Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 10:58

General

  • Target

    8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N.exe

  • Size

    1.3MB

  • MD5

    a1de6a3a4dc0d006814d3eecd1ddb090

  • SHA1

    b8749ccbe7b8d02cb2e9627763f800acbe140e46

  • SHA256

    8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83

  • SHA512

    fd2a58cdff5df68fb247364b4004d853f92d7a12426ba7f4a2891f7becaf5701e988a8ca739501fa23a07c5701cb8ed227a66a3e7672ee83fac72fed5befdfbb

  • SSDEEP

    24576:qwwpL4DsvfsODQY2mq7yTK32HbzpEOlM7RJFolBjvmPln0Ep9GKc6NC1t:qw8LnsvQKMzpEOlM7RJqlhgq8rC1

Malware Config

Signatures

  • DcRat 30 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 20 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N.exe
    "C:\Users\Admin\AppData\Local\Temp\8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
      "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\22bcfcf8-a3dd-40bc-a025-33998d71894a.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
          "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2332
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\42a6fe21-2b07-46e1-a4ae-583e80d9d3a4.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
              "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1940
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5e08257d-78f1-4a55-9e03-0252e743b755.vbs"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1480
                • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
                  "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1792
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ea892710-037b-4126-98dc-dbf167b7da31.vbs"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:832
                    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
                      "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
                      10⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2504
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\60991e84-c9ff-478b-890a-bed180be5373.vbs"
                        11⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2388
                        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
                          "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
                          12⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1040
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e5338707-3de0-4e34-9dfb-9425f9453950.vbs"
                            13⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2284
                            • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
                              "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
                              14⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:476
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b9f62b0c-0850-4a78-b5d7-5849f5333167.vbs"
                                15⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2968
                                • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
                                  "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:320
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cb9ed5e7-c0aa-48bd-82b3-5a9684daab4d.vbs"
                                    17⤵
                                      PID:760
                                      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe
                                        "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                        18⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2536
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e41358a7-2d61-40fd-ac6b-00a9d5b3eaa1.vbs"
                                          19⤵
                                            PID:308
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a86fdc20-641c-4064-af9f-7f849d4271a1.vbs"
                                            19⤵
                                              PID:1980
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dd59eb5a-3e8c-4673-b923-65334103fe9f.vbs"
                                          17⤵
                                            PID:1684
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\64ba6d90-8692-4bd7-b1ec-0ae3d88efb6c.vbs"
                                        15⤵
                                          PID:1492
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dd120076-eb6a-4d2d-8f09-b97045e44ae8.vbs"
                                      13⤵
                                        PID:2816
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0f7ce213-2362-47bf-ad9e-fca6b51746c7.vbs"
                                    11⤵
                                      PID:2688
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d439ace0-f78a-46fd-883a-108e6bfa4688.vbs"
                                  9⤵
                                    PID:1760
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\60f11540-fcfb-4576-b2c3-729081010514.vbs"
                                7⤵
                                  PID:2516
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c37a43a8-753c-42f2-becf-2176bcc58745.vbs"
                              5⤵
                                PID:2200
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\81150435-f0cf-4c5d-8ca0-00e90ff2b1c8.vbs"
                            3⤵
                              PID:2940
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\services.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2744
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\services.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2800
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\services.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2792
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2604
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2712
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2784
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Update\Download\taskhost.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1772
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Download\taskhost.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2820
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Update\Download\taskhost.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2612
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\spoolsv.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1704
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2164
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\spoolsv.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2768
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:984
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1244
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1480
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:3016
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2904
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1700
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1248
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2896
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1952
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Application Data\audiodg.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1224
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Default\Application Data\audiodg.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:548
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Application Data\audiodg.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2144
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Windows\SoftwareDistribution\AuthCabs\lsass.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1904
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\AuthCabs\lsass.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:1512
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Windows\SoftwareDistribution\AuthCabs\lsass.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2272
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N8" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\CrashReports\8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N.exe'" /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2052
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:2516
                        • C:\Windows\system32\schtasks.exe
                          schtasks.exe /create /tn "8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N8" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\CrashReports\8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83N.exe'" /rl HIGHEST /f
                          1⤵
                          • DcRat
                          • Process spawned unexpected child process
                          • Scheduled Task/Job: Scheduled Task
                          PID:952

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\services.exe

                          Filesize

                          1.3MB

                          MD5

                          a1de6a3a4dc0d006814d3eecd1ddb090

                          SHA1

                          b8749ccbe7b8d02cb2e9627763f800acbe140e46

                          SHA256

                          8ac29c2cebf2c3206cccfc08da7bb0700ee6e664607fa554c4a781e707222d83

                          SHA512

                          fd2a58cdff5df68fb247364b4004d853f92d7a12426ba7f4a2891f7becaf5701e988a8ca739501fa23a07c5701cb8ed227a66a3e7672ee83fac72fed5befdfbb

                        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe

                          Filesize

                          1.3MB

                          MD5

                          21330dd78574883a70e4c3aa6159a0f9

                          SHA1

                          846469122799cb53718d73706d4d1c9fc88c4e3f

                          SHA256

                          54de01c4dc196abaabca73092d53d153ae63b9793592538bab95dcc39e62791f

                          SHA512

                          fed17a329fd0bfbde9fdc160b08a968c3845165b75d4ae71248bc00a1e3deddf015f72a1233683d9a42ef6a858d2c608429877c1eaee92c10f0d79bbac15d8ab

                        • C:\Program Files\Uninstall Information\dwm.exe

                          Filesize

                          1.3MB

                          MD5

                          52780eeb69950678d0f2d472abde60c8

                          SHA1

                          8df28b14fafd65c5d074d4b5167fe46a400ed12f

                          SHA256

                          0301dfc51b605e5468ab722921030307fa7206e1a1af8ab2413f55e71c06ecb8

                          SHA512

                          a08cf469b4fd6bacadc31eb1cf4d15cf9134efa9950b0c2708f67702c1ea4c9507c3b739414c0b56ab193da3cbda58c1c3a8556fbfc48c400d7b5c05a98f1e5a

                        • C:\Users\Admin\AppData\Local\Temp\22bcfcf8-a3dd-40bc-a025-33998d71894a.vbs

                          Filesize

                          751B

                          MD5

                          910d17c047ea22bce1136152c9bdbd32

                          SHA1

                          4f6b470a3440e1a81e28f2ec07d2aca44c4bc997

                          SHA256

                          bf22e9853fac9d2543cb6d8217aafb67497890388fcc57d4e28459eda2513de7

                          SHA512

                          3dedc1f25ef32f0df05eff3857b2f94a0020149c3d9c31e5ac6ddda3ce98baede9135c3b45093e9fec36c3b8b60b45e42838b6f2ec79f30404ab9a40f48a2bbe

                        • C:\Users\Admin\AppData\Local\Temp\42a6fe21-2b07-46e1-a4ae-583e80d9d3a4.vbs

                          Filesize

                          751B

                          MD5

                          0b6631e9e14775279347059a83d6436f

                          SHA1

                          2013baca994f00c2d686e421ec92bca0f271c87c

                          SHA256

                          8405e41467b37d6e45f0aa2a514abbc23aa73edb55beb43ddc5e54820edd52bf

                          SHA512

                          94a846fe1732672838381faf6c7ebb804fc51ee2e7dd89074da0be1da0ea7fcf232253ad3095f2fa167e01f8931140198435b0393cb5797cf28c9f889061e7f7

                        • C:\Users\Admin\AppData\Local\Temp\5e08257d-78f1-4a55-9e03-0252e743b755.vbs

                          Filesize

                          751B

                          MD5

                          fb4eed943ef4ea2275851fd072fd218b

                          SHA1

                          f3e86aa41b907a7dbf39ae1edf1002c21c3ac0d3

                          SHA256

                          9a48c9e07ec5042811971f7a8572e44f0a95affb3f8d432cba42686db062676a

                          SHA512

                          436eb738493b89dad9247f3c753796f9676b38ff98d976fd72d84bf189ce64f4e5d883ce6328a2d4f20f3001d314f2272fcc2d632076f9ed612689622bba62a6

                        • C:\Users\Admin\AppData\Local\Temp\60991e84-c9ff-478b-890a-bed180be5373.vbs

                          Filesize

                          751B

                          MD5

                          cc126d87503f5bf5399f8fee08a5b355

                          SHA1

                          6744a7f3cb459e7c9b9ed3687fe0c10129dc05ee

                          SHA256

                          1e5496840fff020f486a89e3255e7c35aa5f2763ba2e60601339db60ab04b0a9

                          SHA512

                          ba24ff9b18d2ef9bd0d1bc6269d36a52d4e84ce22ebebad002631be7ddda66defa1fd0ff65e5b575b36e0caa98c05d7713f27d3db1e07aec43620cf35bd9fc81

                        • C:\Users\Admin\AppData\Local\Temp\81150435-f0cf-4c5d-8ca0-00e90ff2b1c8.vbs

                          Filesize

                          527B

                          MD5

                          74a53375739147d3f80bf358ab3308bb

                          SHA1

                          8dffa16e7f16153a15776d5323f9cd028d0980da

                          SHA256

                          91bedf42b1823e3b132c1598c2a583ed18ce155e40a6f0b2b2669441845c6bdc

                          SHA512

                          78a03f42704879983adb96d53371afdcef2e1aed34fd057985c98e217ab0626748f40289abe1aaa894e8124c42897c54fe3c786a27b8a1f74a178624777bc47c

                        • C:\Users\Admin\AppData\Local\Temp\b9f62b0c-0850-4a78-b5d7-5849f5333167.vbs

                          Filesize

                          750B

                          MD5

                          cf7d2dee5141a265a31e00c91daf7831

                          SHA1

                          83d337c1986fc92e66ff4424daabfd77e1463324

                          SHA256

                          12167cf004d682ceba1d55186994d39798f7bf42e7e0b93abd841bc72f4a2ef9

                          SHA512

                          b03ecf3b5ac92c53229e795603c08544bfc010d1738bee5c581069ea458bec4adea3bc7401228bed901755930c8d0433181c5a8142e66c9e4266413d7dc69a1a

                        • C:\Users\Admin\AppData\Local\Temp\cb9ed5e7-c0aa-48bd-82b3-5a9684daab4d.vbs

                          Filesize

                          750B

                          MD5

                          cd641a2ea173e10f2cc69b82e9f78c74

                          SHA1

                          a67e63e2a1049bc1ce9e5a35cf51044b3f9bfb5f

                          SHA256

                          c75759fbf2b4f76ad7ac20b592515640dd22db5d340454a4ab2eea6373df406f

                          SHA512

                          b4c9865a7104dc8531ebcc3ee3118862163a1a04c94058fbc17e48963a16570b342352c0904d2d771260d60a5e0cf7149e115ad55c42ad73c2e32129ec43403b

                        • C:\Users\Admin\AppData\Local\Temp\e41358a7-2d61-40fd-ac6b-00a9d5b3eaa1.vbs

                          Filesize

                          751B

                          MD5

                          3c8d42d6a9fd70f37b86439bea0d3b9c

                          SHA1

                          ee0e95e8dfafd29443f958747f2754418504025f

                          SHA256

                          dc9f7ad68496938ac55fa036c417c0610f753f9006c32f477aa2eb1ba7743ca6

                          SHA512

                          e29c0be508a628d66f5e3153c773eef3fe92122d796226abb263e1c0d885f9ea7e7051c9531ec12ea6d6acaa8feb40c2216542f13a24538ec067f6a9c4897630

                        • C:\Users\Admin\AppData\Local\Temp\ea892710-037b-4126-98dc-dbf167b7da31.vbs

                          Filesize

                          751B

                          MD5

                          4a3590c7de4faf875154ec57d8b15784

                          SHA1

                          5b0fff740e614639256b5399015dc84fe00a2be5

                          SHA256

                          8a1182daec93863eb29483de0f68e12890c0791adf470897b109180c2703d058

                          SHA512

                          ad26fc18e9cc9a4cb46e098751b1b4dda61f5bbf7e5709ce0df75cf058f934e8daeb7c0a58074d9438daef41e3d0bba24cbd859d20188a8a519c4a3e4a659d7e

                        • C:\Users\Default\spoolsv.exe

                          Filesize

                          1.3MB

                          MD5

                          b54fcc34839f4d6a430f82979c641d13

                          SHA1

                          da83c2a93a4c9f33daa8bda843fe5146de0c4bf3

                          SHA256

                          2c2d692aeb3d027c8fef8876851a330eacc27228ba85f263d063108b09df98cc

                          SHA512

                          55e11d558d59d36077179205b2134f6ce193bb44a27e1d4fc28e19eabd1d7c627125a94f08d674f183f22adc16480701b7f2345bd7b0ebcb7f2f4f545c3f6202

                        • memory/316-4-0x00000000005E0000-0x00000000005F0000-memory.dmp

                          Filesize

                          64KB

                        • memory/316-5-0x0000000000AF0000-0x0000000000B06000-memory.dmp

                          Filesize

                          88KB

                        • memory/316-6-0x0000000000A20000-0x0000000000A28000-memory.dmp

                          Filesize

                          32KB

                        • memory/316-1-0x0000000000E10000-0x0000000000F6A000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/316-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/316-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

                          Filesize

                          4KB

                        • memory/316-3-0x0000000000350000-0x000000000036C000-memory.dmp

                          Filesize

                          112KB

                        • memory/316-154-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/316-9-0x0000000000B10000-0x0000000000B18000-memory.dmp

                          Filesize

                          32KB

                        • memory/316-7-0x0000000000BB0000-0x0000000000BBA000-memory.dmp

                          Filesize

                          40KB

                        • memory/316-8-0x0000000000B20000-0x0000000000B2E000-memory.dmp

                          Filesize

                          56KB

                        • memory/476-221-0x0000000001200000-0x000000000135A000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1040-155-0x0000000000FE0000-0x000000000113A000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/2536-244-0x00000000002D0000-0x000000000042A000-memory.dmp

                          Filesize

                          1.4MB