Overview
overview
10Static
static
102024-08-08.zip
windows10-1703-x64
10163684970...64.exe
windows10-1703-x64
80581756a65...1b.exe
windows10-1703-x64
306fcfd75f4...40.exe
windows10-1703-x64
6083b02e212...c7.exe
windows10-1703-x64
3087a3b8725...c9.jar
windows10-1703-x64
708c7fb6067...a2.exe
windows10-1703-x64
30e85d0a9fc...50.exe
windows10-1703-x64
60f1b66752d...9d.exe
windows10-1703-x64
30f2abe41f4...70.exe
windows10-1703-x64
100f8a6d8705...e5.exe
windows10-1703-x64
101026da21d9...42.exe
windows10-1703-x64
10109927ded1...91.exe
windows10-1703-x64
615c71b616f...79.exe
windows10-1703-x64
1017b5394a5c...70.exe
windows10-1703-x64
101873c4b2bd...d4.exe
windows10-1703-x64
1019efe1624f...3c.exe
windows10-1703-x64
101de0ce90e5...f7.vbe
windows10-1703-x64
11e6ad08c5e...5f.exe
windows10-1703-x64
101f7cedbe04...4c.exe
windows10-1703-x64
1022586df437...62.exe
windows10-1703-x64
1029f90a4f62...e6.xls
windows10-1703-x64
12b34ad054e...da.exe
windows10-1703-x64
102bb032333f...2c.exe
windows10-1703-x64
32bda6048a8...dc.exe
windows10-1703-x64
72c7da6690b...6a.exe
windows10-1703-x64
42caf283566...2e.exe
windows10-1703-x64
10300d87987d...45.exe
windows10-1703-x64
7353a75d0ad...a5.exe
windows10-1703-x64
7391ac1ceed...57.exe
windows10-1703-x64
7d4cb60a0e9...01.hta
windows10-1703-x64
10e0fa6d69b2...1e.msi
windows10-1703-x64
6Analysis
-
max time kernel
151s -
max time network
199s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
10-08-2024 17:49
Behavioral task
behavioral1
Sample
2024-08-08.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
01636849700a046589f6e2b58ca6b02ec108fd20534973f83737f1749af16e64.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
0581756a656ace2e7d164b1f66846e9d079755bd7a5cead72e73b53ab534531b.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
06fcfd75f456e542f161dc3e74b1c7ccc52e6cded909f5f06e00c847e5bedf40.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
083b02e21246fa17ee9ac50eab39033abd920274259ad848df9eb412d4350ec7.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
087a3b87252a021f6f3696f496d4fd890f28fc31735d8f850aa1184ed7bf59c9.jar
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
08c7fb6067acc8ac207d28ab616c9ea5bc0d394956455d6a3eecb73f8010f7a2.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
0e85d0a9fcf30f823c43e697f99cf61743ef1d29228e160f19005e343f2a5b50.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
0f1b66752dea36f9ad237a452b4bfb2950ab3ce90fcd920c6708f69ee8ce8c9d.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
0f2abe41f47c8287b81f6f5be7983b8486b298d7121bbc8435ccd334a5f7ce70.exe
Resource
win10-20240611-en
Behavioral task
behavioral11
Sample
0f8a6d8705eba15b8958bd7984d9c46f1f5510790249b3fa330740a626ef45e5.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
1026da21d95ab9bc3a5dff5163d8029ea6ca3413e586272074105e4727ab1342.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
109927ded1c6f8ce79192bc804efab8f52e6924d16476236eef82a1631349d91.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
15c71b616f8ff314907e2e9f15601adc81529f6129acd67751bf7d16b4d52479.exe
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
17b5394a5cea17aa14672179b10eb87f650675bbabb6bbf12e5cb62916c62770.exe
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
1873c4b2bde16da1d2e923d66d20eea2536bc824e5134b60f3df4b770edf72d4.exe
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe
Resource
win10-20240611-en
Behavioral task
behavioral18
Sample
1de0ce90e503e10f763f00b591d48973bb213d3979c517097b252881630257f7.vbe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
1e6ad08c5ed9b4fdbef86181e8cd01170fe9ec5615d9a37f90e7ea43bcad175f.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
1f7cedbe04af43e29efdfecce0580ab826b577bd0d7c9f6db3d1c58a8eeffb4c.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
22586df4379d432c8e5d2d852bbecf70558da09f77ec0f7ac46d28e4928a7462.exe
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
29f90a4f6266e43e668b41187ef4e8c2acdfccab8a8c898e64349a5432081ce6.xls
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
2b34ad054e9dde8cbc0abfbe1379a7f0343cb32d92f3411ec2c2ff02ae5673da.exe
Resource
win10-20240611-en
Behavioral task
behavioral24
Sample
2bb032333f6f2199f35a512aa920a651975ea1b4c3aa7fac0ad69efa2539f42c.exe
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
2bda6048a888003443cd18df65f75441974ea3dfa04d524c957b0d7c268654dc.exe
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
2c7da6690be26bd6b5ceea90b233fdd26589d7a72b2a62468903aba887e7ad6a.exe
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
2caf283566656a13bf71f8ceac3c81f58a049c92a788368323b1ba25d872372e.exe
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
300d87987d360bd4abc2927a791031f41450cdf547c830902107daceba263a45.exe
Resource
win10-20240611-en
Behavioral task
behavioral29
Sample
353a75d0ad34c89fbdd11ec9cc6f6ea302f5669c5c1326686f7d328e656d1ea5.exe
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
391ac1ceedd3c960f32890f834a86ba1570ee5a0cc12dcef1714d43bb29fc457.exe
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
d4cb60a0e93c856f642f862e51cf4af34f626c8d1e1b995b5e9dfb3e72db1101.hta
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
e0fa6d69b26f18cfdef3bd930d067eca476b3d2cb78d14bec88f05ae87d25b1e.msi
Resource
win10-20240404-en
General
-
Target
19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe
-
Size
827KB
-
MD5
6fa85ee085f3116d1300286649404c26
-
SHA1
82537e484282db0d26eb890c4d2a04ff854a088f
-
SHA256
19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c
-
SHA512
d17f6bb4e3bf9bfcd4e4265a94430a68bf178c518ba7174d7231a59f0927d21cf77986d38c9e86dc851cda76dc1b477bcf0be0a3a4a36e8a65d8fa43e6aa4e89
-
SSDEEP
12288:l6oKQd2h6uX9vOWSAF9MgaBwbVQ5a3tbEzKlPFQErxTYeclv1CWX:Oxh6uXWzwBQ52jLxTY/X
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4184 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4632 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3764 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4948 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3312 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2232 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4272 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4504 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5048 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4228 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 676 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4608 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5060 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4124 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4420 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4400 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4460 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3196 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3224 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3964 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4840 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3876 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3848 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3772 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4620 1520 schtasks.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4384 1520 schtasks.exe 71 -
resource yara_rule behavioral17/memory/540-1-0x0000000000320000-0x00000000003F6000-memory.dmp dcrat behavioral17/files/0x000700000001abba-11.dat dcrat -
Executes dropped EXE 1 IoCs
pid Process 1836 dllhost.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\886983d96e3d3e 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\Mozilla Firefox\sysmon.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\f8c8f1285d826b 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\29c1c3cc0f7685 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\dllhost.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Windows Portable Devices\sysmon.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Windows Portable Devices\121e5b5079f7c0 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\Mozilla Firefox\121e5b5079f7c0 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\f3b6ecef712a24 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ShellExperienceHost.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Windows Portable Devices\dwm.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\Java\jre-1.8\5b884080fd4f94 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\5940a34987c991 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\csrss.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Windows Portable Devices\6cb0b6c459d5d3 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\spoolsv.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\Java\jre-1.8\fontdrvhost.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\unsecapp.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logs\sysmon.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Windows\Logs\121e5b5079f7c0 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Windows\ja-JP\csrss.exe 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe File created C:\Windows\ja-JP\886983d96e3d3e 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe 4632 schtasks.exe 4976 schtasks.exe 4948 schtasks.exe 2212 schtasks.exe 2188 schtasks.exe 2420 schtasks.exe 1064 schtasks.exe 3772 schtasks.exe 4128 schtasks.exe 3688 schtasks.exe 3196 schtasks.exe 4888 schtasks.exe 4228 schtasks.exe 2468 schtasks.exe 4420 schtasks.exe 4504 schtasks.exe 2296 schtasks.exe 4840 schtasks.exe 2464 schtasks.exe 676 schtasks.exe 3964 schtasks.exe 2236 schtasks.exe 2284 schtasks.exe 4124 schtasks.exe 2336 schtasks.exe 4608 schtasks.exe 2372 schtasks.exe 4768 schtasks.exe 5060 schtasks.exe 3876 schtasks.exe 4988 schtasks.exe 2748 schtasks.exe 2892 schtasks.exe 4620 schtasks.exe 3764 schtasks.exe 4460 schtasks.exe 3848 schtasks.exe 2348 schtasks.exe 4272 schtasks.exe 2272 schtasks.exe 3224 schtasks.exe 3808 schtasks.exe 3312 schtasks.exe 2624 schtasks.exe 4400 schtasks.exe 5048 schtasks.exe 4384 schtasks.exe 4184 schtasks.exe 1916 schtasks.exe 2232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 1836 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe Token: SeDebugPrivilege 1836 dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 540 wrote to memory of 3608 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 123 PID 540 wrote to memory of 3608 540 19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe 123 PID 3608 wrote to memory of 1288 3608 cmd.exe 125 PID 3608 wrote to memory of 1288 3608 cmd.exe 125 PID 3608 wrote to memory of 1836 3608 cmd.exe 126 PID 3608 wrote to memory of 1836 3608 cmd.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe"C:\Users\Admin\AppData\Local\Temp\19efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EIHpi6toFP.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1288
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\dllhost.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Users\Public\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Windows\Logs\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\Logs\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Windows\Logs\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files\Java\jre-1.8\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Java\jre-1.8\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files\Java\jre-1.8\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\ja-JP\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\VLC\plugins\video_chroma\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\plugins\video_chroma\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Program Files\VideoLAN\VLC\plugins\video_chroma\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Default User\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Downloads\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\Downloads\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Downloads\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Desktop\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\Desktop\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Desktop\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files\Mozilla Firefox\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Program Files\Mozilla Firefox\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\ShellExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD56fa85ee085f3116d1300286649404c26
SHA182537e484282db0d26eb890c4d2a04ff854a088f
SHA25619efe1624f526c084e096431a4b1e5bf63c299351751fa0bf466106a99196d3c
SHA512d17f6bb4e3bf9bfcd4e4265a94430a68bf178c518ba7174d7231a59f0927d21cf77986d38c9e86dc851cda76dc1b477bcf0be0a3a4a36e8a65d8fa43e6aa4e89
-
Filesize
223B
MD59c4031c2819e10fada8dcc9dc5380795
SHA120c082fc4f6c23d764ad7e25763fd6ede33850b0
SHA256705dac78526b5da6766bd0fdca1b4603ccb2cb188ff468428046b7086d7d9f3d
SHA512c874f4d7586ab8599603180ddbeace2d901696f853c9fae0f232ac38de129481e4cb33e24a4b9349cf34d5997ed9ef927d5f4b4a8577f24ca11b08af2daea1b6