Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 23:06
Behavioral task
behavioral1
Sample
235d34c77d2170ce99f718267547a1b1.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
235d34c77d2170ce99f718267547a1b1.exe
Resource
win10v2004-20240730-en
General
-
Target
235d34c77d2170ce99f718267547a1b1.exe
-
Size
2.8MB
-
MD5
235d34c77d2170ce99f718267547a1b1
-
SHA1
d8802d67af489d34023046f84a8c6eeae7c9afd8
-
SHA256
0f2c744c9325bd8c8874af73a82add70c6206e047afef3be951fb6ebfe8c5576
-
SHA512
7c292e38783e56f63999cfe88a43758353de33622a6ff937af5e6252639530ee21ad036b0795e02ddb817e8d29c7fb2c8514f76627ea168fc274df9a21e8178e
-
SSDEEP
49152:ubA3jvN1HwTxELJKORSmFPANX0M2EQX2YnbcqT9KD2EB7F1QetkmL6Hs44F+I6:ubaN1HwdEwmxGDDaYqTYDZ7ntkBHs44o
Malware Config
Signatures
-
DcRat 25 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1600 schtasks.exe 2732 schtasks.exe 1964 schtasks.exe 1452 schtasks.exe 1356 schtasks.exe 2944 schtasks.exe 2204 schtasks.exe 1684 schtasks.exe 1860 schtasks.exe 1640 schtasks.exe 2816 schtasks.exe 2576 schtasks.exe 1472 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 235d34c77d2170ce99f718267547a1b1.exe 2812 schtasks.exe 2452 schtasks.exe 2176 schtasks.exe 2612 schtasks.exe 2012 schtasks.exe 1748 schtasks.exe 2908 schtasks.exe 2172 schtasks.exe 572 schtasks.exe 688 schtasks.exe 2548 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\", \"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\", \"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\", \"C:\\Recovery\\b2a802a2-3b12-11ef-8991-d2f1755c8afd\\audiodg.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\", \"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\", \"C:\\Recovery\\b2a802a2-3b12-11ef-8991-d2f1755c8afd\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\", \"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\", \"C:\\Recovery\\b2a802a2-3b12-11ef-8991-d2f1755c8afd\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\explorer.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\", \"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\", \"C:\\Recovery\\b2a802a2-3b12-11ef-8991-d2f1755c8afd\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\explorer.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\cmd.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\surrogatewinhostsvc\\csrss.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\", \"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\", \"C:\\Recovery\\b2a802a2-3b12-11ef-8991-d2f1755c8afd\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\explorer.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\1033\\cmd.exe\", \"C:\\Users\\Public\\lsm.exe\"" blockportserver.exe -
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 688 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1356 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1472 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 2440 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2440 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000016c6a-12.dat dcrat behavioral1/memory/3036-13-0x0000000000800000-0x0000000000A80000-memory.dmp dcrat behavioral1/memory/2144-46-0x0000000000E80000-0x0000000001100000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 3036 blockportserver.exe 2144 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 1360 cmd.exe 1360 cmd.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Users\\Public\\lsm.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\surrogatewinhostsvc\\csrss.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Recovery\\b2a802a2-3b12-11ef-8991-d2f1755c8afd\\audiodg.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\surrogatewinhostsvc\\csrss.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Windows\\PCHEALTH\\ERRORREP\\QHEADLES\\cmd.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files\\Microsoft Office\\Office14\\1033\\cmd.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files\\Microsoft Office\\Office14\\1033\\cmd.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Users\\Public\\lsm.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Recovery\\b2a802a2-3b12-11ef-8991-d2f1755c8afd\\audiodg.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\explorer.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.5\\explorer.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows NT\\Accessories\\en-US\\csrss.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\"" blockportserver.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows NT\Accessories\en-US\csrss.exe blockportserver.exe File created C:\Program Files\Windows NT\Accessories\en-US\886983d96e3d3e blockportserver.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\explorer.exe blockportserver.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\7a0fd90576e088 blockportserver.exe File created C:\Program Files\Microsoft Office\Office14\1033\cmd.exe blockportserver.exe File created C:\Program Files\Microsoft Office\Office14\1033\ebf1f9fa8afd6d blockportserver.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\PCHEALTH\ERRORREP\QHEADLES\ebf1f9fa8afd6d blockportserver.exe File created C:\Windows\PCHEALTH\ERRORREP\QHEADLES\cmd.exe blockportserver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 235d34c77d2170ce99f718267547a1b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1356 schtasks.exe 2908 schtasks.exe 2204 schtasks.exe 2172 schtasks.exe 2176 schtasks.exe 2612 schtasks.exe 688 schtasks.exe 1640 schtasks.exe 1964 schtasks.exe 1452 schtasks.exe 1748 schtasks.exe 2944 schtasks.exe 2548 schtasks.exe 2452 schtasks.exe 2012 schtasks.exe 1600 schtasks.exe 1860 schtasks.exe 2732 schtasks.exe 2812 schtasks.exe 2576 schtasks.exe 1684 schtasks.exe 572 schtasks.exe 2816 schtasks.exe 1472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3036 blockportserver.exe 2144 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3036 blockportserver.exe Token: SeDebugPrivilege 2144 csrss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2332 2500 235d34c77d2170ce99f718267547a1b1.exe 31 PID 2500 wrote to memory of 2332 2500 235d34c77d2170ce99f718267547a1b1.exe 31 PID 2500 wrote to memory of 2332 2500 235d34c77d2170ce99f718267547a1b1.exe 31 PID 2500 wrote to memory of 2332 2500 235d34c77d2170ce99f718267547a1b1.exe 31 PID 2332 wrote to memory of 1360 2332 WScript.exe 32 PID 2332 wrote to memory of 1360 2332 WScript.exe 32 PID 2332 wrote to memory of 1360 2332 WScript.exe 32 PID 2332 wrote to memory of 1360 2332 WScript.exe 32 PID 1360 wrote to memory of 3036 1360 cmd.exe 34 PID 1360 wrote to memory of 3036 1360 cmd.exe 34 PID 1360 wrote to memory of 3036 1360 cmd.exe 34 PID 1360 wrote to memory of 3036 1360 cmd.exe 34 PID 3036 wrote to memory of 2144 3036 blockportserver.exe 60 PID 3036 wrote to memory of 2144 3036 blockportserver.exe 60 PID 3036 wrote to memory of 2144 3036 blockportserver.exe 60 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\235d34c77d2170ce99f718267547a1b1.exe"C:\Users\Admin\AppData\Local\Temp\235d34c77d2170ce99f718267547a1b1.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\surrogatewinhostsvc\nu5MrHdU8wRPsPg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\surrogatewinhostsvc\wBJ3JMG47SmseQ.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\surrogatewinhostsvc\blockportserver.exe"C:\surrogatewinhostsvc\blockportserver.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files\Windows NT\Accessories\en-US\csrss.exe"C:\Program Files\Windows NT\Accessories\en-US\csrss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\surrogatewinhostsvc\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\surrogatewinhostsvc\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\surrogatewinhostsvc\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows NT\Accessories\en-US\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\Accessories\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Windows\PCHEALTH\ERRORREP\QHEADLES\cmd.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\PCHEALTH\ERRORREP\QHEADLES\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Windows\PCHEALTH\ERRORREP\QHEADLES\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Recovery\b2a802a2-3b12-11ef-8991-d2f1755c8afd\audiodg.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\b2a802a2-3b12-11ef-8991-d2f1755c8afd\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Recovery\b2a802a2-3b12-11ef-8991-d2f1755c8afd\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Office14\1033\cmd.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\Office14\1033\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Users\Public\lsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Public\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Users\Public\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD520cb8781e072c5c355b82dbb35fe7d53
SHA10bcc2e15d5ad8b869aae6f3fbe4caec027da245a
SHA256847c3eec06cef11c67133a2bf6263a5051691745f23c58731712d8ec58800028
SHA51272011df2b391c8ea7edaf5b52d25c5a7df10f9c7bba38143c4ac6e55d6b10b84b4fa1d82b10ceb9bd3428253e6965567d4943f548dbe7229dba2bd72c758c027
-
Filesize
210B
MD5a79158e3b1d9ed9598b1ca48083d2c14
SHA1cbe5a2189f5438be85e08e66bf920b0a09710549
SHA2560cb22cafd03369625e2a4d2a984ee44b40da9552c605a93b228ee92123655f03
SHA51229795d38d5bfae787e763f3797718c8a025ffd94d992d9ec161007a2d26ad333b311b0e832457982e53db7f4a5e52854e4899dac3ad0f91370837bd044dd1984
-
Filesize
44B
MD5cb20cf3cd0b69520d6609862850432fd
SHA10067ca01f3768a78667d6ad08246ff3bf6c3d276
SHA2560f2839791a1a576337466fd847893e1cbe8f0376a54f4291e4d57afdaf2cd252
SHA51264034329bf6af43e56df14f8bc02e8dd5ef495d5bb8e41d5d12bff9088143f3acda89a549d3e4a20ba3ecd5ba643539c1a02974e6cb3771b6375626c6fa2b9ae