Overview
overview
10Static
static
102024-08-08.zip
windows10-1703-x64
10163684970...64.exe
windows10-1703-x64
80581756a65...1b.exe
windows10-1703-x64
306fcfd75f4...40.exe
windows10-1703-x64
6083b02e212...c7.exe
windows10-1703-x64
3087a3b8725...c9.jar
windows10-1703-x64
708c7fb6067...a2.exe
windows10-1703-x64
30e85d0a9fc...50.exe
windows10-1703-x64
60f1b66752d...9d.exe
windows10-1703-x64
30f2abe41f4...70.exe
windows10-1703-x64
100f8a6d8705...e5.exe
windows10-1703-x64
101026da21d9...42.exe
windows10-1703-x64
10109927ded1...91.exe
windows10-1703-x64
615c71b616f...79.exe
windows10-1703-x64
1017b5394a5c...70.exe
windows10-1703-x64
101873c4b2bd...d4.exe
windows10-1703-x64
1019efe1624f...3c.exe
windows10-1703-x64
101de0ce90e5...f7.vbe
windows10-1703-x64
11e6ad08c5e...5f.exe
windows10-1703-x64
101f7cedbe04...4c.exe
windows10-1703-x64
1022586df437...62.exe
windows10-1703-x64
1029f90a4f62...e6.xls
windows10-1703-x64
12b34ad054e...da.exe
windows10-1703-x64
102bb032333f...2c.exe
windows10-1703-x64
32bda6048a8...dc.exe
windows10-1703-x64
72c7da6690b...6a.exe
windows10-1703-x64
42caf283566...2e.exe
windows10-1703-x64
10300d87987d...45.exe
windows10-1703-x64
7353a75d0ad...a5.exe
windows10-1703-x64
7391ac1ceed...57.exe
windows10-1703-x64
7d4cb60a0e9...01.hta
windows10-1703-x64
10e0fa6d69b2...1e.msi
windows10-1703-x64
6Analysis
-
max time kernel
150s -
max time network
165s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-08-2024 17:49
Behavioral task
behavioral1
Sample
2024-08-08.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
01636849700a046589f6e2b58ca6b02ec108fd20534973f83737f1749af16e64.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
0581756a656ace2e7d164b1f66846e9d079755bd7a5cead72e73b53ab534531b.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
06fcfd75f456e542f161dc3e74b1c7ccc52e6cded909f5f06e00c847e5bedf40.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
083b02e21246fa17ee9ac50eab39033abd920274259ad848df9eb412d4350ec7.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
087a3b87252a021f6f3696f496d4fd890f28fc31735d8f850aa1184ed7bf59c9.jar
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
08c7fb6067acc8ac207d28ab616c9ea5bc0d394956455d6a3eecb73f8010f7a2.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
0e85d0a9fcf30f823c43e697f99cf61743ef1d29228e160f19005e343f2a5b50.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
0f1b66752dea36f9ad237a452b4bfb2950ab3ce90fcd920c6708f69ee8ce8c9d.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
0f2abe41f47c8287b81f6f5be7983b8486b298d7121bbc8435ccd334a5f7ce70.exe
Resource
win10-20240611-en
Behavioral task
behavioral11
Sample
0f8a6d8705eba15b8958bd7984d9c46f1f5510790249b3fa330740a626ef45e5.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
109927ded1c6f8ce79192bc804efab8f52e6924d16476236eef82a1631349d91.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
15c71b616f8ff314907e2e9f15601adc81529f6129acd67751bf7d16b4d52479.exe
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
17b5394a5cea17aa14672179b10eb87f650675bbabb6bbf12e5cb62916c62770.exe
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
1873c4b2bde16da1d2e923d66d20eea2536bc824e5134b60f3df4b770edf72d4.exe
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe
Resource
win10-20240611-en
Behavioral task
behavioral18
Sample
1de0ce90e503e10f763f00b591d48973bb213d3979c517097b252881630257f7.vbe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
1e6ad08c5ed9b4fdbef86181e8cd01170fe9ec5615d9a37f90e7ea43bcad175f.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
1f7cedbe04af43e29efdfecce0580ab826b577bd0d7c9f6db3d1c58a8eeffb4c.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
22586df4379d432c8e5d2d852bbecf70558da09f77ec0f7ac46d28e4928a7462.exe
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
29f90a4f6266e43e668b41187ef4e8c2acdfccab8a8c898e64349a5432081ce6.xls
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
2b34ad054e9dde8cbc0abfbe1379a7f0343cb32d92f3411ec2c2ff02ae5673da.exe
Resource
win10-20240611-en
Behavioral task
behavioral24
Sample
2bb032333f6f2199f35a512aa920a651975ea1b4c3aa7fac0ad69efa2539f42c.exe
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
2bda6048a888003443cd18df65f75441974ea3dfa04d524c957b0d7c268654dc.exe
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
2c7da6690be26bd6b5ceea90b233fdd26589d7a72b2a62468903aba887e7ad6a.exe
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
2caf283566656a13bf71f8ceac3c81f58a049c92a788368323b1ba25d872372e.exe
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
300d87987d360bd4abc2927a791031f41450cdf547c830902107daceba263a45.exe
Resource
win10-20240611-en
Behavioral task
behavioral29
Sample
353a75d0ad34c89fbdd11ec9cc6f6ea302f5669c5c1326686f7d328e656d1ea5.exe
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
391ac1ceedd3c960f32890f834a86ba1570ee5a0cc12dcef1714d43bb29fc457.exe
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
d4cb60a0e93c856f642f862e51cf4af34f626c8d1e1b995b5e9dfb3e72db1101.hta
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
e0fa6d69b26f18cfdef3bd930d067eca476b3d2cb78d14bec88f05ae87d25b1e.msi
Resource
win10-20240404-en
General
-
Target
1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe
-
Size
3.6MB
-
MD5
4cf736359926f19077a4c21300613900
-
SHA1
ccadc053294ab749b8588e96d970b2b9f68673eb
-
SHA256
1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342
-
SHA512
f06470ccf1777ae0b4dbf1fb55af6804178bb18bd92eb2da5d091acdadc93206ab94358698bf272353462cc56cee9a5453b0f8a251f989805a55ce76190dc64b
-
SSDEEP
98304:ubzJfmjiWIkSsHIDR6ToISNCEVmC0LyZG7:ulmjPZSsoYoISNV0BLI2
Malware Config
Signatures
-
DcRat 14 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\6dd19aba3e2428 surrogatenetsvc.exe 4112 schtasks.exe 2516 schtasks.exe 5100 schtasks.exe 4892 schtasks.exe 1104 schtasks.exe 3056 schtasks.exe 1636 schtasks.exe 4744 schtasks.exe 4880 schtasks.exe 1860 schtasks.exe 4628 schtasks.exe 704 schtasks.exe -
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4112 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4628 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 704 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4744 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 4444 schtasks.exe 80 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4892 4444 schtasks.exe 80 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" surrogatenetsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" surrogatenetsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" surrogatenetsvc.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
resource yara_rule behavioral12/files/0x000700000001acdd-16.dat dcrat behavioral12/memory/2460-19-0x00000000006A0000-0x00000000009FE000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2460 surrogatenetsvc.exe 484 csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA surrogatenetsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" surrogatenetsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe surrogatenetsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\6dd19aba3e2428 surrogatenetsvc.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe surrogatenetsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\AppPatch\en-US\OfficeClickToRun.exe surrogatenetsvc.exe File created C:\Windows\AppPatch\en-US\e6c9b481da804f surrogatenetsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings surrogatenetsvc.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2464 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4892 schtasks.exe 4112 schtasks.exe 1104 schtasks.exe 2516 schtasks.exe 1636 schtasks.exe 3056 schtasks.exe 5100 schtasks.exe 4880 schtasks.exe 1860 schtasks.exe 4628 schtasks.exe 704 schtasks.exe 4744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 2460 surrogatenetsvc.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe 484 csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 484 csrss.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2460 surrogatenetsvc.exe Token: SeDebugPrivilege 484 csrss.exe Token: SeBackupPrivilege 3992 vssvc.exe Token: SeRestorePrivilege 3992 vssvc.exe Token: SeAuditPrivilege 3992 vssvc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3348 wrote to memory of 1912 3348 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe 75 PID 3348 wrote to memory of 1912 3348 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe 75 PID 3348 wrote to memory of 1912 3348 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe 75 PID 3348 wrote to memory of 3076 3348 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe 76 PID 3348 wrote to memory of 3076 3348 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe 76 PID 3348 wrote to memory of 3076 3348 1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe 76 PID 1912 wrote to memory of 3580 1912 WScript.exe 77 PID 1912 wrote to memory of 3580 1912 WScript.exe 77 PID 1912 wrote to memory of 3580 1912 WScript.exe 77 PID 3580 wrote to memory of 2460 3580 cmd.exe 79 PID 3580 wrote to memory of 2460 3580 cmd.exe 79 PID 2460 wrote to memory of 3632 2460 surrogatenetsvc.exe 93 PID 2460 wrote to memory of 3632 2460 surrogatenetsvc.exe 93 PID 3632 wrote to memory of 3024 3632 cmd.exe 95 PID 3632 wrote to memory of 3024 3632 cmd.exe 95 PID 3580 wrote to memory of 2464 3580 cmd.exe 96 PID 3580 wrote to memory of 2464 3580 cmd.exe 96 PID 3580 wrote to memory of 2464 3580 cmd.exe 96 PID 3632 wrote to memory of 484 3632 cmd.exe 97 PID 3632 wrote to memory of 484 3632 cmd.exe 97 PID 484 wrote to memory of 2824 484 csrss.exe 98 PID 484 wrote to memory of 2824 484 csrss.exe 98 PID 484 wrote to memory of 920 484 csrss.exe 99 PID 484 wrote to memory of 920 484 csrss.exe 99 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" surrogatenetsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" surrogatenetsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" surrogatenetsvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe"C:\Users\Admin\AppData\Local\Temp\1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\hyperChaincrtdhcp\W484khEzBTOw1PD2BkAq8Rq.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\hyperChaincrtdhcp\6ThdyFOhxVnd16OS.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\hyperChaincrtdhcp\surrogatenetsvc.exe"C:\hyperChaincrtdhcp\surrogatenetsvc.exe"4⤵
- DcRat
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2460 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\URQljcfPtk.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:3024
-
-
C:\Users\Default\Desktop\csrss.exe"C:\Users\Default\Desktop\csrss.exe"6⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:484 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec41b82c-e465-4557-87f6-aa0e536adc8b.vbs"7⤵PID:2824
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0a7852c7-aa85-4825-8a70-582de4ad4ba3.vbs"7⤵PID:920
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2464
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\hyperChaincrtdhcp\file.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ApplicationFrameHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\ApplicationFrameHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Windows\AppPatch\en-US\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\AppPatch\en-US\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Windows\AppPatch\en-US\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Desktop\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\Desktop\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Desktop\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\hyperChaincrtdhcp\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\hyperChaincrtdhcp\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\hyperChaincrtdhcp\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4892
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3284
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486B
MD584970241ca7650b46e9f1ecdfc692e4e
SHA167c093f88f817ffaec93bb2ae49ed6661810b4df
SHA256ca2c387518755296d8718e68fa201559868ea8282dbb2527a9e38c4c9dda6a17
SHA51259440e73ebc800c6bacda91eeb1ad52dd1ad5d4a72ca0cdd7acc137531d0cffa41d71969cf2eee6665c47fa456e5805d04bd7efad0c263c6ade758894f402bd4
-
Filesize
199B
MD5ce5aad0abbc7733980295bb8e5653d7d
SHA186dcd0a6162e47a19e6806d94a27cb7d5cd6fc8c
SHA25664b33ce5c3c4ed49f925cac38fbedeba7554960202452c34eb9bc82822ed449c
SHA512dd371f2e334817be1c834b2cacc3511643dcf81c3124e08dffe30ca3976c0fd2bc56060e2e6177cee13ed1ba34b75cba57a30d9f50fab4be1f605a43b5e26dec
-
Filesize
709B
MD5dab95fd326d52d71931c7c332e869b3b
SHA1b694fda2ebecf39f798a833f7a2f0d79864446ad
SHA2568a9d04b5aef6161155b2f8233d161cf277246d4bf6f9a029f705152ef4c0e240
SHA51255a4b636d85c30c19bc375df75867cb08c619376dc48bf7590cc16661624732a44ad256c414952b7c1dc28f1d3c2f88b95918c6b2236a752a842e691e890ec55
-
Filesize
165B
MD5b3a5b424617b3b0c12b97a029f703e70
SHA12cf751234ee9482ba6478d277c7485c70663cc3f
SHA25637f84b4794429f2dbb20d445d7e643940819168923b3698fec1a66dfbef1529a
SHA512f07fc8ce678b8e11bb86afc69531b16d905d04bc3bb6ac138d3a57bd225775ee47dbbc25ef6b62010a59e21fb6bcaa0ed990fa08725114c0c3f347720d8ee397
-
Filesize
221B
MD5f7f659a7d4d5e1d041b9bb28858d3424
SHA13b35c04183e961d87d3cde33225677eabca19783
SHA256d06e295ba89042d20c86a71cf3840117afaac582ce6353c4f94f7be4d67cb298
SHA5129ed6fab84e566e119a7ad6af57f6876a40d1a6abea3c9c2e1dd08dcf7823d15e0365be4b5b7158a26edfb1f8be8180a3633d2fb2b32932b15aaedd5605f8e8b3
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
3.3MB
MD565c542e08ee66cd5954e6cd63a71b352
SHA1b1e4e2ee05e63e084ec06300706b55f8f2267303
SHA25631d1c930871005d4da7e67478a2a44faef8842a135769114cb1ff65488671a2e
SHA5128d626876d0709c9ed5514d02841620dd612f1d496a14dea595f2069c1eac352678cccd4ebccde6b5d430c42d3161d9fae29f59d9ce31251051e8090d8cfe9335