd223
SHA512d434e987bcd3f8ee09501e2c4b600b7781d228bc465e54d0d016ae086d2eef18500832ebd78e1b7d75956ffb3ad621c77bb3cca45ca0dc57b00826aa2f2e8e8a
-
Filesize
198B
MD55a7469dd4ee6c9f46fa0b73d10487285
SHA1780c3993fce08d8a3055b581df0a32b98a87680d
SHA25689045a207b4c5313639a82be2abf920a8ffd137f30b0ed59090dc3dc548be16f
SHA512347e88ec18d1c3435f8670507dcb73e82da08943fe4d4e38d47f5aec4cbc076fa12c65a25616c178fd7e8ff2964f1528b89b78c54360d1c3db9c3aff6f6585a8