Analysis
-
max time kernel
1796s -
max time network
1801s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 16:32
Behavioral task
behavioral1
Sample
DDWDWDEFWFWFW.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
DDWDWDEFWFWFW.exe
Resource
win10v2004-20240802-en
General
-
Target
DDWDWDEFWFWFW.exe
-
Size
1.1MB
-
MD5
0b866728f53216298c5838001327a956
-
SHA1
537e8cb306ae03886ead31213a51c07cb383843b
-
SHA256
a7bce36c1b3ec137cc3e5f862de32a8eac49f8c224d5e4f9ed7362eb0ef5f331
-
SHA512
06f2a9de1804344440e69546230e55772ab44027a9fa7f4aa01ae5a0362813de87f206bb7d28f93cbd1eebb5de0703b2af2e5694c97e2c26a9901e3cebc23d5c
-
SSDEEP
24576:U2G/nvxW3Ww0tF6hojpO2kdXp/oejF5vBqf6jn:UbA30ghojidXnj1b
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3224 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3568 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3372 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4452 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 732 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 520 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 1844 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 1844 schtasks.exe 90 -
resource yara_rule behavioral2/files/0x0007000000023430-10.dat dcrat behavioral2/memory/4644-13-0x0000000000FE0000-0x00000000010B6000-memory.dmp dcrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation DDWDWDEFWFWFW.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation portWeb.exe -
Executes dropped EXE 19 IoCs
pid Process 4644 portWeb.exe 2176 WmiPrvSE.exe 2996 dllhost.exe 4112 unsecapp.exe 4908 taskhostw.exe 3500 SppExtComObj.exe 100 upfc.exe 2452 WmiPrvSE.exe 1732 dllhost.exe 4208 unsecapp.exe 4740 taskhostw.exe 4928 SppExtComObj.exe 2136 dllhost.exe 4612 upfc.exe 1952 WmiPrvSE.exe 4052 unsecapp.exe 944 taskhostw.exe 1100 dllhost.exe 2192 SppExtComObj.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ipinfo.io 17 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b4252efd-d80e-4a58-961c-914f812bb644.bmp" WmiPrvSE.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe portWeb.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\5940a34987c991 portWeb.exe File created C:\Program Files\ModifiableWindowsApps\RuntimeBroker.exe portWeb.exe File created C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe portWeb.exe File created C:\Program Files\Java\jdk-1.8\include\win32\24dbde2999530e portWeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDWDWDEFWFWFW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\WallpaperStyle = "2" WmiPrvSE.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\TileWallpaper = "0" WmiPrvSE.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings DDWDWDEFWFWFW.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4452 schtasks.exe 4924 schtasks.exe 1688 schtasks.exe 3560 schtasks.exe 4512 schtasks.exe 732 schtasks.exe 684 schtasks.exe 2972 schtasks.exe 2992 schtasks.exe 3460 schtasks.exe 3968 schtasks.exe 1100 schtasks.exe 520 schtasks.exe 3372 schtasks.exe 1388 schtasks.exe 1040 schtasks.exe 2036 schtasks.exe 2268 schtasks.exe 3496 schtasks.exe 3224 schtasks.exe 3568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4644 portWeb.exe 4644 portWeb.exe 4644 portWeb.exe 4644 portWeb.exe 4644 portWeb.exe 4644 portWeb.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe 2176 WmiPrvSE.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 4644 portWeb.exe Token: SeDebugPrivilege 2176 WmiPrvSE.exe Token: SeDebugPrivilege 2996 dllhost.exe Token: SeDebugPrivilege 4112 unsecapp.exe Token: SeDebugPrivilege 4908 taskhostw.exe Token: SeDebugPrivilege 3500 SppExtComObj.exe Token: SeDebugPrivilege 100 upfc.exe Token: SeDebugPrivilege 2452 WmiPrvSE.exe Token: SeDebugPrivilege 1732 dllhost.exe Token: SeDebugPrivilege 4208 unsecapp.exe Token: SeDebugPrivilege 4740 taskhostw.exe Token: SeDebugPrivilege 4928 SppExtComObj.exe Token: SeDebugPrivilege 2136 dllhost.exe Token: SeDebugPrivilege 4612 upfc.exe Token: SeDebugPrivilege 1952 WmiPrvSE.exe Token: SeDebugPrivilege 4052 unsecapp.exe Token: SeDebugPrivilege 944 taskhostw.exe Token: SeDebugPrivilege 1100 dllhost.exe Token: SeDebugPrivilege 2192 SppExtComObj.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1788 3816 DDWDWDEFWFWFW.exe 85 PID 3816 wrote to memory of 1788 3816 DDWDWDEFWFWFW.exe 85 PID 3816 wrote to memory of 1788 3816 DDWDWDEFWFWFW.exe 85 PID 1788 wrote to memory of 1236 1788 WScript.exe 91 PID 1788 wrote to memory of 1236 1788 WScript.exe 91 PID 1788 wrote to memory of 1236 1788 WScript.exe 91 PID 1236 wrote to memory of 4644 1236 cmd.exe 93 PID 1236 wrote to memory of 4644 1236 cmd.exe 93 PID 4644 wrote to memory of 2176 4644 portWeb.exe 115 PID 4644 wrote to memory of 2176 4644 portWeb.exe 115 PID 2176 wrote to memory of 4448 2176 WmiPrvSE.exe 121 PID 2176 wrote to memory of 4448 2176 WmiPrvSE.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DDWDWDEFWFWFW.exe"C:\Users\Admin\AppData\Local\Temp\DDWDWDEFWFWFW.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockSurrogateproviderDriver\yxVFrgHnPUQhIhJ9dInhupQ.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\blockSurrogateproviderDriver\BnIRrLeddeMqLEk8Oz77030QB.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\blockSurrogateproviderDriver\portWeb.exe"C:\blockSurrogateproviderDriver\portWeb.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"5⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\\XFk51gP3Gp.bat"6⤵PID:4448
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\blockSurrogateproviderDriver\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\blockSurrogateproviderDriver\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\blockSurrogateproviderDriver\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\blockSurrogateproviderDriver\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\blockSurrogateproviderDriver\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\blockSurrogateproviderDriver\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
C:\blockSurrogateproviderDriver\unsecapp.exeC:\blockSurrogateproviderDriver\unsecapp.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
C:\blockSurrogateproviderDriver\taskhostw.exeC:\blockSurrogateproviderDriver\taskhostw.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
C:\Recovery\WindowsRE\SppExtComObj.exeC:\Recovery\WindowsRE\SppExtComObj.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
C:\Recovery\WindowsRE\upfc.exeC:\Recovery\WindowsRE\upfc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:100
-
C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
C:\blockSurrogateproviderDriver\unsecapp.exeC:\blockSurrogateproviderDriver\unsecapp.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
C:\blockSurrogateproviderDriver\taskhostw.exeC:\blockSurrogateproviderDriver\taskhostw.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
C:\Recovery\WindowsRE\SppExtComObj.exeC:\Recovery\WindowsRE\SppExtComObj.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
C:\Recovery\WindowsRE\upfc.exeC:\Recovery\WindowsRE\upfc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"C:\Program Files\Java\jdk-1.8\include\win32\WmiPrvSE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
C:\blockSurrogateproviderDriver\unsecapp.exeC:\blockSurrogateproviderDriver\unsecapp.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
C:\blockSurrogateproviderDriver\taskhostw.exeC:\blockSurrogateproviderDriver\taskhostw.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:944
-
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dllhost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
C:\Recovery\WindowsRE\SppExtComObj.exeC:\Recovery\WindowsRE\SppExtComObj.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
44B
MD5d22873a432ee310a81b55f9ed9076a35
SHA16634f60bd1c924a0c4161912a9671e2f55dee4ac
SHA2568a4f4e4f942104f2a61a587767f560fe2cfce39eae69bf1b971ca0776ff2fd23
SHA51231a0dd03ee4c113287a484425736d921f87ce705d5062d7f7af56d1a7539f9ef6e05904adb10ab162672c52e63df064c34b6f5d8bb431031735e042e186b6eae
-
Filesize
45B
MD5aade567d575a20d4cd32465999a0a616
SHA11557e726501a9bc68b39433318c6068ac398b974
SHA256ac261f0e3cb9b69deb773ec6ed38a3c31fe254b8719f686364f9f72b0458ef0b
SHA51255042546300dd8cfe3ee0c4302eedd199331249c262b3c0c29a854621953efd3cfac401228e48ee03e8e39bd411de119de5ee3191f8d9d668465fc59bc3916ce
-
Filesize
827KB
MD5d361a74aa9f84d0c66083ef19fd60aa1
SHA1a73b6068d1e052759c40a72ca371eb2f3cabf340
SHA25634e8398110cca41b98248521e131484f9d3a203dba09a5a97f18d252bbb0cd82
SHA5129fdf085f90aadd77b50c76296cd96cecd9573edb0fe7470f7e1800c232d494da0811e1ddb8beeb907a20051ed22b6a1c879e6f2ba5ca9d00281df373c11f0d85
-
Filesize
230B
MD5f9709c347a5df84085285a6c9e2e1198
SHA139d766f701bd6f1324513ecbbf0975d4ebdd4cd4
SHA256e332c5e30bd1c4bdaa0422c27d2c26089a9a9cf52b1303a41a8600a614ac5f12
SHA5129753519a72b5b8de527a17cf8848afb81091dab7d9adb518154a7ea7af817c1384cdfc2d831b687c90a775895b549ba1b7f313393a856efd6c15890cedbd4436