Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 07:43

General

  • Target

    АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe

  • Size

    745KB

  • MD5

    5e82f4a00b31da2ecd210a7c7575e29d

  • SHA1

    518e5f78b256ee794ebbc8f96275993a9252be23

  • SHA256

    80446e16d616fee4a8ffeef94f2dc1f5737435d07a111de9622f13a98a5f196e

  • SHA512

    5f794743493acff89407966cdc2b3df386389d90f2468ec5a32c4df2a2ba6dfddea60886ab14a6e9a1b4ddc173989278e2c7397d430aea8c01297b40d782a900

  • SSDEEP

    12288:sBpoIY///1UFxJF80IsoBVnsNxd2LFErkUzw2jtQsnmeTRf7qrc5PPjr21tM/7nf:ZIY/4FcHG/MnUzVhmMRfG4lLr2M/T

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

thomas-drops.gl.at.ply.gg:45773

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe
    "C:\Users\Admin\AppData\Local\Temp\АОАОАОАОА БЕСПЛАТНЫЕ РОБУКСЫ.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\gggg.exe
      "C:\Users\Admin\AppData\Local\Temp\gggg.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ChainComponentBrowserwin\zJJP8u9NRTk6u.vbe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ChainComponentBrowserwin\ZckenFSJPCIUJWjfI5CZYMEmaPZVg.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\ChainComponentBrowserwin\reviewdriver.exe
            "C:\ChainComponentBrowserwin\reviewdriver.exe"
            5⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2032
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lCNhli7JYn.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2808
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2592
                • C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe
                  "C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe"
                  7⤵
                  • Modifies WinLogon for persistence
                  • UAC bypass
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:2604
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dbccd094-23e6-41a9-bb52-cf2441435fec.vbs"
                    8⤵
                      PID:1456
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ed8c3ac0-e6fa-4563-a4e6-a4c3996c718a.vbs"
                      8⤵
                        PID:2052
                      • C:\Windows\system32\cmd.exe
                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\8t4fMT0wY0.bat" "
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2812
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          9⤵
                            PID:2056
            • C:\Users\Admin\AppData\Local\Temp\Server.exe
              "C:\Users\Admin\AppData\Local\Temp\Server.exe"
              2⤵
              • Drops startup file
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:2824
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3020
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2440
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2896
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\audiodg.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:588
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2844
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Sidebar\it-IT\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2888
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\sppsvc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:872
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2432
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2336
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Windows\RemotePackages\smss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1308
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\RemotePackages\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2028
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Windows\RemotePackages\smss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:596
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1564
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3000
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2452
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\SoftwareDistribution\ScanFile\winlogon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3016
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\ScanFile\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1972
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Windows\SoftwareDistribution\ScanFile\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:996
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Pictures\wininit.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1696
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1872
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Pictures\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1148
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2928
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2424
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:624
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:716
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2532
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1612
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Cookies\audiodg.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:328
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Admin\Cookies\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1020
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Cookies\audiodg.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2500
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\ChainComponentBrowserwin\lsm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1540
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\ChainComponentBrowserwin\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2348
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\ChainComponentBrowserwin\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1216
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\sppsvc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1408
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1496
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Videos\wininit.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2148
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Videos\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2092
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Videos\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2488
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\CrashReports\lsm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1892
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:548
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\CrashReports\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2096
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Recorded TV\Sample Media\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:772
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\Recorded TV\Sample Media\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:496
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Recorded TV\Sample Media\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2380
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\services.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1588
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2760
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2960
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "reviewdriver" /f
            1⤵
            • Process spawned unexpected child process
            PID:1976
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "reviewdriverr" /f
            1⤵
            • Process spawned unexpected child process
            PID:3000
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "Idle" /f
            1⤵
            • Process spawned unexpected child process
            PID:2272
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "IdleI" /f
            1⤵
            • Process spawned unexpected child process
            PID:1660
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "audiodg" /f
            1⤵
            • Process spawned unexpected child process
            PID:1940
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "audiodga" /f
            1⤵
            • Process spawned unexpected child process
            PID:1340
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "sppsvc" /f
            1⤵
            • Process spawned unexpected child process
            PID:1708
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "sppsvcs" /f
            1⤵
            • Process spawned unexpected child process
            PID:924
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "smss" /f
            1⤵
            • Process spawned unexpected child process
            PID:1756
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "smsss" /f
            1⤵
            • Process spawned unexpected child process
            PID:2940
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "audiodg" /f
            1⤵
            • Process spawned unexpected child process
            PID:1916
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "audiodga" /f
            1⤵
            • Process spawned unexpected child process
            PID:760
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "winlogon" /f
            1⤵
            • Process spawned unexpected child process
            PID:2292
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "winlogonw" /f
            1⤵
            • Process spawned unexpected child process
            PID:3052
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "wininit" /f
            1⤵
            • Process spawned unexpected child process
            PID:2284
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "wininitw" /f
            1⤵
            • Process spawned unexpected child process
            PID:2044
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /delete /tn "sppsvc" /f
            1⤵
              PID:1620
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /delete /tn "sppsvcs" /f
              1⤵
                PID:2200
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /delete /tn "csrss" /f
                1⤵
                  PID:2064
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /delete /tn "csrssc" /f
                  1⤵
                    PID:328
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /delete /tn "audiodg" /f
                    1⤵
                      PID:1808
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /delete /tn "audiodga" /f
                      1⤵
                        PID:1596
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /delete /tn "lsm" /f
                        1⤵
                          PID:2012
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /delete /tn "lsml" /f
                          1⤵
                            PID:2104
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /delete /tn "sppsvc" /f
                            1⤵
                              PID:2664
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /delete /tn "sppsvcs" /f
                              1⤵
                                PID:2640
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /delete /tn "wininit" /f
                                1⤵
                                  PID:1716
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /delete /tn "wininitw" /f
                                  1⤵
                                    PID:2316
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /delete /tn "lsm" /f
                                    1⤵
                                      PID:2744
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /delete /tn "lsml" /f
                                      1⤵
                                        PID:2096
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /delete /tn "csrss" /f
                                        1⤵
                                          PID:496
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /delete /tn "csrssc" /f
                                          1⤵
                                            PID:2772
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /delete /tn "services" /f
                                            1⤵
                                              PID:2788
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /delete /tn "servicess" /f
                                              1⤵
                                                PID:2420
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /delete /tn "audiodg" /f
                                                1⤵
                                                  PID:2156
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks.exe /delete /tn "audiodga" /f
                                                  1⤵
                                                    PID:2708

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ChainComponentBrowserwin\101b941d020240

                                                    Filesize

                                                    377B

                                                    MD5

                                                    b239886e1b416c9aa6840551ea7734f3

                                                    SHA1

                                                    d2b66ce0cd47dbbddd0ba736fc460884ac19fad5

                                                    SHA256

                                                    14c5c2867d3e52ccdfc32fc648ef814d439f7dccb82c67bf597b7fb029079d9b

                                                    SHA512

                                                    0412d404f259b07d82d3009cbf1845cc8b5caf26deca636375d365f2fa9a65e55985dfc3d9516a6e2437105148df3578b65166a9d167b858f4e6c1d815fc0996

                                                  • C:\ChainComponentBrowserwin\ZckenFSJPCIUJWjfI5CZYMEmaPZVg.bat

                                                    Filesize

                                                    46B

                                                    MD5

                                                    3e83fda43f1932bb71d930d2f89e68b2

                                                    SHA1

                                                    1fa2f89990c21a7f0eebfbf06f7064c19e46b081

                                                    SHA256

                                                    ecb36758516d13f656baac1a37f3af9dd3e683e8aab3847d65bb82c9eb05cb51

                                                    SHA512

                                                    d6efea92b244d10f5a0e2b228782cc7e1b45fcf262dcc7ea709a9ab8fa458b2e8d3e3bfa4cdf4a4852812d01bb9ff1c7bba65abbe62527e5a84e5b3b15f8ea9b

                                                  • C:\ChainComponentBrowserwin\zJJP8u9NRTk6u.vbe

                                                    Filesize

                                                    230B

                                                    MD5

                                                    b9b72befe720ec640eb23938f752a453

                                                    SHA1

                                                    c621298c3cfac9aa9c5cdfebd5efa0a1b01c7b34

                                                    SHA256

                                                    bddc35ffa29cfc10fc39778a551335781091aec61771943662e66cdf4c4a07ad

                                                    SHA512

                                                    4d119e2aba40fe14d624690103d08620369eeeb0a922a3091027a7cf90597db7d491653ed356eb85a45104bdcbd3eb5876e5c4c508ed85d0e235d71a65578f26

                                                  • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\0a1fd5f707cd16

                                                    Filesize

                                                    857B

                                                    MD5

                                                    4a16ba75fbbfdbcd655b4e4c7b48b782

                                                    SHA1

                                                    0647bc8ba1fbb040c98dac0c98ab843275e85e49

                                                    SHA256

                                                    f5297ad4dafce36fd875f2ce0835e6b84f54ea85bc4234b25eae687264c9bc43

                                                    SHA512

                                                    a3e4f1275b3fe27f1a10f88af433ea63e758827d0f8c60a0f7d93fbc6a4070909c9cb9bd136ae78c69bda9208e4754722f1b7a6a433e87268db2f2a3a43b4a2a

                                                  • C:\Program Files (x86)\Common Files\DESIGNER\6ccacd8608530f

                                                    Filesize

                                                    56B

                                                    MD5

                                                    234ea173d52157a4118dab2bb7d07140

                                                    SHA1

                                                    a1e48dd3ed8c19e69d2a215304465166b709be62

                                                    SHA256

                                                    b61e098b09a27349a63c55db3545932057448936fc22c0d707c5790051fec810

                                                    SHA512

                                                    b94d511cd2c12c0799e174cf7ec822d12b19781176d499bdec98de66096d72e81f11609e74eb25e65c66cdadc7e53ff0bb60616392d96c4deae0e73da4b8e3e8

                                                  • C:\Program Files (x86)\Google\CrashReports\101b941d020240

                                                    Filesize

                                                    514B

                                                    MD5

                                                    0567c739fac8c293c6d1aacef66b3970

                                                    SHA1

                                                    c10631eb348fa8048e31a67e0df44149496fcfa0

                                                    SHA256

                                                    b5b01ee1ad51ccb2a0c2abdc395fa5905b6ebfa4e9a91ebcfe849b7d39c6a293

                                                    SHA512

                                                    de6940633b322ed1e8488a983a06372d9fb220b5cd862903f31b96b0206d24a9cc7ac5bb1383109395c1d9740bb65e1f7ea63e284d3f6cbe19787257c5799e68

                                                  • C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\886983d96e3d3e

                                                    Filesize

                                                    271B

                                                    MD5

                                                    682e13cc1a902c7a95280e65beaad898

                                                    SHA1

                                                    55a191f43b39ce22b559eae92e2c4c6f961ab0f5

                                                    SHA256

                                                    bf39fe6973c3e88cc6916fa0fd5d9555d24e42d7cc7d8841d2db63bd994af3f8

                                                    SHA512

                                                    b2f4920812705bca19c530fea679980af31305538125fcd9de6f02e4e18a718bfd398a65e3b7a86b3c73dbf85f29eae01619f4d4313bea9e70f6cf0969d298b5

                                                  • C:\Program Files (x86)\Windows Sidebar\it-IT\42af1c969fbb7b

                                                    Filesize

                                                    278B

                                                    MD5

                                                    f5bb83a73ef655cd1bd03648204d5b14

                                                    SHA1

                                                    9aa42ac1884bdf23626fbb9fd0ff6e6e6d2afe7b

                                                    SHA256

                                                    2a769c8c26a8d3acaa49560f59234738a7e606e6ce52f84f44d7c1059e260a42

                                                    SHA512

                                                    5d1771cfe5fca2493a12f3093a27595dac6e747d6957517c3b508348993628b13aedc44461075bb7f14ae6e4d7bef0f56611591eedf5adcf494bbce9b990a2fa

                                                  • C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\0a1fd5f707cd16

                                                    Filesize

                                                    81B

                                                    MD5

                                                    3dba00fdf586f91bd9cf339fbc2398f6

                                                    SHA1

                                                    9c073c60f3761e4841161c7b7b7ed7ebdea69a87

                                                    SHA256

                                                    395e8e233465f0cc7fd96632a051554f2c2cdba23daf0b4b9af3fc1349ad5a27

                                                    SHA512

                                                    b37164a7a1b58a847ac3fce9af25389e75711753236db8387bf3d7b4648b7669315287c5c3ec4ef95abe19a257c1fa5c098ead6438b315a0136b88b1d19374c6

                                                  • C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\42af1c969fbb7b

                                                    Filesize

                                                    419B

                                                    MD5

                                                    ee05d6f6113adedc262796bab5e131f2

                                                    SHA1

                                                    c1e42d0a62f7bd7f9a1ff9ae4d7ae97f0badd490

                                                    SHA256

                                                    857e3f7866687d91cad5b8afaaa8ef3c8dc9a7c6b7e31609e37890ca20a92e4c

                                                    SHA512

                                                    1d3051eb195794ef0ddb4c7f50a9218967c21c456771343e245f17fd0eb23d83c221d044c5d6895b1225a86d29766f216b983375032d90d28ef248332065b0b2

                                                  • C:\Recovery\6f0e9922-3d6d-11ef-b835-f2a3cf4ad94f\c5b4cb5e9653cc

                                                    Filesize

                                                    327B

                                                    MD5

                                                    bb98237163c59269dd72b32a7c800a36

                                                    SHA1

                                                    6f7ee649c34c9aedaf64b21e5bce5a00b916b201

                                                    SHA256

                                                    95c8a3c8292486b3f050d80cfda28982bb839a16583b4ba84a97386730ff4414

                                                    SHA512

                                                    d8f27d9e8cf3bc1df5b86e62894838ad222821df0dfc3c7556dcf63977806665030edfdeed5a0aff76e59254ba1e7ceb5b086b9d2a2e1d5f80e45b30a4ce6e09

                                                  • C:\Users\Admin\AppData\Local\Temp\8t4fMT0wY0.bat

                                                    Filesize

                                                    309B

                                                    MD5

                                                    6f0a60929e4e683bbeea8a06263c66ea

                                                    SHA1

                                                    a1bfdd95c1d7eb3a0fde59d0963a11c164d26e73

                                                    SHA256

                                                    bd2f2f6150a0bd5664c3d69cb0bfec1598427e3fe15feb462c3fa3e1428292be

                                                    SHA512

                                                    f7b715e4ea9ec27021e48eb734d69468f13de6e9d07d4174185fc694724cae68253d5b5ecf707dc129cd47c9d0ea60ccc272bff1451d4c973b100a22a024763a

                                                  • C:\Users\Admin\AppData\Local\Temp\Server.exe

                                                    Filesize

                                                    43KB

                                                    MD5

                                                    eab8788760465b2b46598ff289b4b8c4

                                                    SHA1

                                                    8c7b27c7ec66ea41f7e20afaf1394fb71b7c4a35

                                                    SHA256

                                                    7ba3084c6d0fcc0e6e1fedfdd04d24768b819aaf309b933d0f4243c37297821f

                                                    SHA512

                                                    996471d395c297950a4df7140cf0dda388f87ad8a26fb99feb35fa265873b77a7e100520df69770fbe1554ad4bf7f877f9214a61b44326353935dfe7def12ed0

                                                  • C:\Users\Admin\AppData\Local\Temp\dbccd094-23e6-41a9-bb52-cf2441435fec.vbs

                                                    Filesize

                                                    736B

                                                    MD5

                                                    76c2d217f27bef1fcf904bbad3129aba

                                                    SHA1

                                                    b8bc92fd68c7b7e2bb6a7fada857122256d9b3a3

                                                    SHA256

                                                    eaae4a7c10900dae2ea885d8d3828d0f071ffdd3538c641dd57fd5c6d6f602a5

                                                    SHA512

                                                    2b0682dc6afbb975e6917b1ef4ebdcdc288a94dcc22e07a65e10cb787468a6ccbc2dfe42dfccd02378cd4c812e9758b2fcd9f6a85719c3f224fbcf14955cb792

                                                  • C:\Users\Admin\AppData\Local\Temp\ed8c3ac0-e6fa-4563-a4e6-a4c3996c718a.vbs

                                                    Filesize

                                                    512B

                                                    MD5

                                                    7f2f72768ab1d61206d6df9f9d7b9233

                                                    SHA1

                                                    a38478cbaaff12c4f5fde94e56bad090cb46c19a

                                                    SHA256

                                                    eabf717a94977aa7774bb93f7907672463acd67ce7a2aacf2735899b46d8f7e5

                                                    SHA512

                                                    502f81f7ee86b25a81463506b91d8d5ea87ed2979d9c5f0c07f2dbaf2c1ed9eaa9ad95da8617a5e616c8e518b2e5f4d7476579660c4f81e9b29ece9c0153bdc2

                                                  • C:\Users\Admin\AppData\Local\Temp\gggg.exe

                                                    Filesize

                                                    1.2MB

                                                    MD5

                                                    c5607848210b7d664771584276d7d7ae

                                                    SHA1

                                                    9a395fbac63306fa240e51646cad80a803064352

                                                    SHA256

                                                    16de1516d3fc00a0873b270ffa44f20c13524827a88798e2743afe0bb06b9815

                                                    SHA512

                                                    ef9c622ee75161fc038456a2a7e7b9e881f66852dd06331fa2fecac13ce4d585b332672d51a6c8ab3dfd5a99de22b863dd52b53750669d0175aea45ed08a6e8b

                                                  • C:\Users\Admin\AppData\Local\Temp\lCNhli7JYn.bat

                                                    Filesize

                                                    225B

                                                    MD5

                                                    5bd4bca68c095ecf32b78573f0b36a82

                                                    SHA1

                                                    6a0dfe12317b2d3f675b5017ec10e7a27aaa60fb

                                                    SHA256

                                                    e8a867aa02a78537df7640e440ea4806583d2054ca08e8a7068be678487ddf30

                                                    SHA512

                                                    7f02149323e2c46f7f38e65483192651a10bac2606e9d2fa8028bb9a135c1b110069098e81f2d1bf205dbb798ec8739af6ac08b482aa697df2871ec480412a54

                                                  • C:\Users\Admin\Cookies\42af1c969fbb7b

                                                    Filesize

                                                    828B

                                                    MD5

                                                    551686e4b601f77d0e8c5730946e187e

                                                    SHA1

                                                    616118ea7ac3f7b580ec54d84a8261cf41cb5650

                                                    SHA256

                                                    b417e27c4b5d96ba072b2b47d3e7c874e156cbeb95f8e1dc99c8d2674e716848

                                                    SHA512

                                                    9efe35ab472c9f1af0e726dc0d3bd97c90de1e36638691f95620c20ca482be0dc67db3a551b3c13d992c3fd0a05e42e4a2a7ad1df8ab0bb2a3a435d7a4d8e5f0

                                                  • C:\Users\Admin\Pictures\56085415360792

                                                    Filesize

                                                    734B

                                                    MD5

                                                    a7528e3c7727e423d9795e3f4db840ac

                                                    SHA1

                                                    e86723a305dde5f7da664de4daaa7aee66e3d9be

                                                    SHA256

                                                    438f6f1758259bfe4cdd6b98e46b3d952fd581262f18cbccc3da615b26220958

                                                    SHA512

                                                    08c20c917cba0ea93de8512f2fb9e401a61a63cdafbd84489444af4265e93f44c631c9de79e36976769a05b04c00c32a58c619b3af04f5ff4eb15a35d5810a9b

                                                  • C:\Users\Admin\Videos\56085415360792

                                                    Filesize

                                                    441B

                                                    MD5

                                                    461df6ca81ce36f1c6ef0bad1cd220f5

                                                    SHA1

                                                    68e2b6af133bf6161217244d389c18a4976880c5

                                                    SHA256

                                                    3b7275f71c6f4171cbaf7ed054b6edb81364b7e8e2618af26b29af065969f0a2

                                                    SHA512

                                                    960f03b97d7dcbef9fed005848d6b31e7aca887543093b19fbd216acd20349f0f70303e6b20444fd9f2bdbaca33fe680f1b7cd78b009f9efc38b63032ede10d8

                                                  • C:\Users\Default User\0a1fd5f707cd16

                                                    Filesize

                                                    575B

                                                    MD5

                                                    99b15f5d1fcae4e9699021aafe7094b6

                                                    SHA1

                                                    490279e9a00b18ff60566c46071008c3ff1d3cfd

                                                    SHA256

                                                    083bdaa1463be117fec527b5184f6fe0749d9de5bb98e86755b239f443184101

                                                    SHA512

                                                    edd71ea4b39016160e079981d3407fac2a695ebbe1b53a103a96f9f8065a789e311c968423128525ff8fb39e04c3464e3719d8f5a1bd71a15872cbd8a31bb09e

                                                  • C:\Users\Public\Recorded TV\Sample Media\886983d96e3d3e

                                                    Filesize

                                                    912B

                                                    MD5

                                                    b03e6f16581245409fd8dc67a5eb2279

                                                    SHA1

                                                    9ec99992cbc5b12ed4daf9c6bc8db7ac30b105e2

                                                    SHA256

                                                    c28caf06f01a57ddda1c660a09dd817edb9a887dee7bb5aabbb2a2e808209232

                                                    SHA512

                                                    895f16c6e9c25f9ea92f6c9889efcf24c6981a29511fd45e27184f341685268deba90e598547b9460d43c5b4f5ff225096d8b147ce60656fde069b99ff13bdec

                                                  • C:\Windows\RemotePackages\69ddcba757bf72

                                                    Filesize

                                                    850B

                                                    MD5

                                                    1847f6c6889a08ddf044a9d67d3229a6

                                                    SHA1

                                                    6884565afe7834b338b8f2be334c5ce0c0128c06

                                                    SHA256

                                                    5457e1b193b098cc036c97da05452a106e4c137c218c6a0541b1fd4b9e7f6c0b

                                                    SHA512

                                                    e73f8d75a324e1f5eea1e0359f833b67e9c4b80830bf30c26bae58fed35fca4e51f0883bf561cc5254f564bc63a6df67afb83b08bc59b0f2c1108cb196f2b7c6

                                                  • C:\Windows\SoftwareDistribution\ScanFile\cc11b995f2a76d

                                                    Filesize

                                                    549B

                                                    MD5

                                                    06b769798f967a3bb4b02d6fa2052c23

                                                    SHA1

                                                    c0b8e6b303842a614f3ad71fd40e92290113c8e3

                                                    SHA256

                                                    5dc542cc4a000af6adffa2f84c591394ac6be7a91695db1271cacdf809ed2cba

                                                    SHA512

                                                    ada3d2863f567a91506a6c725cfc29586cb46fbaa0c2ebc6821dc266036b4924c7ab4bae879b2605f0681aa2efda0f72c8fa962dec84ff9f9dcd449c9cd938b4

                                                  • \ChainComponentBrowserwin\reviewdriver.exe

                                                    Filesize

                                                    948KB

                                                    MD5

                                                    2e2c059f61338c40914c10d40502e57e

                                                    SHA1

                                                    e6cb5a1ffdf369b3135c72ab12d71cc3d5f2b053

                                                    SHA256

                                                    8e4df816223a625bf911553d5f80219f81fc44f07ba98c95f379fd12169c2918

                                                    SHA512

                                                    1b1f2dae55f50874532b37ad4ab74a54452f65d7499004b37b0afc3dc2c1d16d66a0e41c1733ac1f4cff9993325d32ea714b441c06ba4eba350136835c746d3e

                                                  • memory/1628-14-0x000007FEF55B0000-0x000007FEF5F9C000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/1628-0-0x000007FEF55B3000-0x000007FEF55B4000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1628-1-0x0000000000FE0000-0x00000000010A0000-memory.dmp

                                                    Filesize

                                                    768KB

                                                  • memory/2032-29-0x00000000001E0000-0x00000000002D4000-memory.dmp

                                                    Filesize

                                                    976KB

                                                  • memory/2032-30-0x0000000000550000-0x000000000055A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2032-31-0x0000000000560000-0x000000000056C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2032-32-0x0000000000570000-0x000000000057A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2604-73-0x00000000001C0000-0x00000000002B4000-memory.dmp

                                                    Filesize

                                                    976KB

                                                  • memory/2824-21-0x0000000000DF0000-0x0000000000E02000-memory.dmp

                                                    Filesize

                                                    72KB