Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 07:56
Behavioral task
behavioral1
Sample
3d41c790a5c6b1af06c653b594220d0a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3d41c790a5c6b1af06c653b594220d0a.exe
Resource
win10v2004-20240802-en
General
-
Target
3d41c790a5c6b1af06c653b594220d0a.exe
-
Size
827KB
-
MD5
3d41c790a5c6b1af06c653b594220d0a
-
SHA1
43ca0c57f6dd7acac229c4ad7ba252ea05cbd34f
-
SHA256
b77803bc0499683c46db2da3505ac95ec64097a1021971e6c6b4d40503db4b15
-
SHA512
44eb413c8265acee17e9973102f67240f978b19a902758051263e594b04d40e40f6543ada8f3ef5991049ccd9b8741c840c9792f2b4bf83228c1aeedd18c9f5d
-
SSDEEP
12288:VGyS8jpLUezD2BpaNl498Ov7gcBy5w64vJx6ARRNXzfzeII:V+kLUez+pWl498O0CE4hxhRDz7M
Malware Config
Signatures
-
DcRat 40 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 4136 schtasks.exe 4820 schtasks.exe 3080 schtasks.exe 1196 schtasks.exe 4340 schtasks.exe 3216 schtasks.exe 3972 schtasks.exe 760 schtasks.exe 3752 schtasks.exe 1460 schtasks.exe 624 schtasks.exe 1532 schtasks.exe 4044 schtasks.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe 3d41c790a5c6b1af06c653b594220d0a.exe 4916 schtasks.exe 3348 schtasks.exe 3020 schtasks.exe 4484 schtasks.exe 2196 schtasks.exe 3240 schtasks.exe 4236 schtasks.exe 1520 schtasks.exe 4656 schtasks.exe 4704 schtasks.exe 4524 schtasks.exe File created C:\Program Files\Windows Portable Devices\7a0fd90576e088 3d41c790a5c6b1af06c653b594220d0a.exe 4964 schtasks.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\5b884080fd4f94 3d41c790a5c6b1af06c653b594220d0a.exe 972 schtasks.exe 4360 schtasks.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\ea1d8f6d871115 3d41c790a5c6b1af06c653b594220d0a.exe 2668 schtasks.exe 3660 schtasks.exe 2188 schtasks.exe 1144 schtasks.exe 4856 schtasks.exe 4864 schtasks.exe 2336 schtasks.exe 3576 schtasks.exe 2692 schtasks.exe -
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4136 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3080 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3240 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4820 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4856 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4704 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4340 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3348 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3972 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3576 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4044 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 1616 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 1616 schtasks.exe 83 -
resource yara_rule behavioral2/memory/116-1-0x0000000000EC0000-0x0000000000F96000-memory.dmp dcrat behavioral2/files/0x000800000002349f-19.dat dcrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 3d41c790a5c6b1af06c653b594220d0a.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 3d41c790a5c6b1af06c653b594220d0a.exe -
Executes dropped EXE 1 IoCs
pid Process 4436 smss.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\Windows Multimedia Platform\6cb0b6c459d5d3 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files (x86)\Windows Sidebar\dwm.exe 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\ea1d8f6d871115 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\Windows Portable Devices\explorer.exe 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\Windows Portable Devices\7a0fd90576e088 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\Windows Defender\ja-JP\38384e6a620884 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe 3d41c790a5c6b1af06c653b594220d0a.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\upfc.exe 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files (x86)\Windows Sidebar\6cb0b6c459d5d3 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\5b884080fd4f94 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\Windows Defender\ja-JP\SearchApp.exe 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Program Files\Windows Multimedia Platform\dwm.exe 3d41c790a5c6b1af06c653b594220d0a.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\schemas\EAPHost\fontdrvhost.exe 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Windows\fr-FR\lsass.exe 3d41c790a5c6b1af06c653b594220d0a.exe File created C:\Windows\fr-FR\6203df4a6bafc7 3d41c790a5c6b1af06c653b594220d0a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 3d41c790a5c6b1af06c653b594220d0a.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 3d41c790a5c6b1af06c653b594220d0a.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4340 schtasks.exe 2336 schtasks.exe 4360 schtasks.exe 3752 schtasks.exe 4236 schtasks.exe 4964 schtasks.exe 4856 schtasks.exe 1460 schtasks.exe 4136 schtasks.exe 3080 schtasks.exe 1520 schtasks.exe 4656 schtasks.exe 972 schtasks.exe 624 schtasks.exe 3576 schtasks.exe 2668 schtasks.exe 1196 schtasks.exe 4916 schtasks.exe 4704 schtasks.exe 2188 schtasks.exe 4820 schtasks.exe 3020 schtasks.exe 3972 schtasks.exe 760 schtasks.exe 4524 schtasks.exe 2196 schtasks.exe 3216 schtasks.exe 4484 schtasks.exe 1144 schtasks.exe 4864 schtasks.exe 3348 schtasks.exe 1532 schtasks.exe 2692 schtasks.exe 4044 schtasks.exe 3240 schtasks.exe 3660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 116 3d41c790a5c6b1af06c653b594220d0a.exe 116 3d41c790a5c6b1af06c653b594220d0a.exe 116 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 3488 3d41c790a5c6b1af06c653b594220d0a.exe 4436 smss.exe 4436 smss.exe 4436 smss.exe 4436 smss.exe 4436 smss.exe 4436 smss.exe 4436 smss.exe 4436 smss.exe 4436 smss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4436 smss.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 116 3d41c790a5c6b1af06c653b594220d0a.exe Token: SeDebugPrivilege 3488 3d41c790a5c6b1af06c653b594220d0a.exe Token: SeDebugPrivilege 4436 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 116 wrote to memory of 332 116 3d41c790a5c6b1af06c653b594220d0a.exe 93 PID 116 wrote to memory of 332 116 3d41c790a5c6b1af06c653b594220d0a.exe 93 PID 332 wrote to memory of 1928 332 cmd.exe 95 PID 332 wrote to memory of 1928 332 cmd.exe 95 PID 332 wrote to memory of 3488 332 cmd.exe 101 PID 332 wrote to memory of 3488 332 cmd.exe 101 PID 3488 wrote to memory of 3952 3488 3d41c790a5c6b1af06c653b594220d0a.exe 129 PID 3488 wrote to memory of 3952 3488 3d41c790a5c6b1af06c653b594220d0a.exe 129 PID 3952 wrote to memory of 2384 3952 cmd.exe 131 PID 3952 wrote to memory of 2384 3952 cmd.exe 131 PID 3952 wrote to memory of 4436 3952 cmd.exe 132 PID 3952 wrote to memory of 4436 3952 cmd.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d41c790a5c6b1af06c653b594220d0a.exe"C:\Users\Admin\AppData\Local\Temp\3d41c790a5c6b1af06c653b594220d0a.exe"1⤵
- DcRat
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kCiy7RQK7Q.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\3d41c790a5c6b1af06c653b594220d0a.exe"C:\Users\Admin\AppData\Local\Temp\3d41c790a5c6b1af06c653b594220d0a.exe"3⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vz0DHlpImU.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:2384
-
-
C:\Recovery\WindowsRE\smss.exe"C:\Recovery\WindowsRE\smss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\upfc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Adobe\Setup\SearchApp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Setup\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Adobe\Setup\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Defender\ja-JP\SearchApp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\ja-JP\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\ja-JP\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Multimedia Platform\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\All Users\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Documents\My Music\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Documents\My Music\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Documents\My Music\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Windows\fr-FR\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\fr-FR\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Windows\fr-FR\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD53d41c790a5c6b1af06c653b594220d0a
SHA143ca0c57f6dd7acac229c4ad7ba252ea05cbd34f
SHA256b77803bc0499683c46db2da3505ac95ec64097a1021971e6c6b4d40503db4b15
SHA51244eb413c8265acee17e9973102f67240f978b19a902758051263e594b04d40e40f6543ada8f3ef5991049ccd9b8741c840c9792f2b4bf83228c1aeedd18c9f5d
-
Filesize
1KB
MD57f3c0ae41f0d9ae10a8985a2c327b8fb
SHA1d58622bf6b5071beacf3b35bb505bde2000983e3
SHA256519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900
SHA5128a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125
-
Filesize
235B
MD516d3c57f05fde8b236e2b03c062a25bc
SHA1a3e1b0398b86430930a9dcd3edf8f306ac72579b
SHA2564132e11e71f04464656b1e9b46840b7afd1c26440b6034ca0fb45d1487a53823
SHA5129ab49612ec84c450e932a308902084a654efd4e4738b3108a1c93181347ca8fbab57e0078d8b2cd78f8e3517ff08a29a41a55298703a522f714253dc813c6120
-
Filesize
195B
MD53fde55f7bab49025957d22909954f59c
SHA119fd237ba26919711f15f26066e2b71905118f41
SHA256fd363cb2062dece1687633927f89c926ae3b5fe3b59a0580e6ea257437884573
SHA5120c3efc41352457a3cbe59d97984c060c485b73f3251a2940309c5ac71ce1151a83c0b2d13af870f62a044e8f83630fc43f7195cff0353e4d41c8696e0e72ff2b