Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-07-2024 04:19
Behavioral task
behavioral1
Sample
Cs2SteamEmul.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Cs2SteamEmul.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
Cs2SteamEmul.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Cs2SteamEmul.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Cs2SteamEmul.exe
Resource
win11-20240709-en
General
-
Target
Cs2SteamEmul.exe
-
Size
2.8MB
-
MD5
d48669a634489ed4baf9e84aedd9d2bd
-
SHA1
e7b7bdf6e10584eb07547e7237bd654b42abcf84
-
SHA256
4415d417dd1b3ccd3c86fa55cf3add99e493218cb0c1405efaf8e55ac7b5c666
-
SHA512
d902e3d77f7cc33f806b1e298fb51905636bb9ea83cf5a030c18ed33400e656edf3223a0ff4f6e7fcef20b427413cbf5a5132b914d37f476cd4ad6d90db46a90
-
SSDEEP
49152:8bA3W4Dw1beHhL/rBnVQzQ2Bq5U+0HE26wyiK4Csx7aPNUmTk:8b6PHhXB6e2dHfxJ1xu/k
Malware Config
Signatures
-
DcRat 20 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 4532 schtasks.exe 596 schtasks.exe 4424 schtasks.exe 3908 schtasks.exe 3032 schtasks.exe 4660 schtasks.exe 2308 schtasks.exe 4772 schtasks.exe 3392 schtasks.exe 2776 schtasks.exe 3988 schtasks.exe 2768 schtasks.exe 2516 schtasks.exe 1088 schtasks.exe File created C:\Program Files (x86)\Windows Multimedia Platform\5940a34987c991 hyperBrowser.exe 1268 schtasks.exe 1344 schtasks.exe 4008 schtasks.exe 5076 schtasks.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings Cs2SteamEmul.exe -
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\", \"C:\\Windows\\debug\\fontdrvhost.exe\", \"C:\\Windows\\Panther\\InstallAgent.exe\", \"C:\\Windows\\Provisioning\\Cosa\\sppsvc.exe\", \"C:\\ChainSurrogateref\\taskhostw.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\", \"C:\\Windows\\debug\\fontdrvhost.exe\", \"C:\\Windows\\Panther\\InstallAgent.exe\", \"C:\\Windows\\Provisioning\\Cosa\\sppsvc.exe\", \"C:\\ChainSurrogateref\\taskhostw.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\", \"C:\\Windows\\debug\\fontdrvhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\", \"C:\\Windows\\debug\\fontdrvhost.exe\", \"C:\\Windows\\Panther\\InstallAgent.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\", \"C:\\Windows\\debug\\fontdrvhost.exe\", \"C:\\Windows\\Panther\\InstallAgent.exe\", \"C:\\Windows\\Provisioning\\Cosa\\sppsvc.exe\"" hyperBrowser.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3392 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 596 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3908 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3988 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4008 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 4016 schtasks.exe 76 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 4016 schtasks.exe 76 -
resource yara_rule behavioral1/files/0x000800000001ac23-12.dat dcrat behavioral1/memory/428-14-0x0000000000B30000-0x0000000000DC2000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 428 hyperBrowser.exe 4816 fontdrvhost.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\debug\\fontdrvhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\Windows\\Panther\\InstallAgent.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\dllhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\debug\\fontdrvhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\Windows\\Panther\\InstallAgent.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\Provisioning\\Cosa\\sppsvc.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\Provisioning\\Cosa\\sppsvc.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\ChainSurrogateref\\taskhostw.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\ChainSurrogateref\\taskhostw.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\"" hyperBrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\Windows Portable Devices\\dllhost.exe\"" hyperBrowser.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ipinfo.io 11 ipinfo.io -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe hyperBrowser.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe hyperBrowser.exe File created C:\Program Files (x86)\Windows Multimedia Platform\5940a34987c991 hyperBrowser.exe File created C:\Program Files (x86)\Windows Portable Devices\dllhost.exe hyperBrowser.exe File created C:\Program Files (x86)\Windows Portable Devices\5940a34987c991 hyperBrowser.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Panther\200f98429d280b hyperBrowser.exe File created C:\Windows\Provisioning\Cosa\sppsvc.exe hyperBrowser.exe File created C:\Windows\Provisioning\Cosa\0a1fd5f707cd16 hyperBrowser.exe File created C:\Windows\diagnostics\index\cmd.exe hyperBrowser.exe File created C:\Windows\Speech\Engines\Lexicon\en-US\cmd.exe hyperBrowser.exe File created C:\Windows\debug\fontdrvhost.exe hyperBrowser.exe File created C:\Windows\debug\5b884080fd4f94 hyperBrowser.exe File created C:\Windows\Panther\InstallAgent.exe hyperBrowser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings Cs2SteamEmul.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings hyperBrowser.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1212 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 596 schtasks.exe 2776 schtasks.exe 3908 schtasks.exe 4772 schtasks.exe 5076 schtasks.exe 1088 schtasks.exe 4660 schtasks.exe 3392 schtasks.exe 4424 schtasks.exe 2308 schtasks.exe 4008 schtasks.exe 2768 schtasks.exe 2516 schtasks.exe 4532 schtasks.exe 1268 schtasks.exe 1344 schtasks.exe 3988 schtasks.exe 3032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 428 hyperBrowser.exe 428 hyperBrowser.exe 428 hyperBrowser.exe 428 hyperBrowser.exe 428 hyperBrowser.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe 4816 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 428 hyperBrowser.exe Token: SeDebugPrivilege 4816 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3912 wrote to memory of 4196 3912 Cs2SteamEmul.exe 72 PID 3912 wrote to memory of 4196 3912 Cs2SteamEmul.exe 72 PID 3912 wrote to memory of 4196 3912 Cs2SteamEmul.exe 72 PID 4196 wrote to memory of 2008 4196 WScript.exe 73 PID 4196 wrote to memory of 2008 4196 WScript.exe 73 PID 4196 wrote to memory of 2008 4196 WScript.exe 73 PID 2008 wrote to memory of 428 2008 cmd.exe 75 PID 2008 wrote to memory of 428 2008 cmd.exe 75 PID 428 wrote to memory of 4876 428 hyperBrowser.exe 95 PID 428 wrote to memory of 4876 428 hyperBrowser.exe 95 PID 2008 wrote to memory of 1212 2008 cmd.exe 97 PID 2008 wrote to memory of 1212 2008 cmd.exe 97 PID 2008 wrote to memory of 1212 2008 cmd.exe 97 PID 4876 wrote to memory of 4208 4876 cmd.exe 98 PID 4876 wrote to memory of 4208 4876 cmd.exe 98 PID 4876 wrote to memory of 4816 4876 cmd.exe 99 PID 4876 wrote to memory of 4816 4876 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cs2SteamEmul.exe"C:\Users\Admin\AppData\Local\Temp\Cs2SteamEmul.exe"1⤵
- DcRat
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ChainSurrogateref\s70leb7kkd32CLdRUKa.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ChainSurrogateref\xpD7eJ.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\ChainSurrogateref\hyperBrowser.exe"C:\ChainSurrogateref\hyperBrowser.exe"4⤵
- DcRat
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bCLjvGEUzj.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4208
-
-
C:\Windows\debug\fontdrvhost.exe"C:\Windows\debug\fontdrvhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:1212
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\debug\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\debug\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Windows\debug\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 7 /tr "'C:\Windows\Panther\InstallAgent.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgent" /sc ONLOGON /tr "'C:\Windows\Panther\InstallAgent.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 14 /tr "'C:\Windows\Panther\InstallAgent.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Windows\Provisioning\Cosa\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Provisioning\Cosa\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Windows\Provisioning\Cosa\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\ChainSurrogateref\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\ChainSurrogateref\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\ChainSurrogateref\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5fb9e236436cde0a5a4eed038eaddcba0
SHA1b952200d5fc543b905081e871d0f17cd86fe614f
SHA256cbc2a097f5d12d79a5b79af092afba8eee19305a82e3663bcdf7a312bf3b6d49
SHA51222c83c980a1df703d66f10ea11caaf187c9081c5b85039e4206f4a34418bc030af3baee128873e7bb6f45bd59132cc6191fd9fba3c8818d94c81105ec11a130c
-
Filesize
211B
MD54410becb8d48b0f40a82e8d65460e611
SHA123971351f410149ee5f076de87985cd6b4ab49dc
SHA256ce4270f5351b45f9a102cb09b20dec64956cb4ab81a36fb6efa0689ab8755ce5
SHA512539bfef68779f8c70a82346bb2410fe335a79cecba2c17f4d4f8d83e74ed85a6cd1d36ad4a55945b7283e73de65cec7aa45280c9f19e49a4d0f316857d42a3ed
-
Filesize
162B
MD5eaa1aa25e323d5ea76d80a5ddbfeca3c
SHA1a9ce156083afb97e63800dda5ee1e99d845b3a18
SHA2567bd09663e812891268d97ecf21ea8d6669252fdcb2d3e24c9834252cadc21263
SHA512f8d204db10ac0b32ebcd9266c4022d342fd2a7a520428eb585dbda826d79ed8744ed6dfd196821bb8bca6a786eabf77af2acbf0080db488e54b07abe1cf78aa7
-
Filesize
197B
MD5f81db1c7037f55abeb5d49e62ef46608
SHA16c4448274ce15f507b1e55de74e3aebe30d3b3ac
SHA2564da6b5cd80df25d2b6c70dc4294550bdd4c5dcc27c744a662db6efc5a582400b
SHA5126f84e440cb31b83422e99ea4bae1396248876a0c64357f8162389017d6f6aecdeed7460fcf4c8fa5f8be551077fdff768512dbefb88a96cdef25a8685af2748e