Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 23:06
Behavioral task
behavioral1
Sample
235d34c77d2170ce99f718267547a1b1.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
235d34c77d2170ce99f718267547a1b1.exe
Resource
win10v2004-20240730-en
General
-
Target
235d34c77d2170ce99f718267547a1b1.exe
-
Size
2.8MB
-
MD5
235d34c77d2170ce99f718267547a1b1
-
SHA1
d8802d67af489d34023046f84a8c6eeae7c9afd8
-
SHA256
0f2c744c9325bd8c8874af73a82add70c6206e047afef3be951fb6ebfe8c5576
-
SHA512
7c292e38783e56f63999cfe88a43758353de33622a6ff937af5e6252639530ee21ad036b0795e02ddb817e8d29c7fb2c8514f76627ea168fc274df9a21e8178e
-
SSDEEP
49152:ubA3jvN1HwTxELJKORSmFPANX0M2EQX2YnbcqT9KD2EB7F1QetkmL6Hs44F+I6:ubaN1HwdEwmxGDDaYqTYDZ7ntkBHs44o
Malware Config
Signatures
-
DcRat 29 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1072 schtasks.exe 1420 schtasks.exe 3852 schtasks.exe 3812 schtasks.exe 3780 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 235d34c77d2170ce99f718267547a1b1.exe 3160 schtasks.exe 2028 schtasks.exe File created C:\Program Files\dotnet\swidtag\5b884080fd4f94 blockportserver.exe 1944 schtasks.exe 1532 schtasks.exe 3132 schtasks.exe 640 schtasks.exe 3068 schtasks.exe 2312 schtasks.exe 1912 schtasks.exe 4084 schtasks.exe 3248 schtasks.exe 464 schtasks.exe 1504 schtasks.exe 1380 schtasks.exe 1484 schtasks.exe 4200 schtasks.exe 2132 schtasks.exe 1596 schtasks.exe 1184 schtasks.exe 4744 schtasks.exe 2504 schtasks.exe 1180 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\", \"C:\\surrogatewinhostsvc\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\", \"C:\\surrogatewinhostsvc\\wininit.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\", \"C:\\surrogatewinhostsvc\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\", \"C:\\surrogatewinhostsvc\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Windows\\Migration\\services.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\", \"C:\\surrogatewinhostsvc\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Windows\\Migration\\services.exe\", \"C:\\Windows\\DiagTrack\\Scenarios\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\", \"C:\\surrogatewinhostsvc\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Windows\\Migration\\services.exe\", \"C:\\Windows\\DiagTrack\\Scenarios\\dwm.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\Browser\\Idle.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\", \"C:\\surrogatewinhostsvc\\services.exe\", \"C:\\surrogatewinhostsvc\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Windows\\Migration\\services.exe\", \"C:\\Windows\\DiagTrack\\Scenarios\\dwm.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\Browser\\Idle.exe\", \"C:\\Program Files\\Windows Multimedia Platform\\wininit.exe\"" blockportserver.exe -
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3852 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4744 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4200 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3780 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4084 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1420 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 464 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3160 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3812 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3248 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 4828 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 4828 schtasks.exe 85 -
resource yara_rule behavioral2/files/0x000700000002338f-10.dat dcrat behavioral2/memory/5076-13-0x0000000000ED0000-0x0000000001150000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\Control Panel\International\Geo\Nation 235d34c77d2170ce99f718267547a1b1.exe Key value queried \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\Control Panel\International\Geo\Nation blockportserver.exe -
Executes dropped EXE 2 IoCs
pid Process 5076 blockportserver.exe 1632 Idle.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\DiagTrack\\Scenarios\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\Browser\\Idle.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files\\Windows Multimedia Platform\\wininit.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\Migration\\services.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\surrogatewinhostsvc\\services.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\surrogatewinhostsvc\\wininit.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\Migration\\services.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\DiagTrack\\Scenarios\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\Browser\\Idle.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files\\Windows Multimedia Platform\\wininit.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\surrogatewinhostsvc\\services.exe\"" blockportserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\surrogatewinhostsvc\\wininit.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" blockportserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\dotnet\\swidtag\\fontdrvhost.exe\"" blockportserver.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Windows Multimedia Platform\wininit.exe blockportserver.exe File created C:\Program Files\Windows Multimedia Platform\56085415360792 blockportserver.exe File created C:\Program Files\dotnet\swidtag\fontdrvhost.exe blockportserver.exe File opened for modification C:\Program Files\dotnet\swidtag\fontdrvhost.exe blockportserver.exe File created C:\Program Files\dotnet\swidtag\5b884080fd4f94 blockportserver.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Idle.exe blockportserver.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\6ccacd8608530f blockportserver.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Migration\services.exe blockportserver.exe File created C:\Windows\Migration\c5b4cb5e9653cc blockportserver.exe File created C:\Windows\DiagTrack\Scenarios\dwm.exe blockportserver.exe File created C:\Windows\DiagTrack\Scenarios\6cb0b6c459d5d3 blockportserver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 235d34c77d2170ce99f718267547a1b1.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000_Classes\Local Settings 235d34c77d2170ce99f718267547a1b1.exe Key created \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000_Classes\Local Settings blockportserver.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1504 schtasks.exe 464 schtasks.exe 1944 schtasks.exe 3812 schtasks.exe 1380 schtasks.exe 3248 schtasks.exe 4744 schtasks.exe 1072 schtasks.exe 1420 schtasks.exe 2028 schtasks.exe 3780 schtasks.exe 2132 schtasks.exe 2312 schtasks.exe 3132 schtasks.exe 640 schtasks.exe 1532 schtasks.exe 4200 schtasks.exe 2504 schtasks.exe 1180 schtasks.exe 3852 schtasks.exe 1596 schtasks.exe 1484 schtasks.exe 1184 schtasks.exe 3160 schtasks.exe 3068 schtasks.exe 1912 schtasks.exe 4084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 5076 blockportserver.exe 1632 Idle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5076 blockportserver.exe Token: SeDebugPrivilege 1632 Idle.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3172 4748 235d34c77d2170ce99f718267547a1b1.exe 81 PID 4748 wrote to memory of 3172 4748 235d34c77d2170ce99f718267547a1b1.exe 81 PID 4748 wrote to memory of 3172 4748 235d34c77d2170ce99f718267547a1b1.exe 81 PID 3172 wrote to memory of 1516 3172 WScript.exe 82 PID 3172 wrote to memory of 1516 3172 WScript.exe 82 PID 3172 wrote to memory of 1516 3172 WScript.exe 82 PID 1516 wrote to memory of 5076 1516 cmd.exe 84 PID 1516 wrote to memory of 5076 1516 cmd.exe 84 PID 5076 wrote to memory of 2908 5076 blockportserver.exe 113 PID 5076 wrote to memory of 2908 5076 blockportserver.exe 113 PID 2908 wrote to memory of 2064 2908 cmd.exe 115 PID 2908 wrote to memory of 2064 2908 cmd.exe 115 PID 2908 wrote to memory of 1632 2908 cmd.exe 116 PID 2908 wrote to memory of 1632 2908 cmd.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\235d34c77d2170ce99f718267547a1b1.exe"C:\Users\Admin\AppData\Local\Temp\235d34c77d2170ce99f718267547a1b1.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\surrogatewinhostsvc\nu5MrHdU8wRPsPg.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\surrogatewinhostsvc\wBJ3JMG47SmseQ.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\surrogatewinhostsvc\blockportserver.exe"C:\surrogatewinhostsvc\blockportserver.exe"4⤵
- DcRat
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\51rR3AnFko.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Idle.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Idle.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files\dotnet\swidtag\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\dotnet\swidtag\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\dotnet\swidtag\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\surrogatewinhostsvc\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\surrogatewinhostsvc\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\surrogatewinhostsvc\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\surrogatewinhostsvc\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\surrogatewinhostsvc\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\surrogatewinhostsvc\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Windows\Migration\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\Migration\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\Migration\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Windows\DiagTrack\Scenarios\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\DiagTrack\Scenarios\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Windows\DiagTrack\Scenarios\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Multimedia Platform\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235B
MD5476abf81ddca68cc30152368b58e85fc
SHA14107a1a99ff3b667aa265d0cba3b0b579200468e
SHA256e50d3c4278719e42fa1ded19de16af85fcd9651f379f396c1b150a417f5f43f4
SHA51239dc9f5db8f5490590f6b9330aade28e5b7610ae722b21374b59ed1132ea10245d89c762285ff167bbd244c53f1d36dd0f7beb75fb502d33ef6fcb23067f0299
-
Filesize
2.5MB
MD520cb8781e072c5c355b82dbb35fe7d53
SHA10bcc2e15d5ad8b869aae6f3fbe4caec027da245a
SHA256847c3eec06cef11c67133a2bf6263a5051691745f23c58731712d8ec58800028
SHA51272011df2b391c8ea7edaf5b52d25c5a7df10f9c7bba38143c4ac6e55d6b10b84b4fa1d82b10ceb9bd3428253e6965567d4943f548dbe7229dba2bd72c758c027
-
Filesize
210B
MD5a79158e3b1d9ed9598b1ca48083d2c14
SHA1cbe5a2189f5438be85e08e66bf920b0a09710549
SHA2560cb22cafd03369625e2a4d2a984ee44b40da9552c605a93b228ee92123655f03
SHA51229795d38d5bfae787e763f3797718c8a025ffd94d992d9ec161007a2d26ad333b311b0e832457982e53db7f4a5e52854e4899dac3ad0f91370837bd044dd1984
-
Filesize
44B
MD5cb20cf3cd0b69520d6609862850432fd
SHA10067ca01f3768a78667d6ad08246ff3bf6c3d276
SHA2560f2839791a1a576337466fd847893e1cbe8f0376a54f4291e4d57afdaf2cd252
SHA51264034329bf6af43e56df14f8bc02e8dd5ef495d5bb8e41d5d12bff9088143f3acda89a549d3e4a20ba3ecd5ba643539c1a02974e6cb3771b6375626c6fa2b9ae