Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 20:16
Behavioral task
behavioral1
Sample
1954887cb3505d283c86d6e3379bb120.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1954887cb3505d283c86d6e3379bb120.exe
Resource
win10v2004-20240802-en
General
-
Target
1954887cb3505d283c86d6e3379bb120.exe
-
Size
1.2MB
-
MD5
1954887cb3505d283c86d6e3379bb120
-
SHA1
ed20edd050b68986325e059240c6165736865db1
-
SHA256
18851c5ea81a956ba94aa1df173349b05bb45865fe09bec6bf7e069ce6100f2e
-
SHA512
753a025ef237078c3e64c2795002038d5cfdba8ac9d74d368131031249a645ff99b0c992fff059315ed036068c56650ffab293424ac02c33366d422e8ea2752e
-
SSDEEP
24576:N8iAvkij/9iCaMtOT41VtCP3J0QbFUoKbScbIf4v7CUet7GKf3VL/iab:NJaYCRX1VcPujXWqKJ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\ShellNew\\csrss.exe\", \"C:\\Windows\\Globalization\\Sorting\\wininit.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\lsm.exe\", \"C:\\Users\\Default User\\explorer.exe\", \"C:\\MSOCache\\All Users\\sppsvc.exe\", \"C:\\MSOCache\\All Users\\sppsvc.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\smss.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\ShellNew\\csrss.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\ShellNew\\csrss.exe\", \"C:\\Windows\\Globalization\\Sorting\\wininit.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\ShellNew\\csrss.exe\", \"C:\\Windows\\Globalization\\Sorting\\wininit.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\lsm.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\ShellNew\\csrss.exe\", \"C:\\Windows\\Globalization\\Sorting\\wininit.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\lsm.exe\", \"C:\\Users\\Default User\\explorer.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\ShellNew\\csrss.exe\", \"C:\\Windows\\Globalization\\Sorting\\wininit.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\lsm.exe\", \"C:\\Users\\Default User\\explorer.exe\", \"C:\\MSOCache\\All Users\\sppsvc.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\ShellNew\\csrss.exe\", \"C:\\Windows\\Globalization\\Sorting\\wininit.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\lsm.exe\", \"C:\\Users\\Default User\\explorer.exe\", \"C:\\MSOCache\\All Users\\sppsvc.exe\", \"C:\\MSOCache\\All Users\\sppsvc.exe\"" 1954887cb3505d283c86d6e3379bb120.exe -
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2704 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2092 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2780 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2948 2780 schtasks.exe 30 -
resource yara_rule behavioral1/memory/2648-1-0x00000000008D0000-0x0000000000A14000-memory.dmp dcrat behavioral1/files/0x00060000000173a9-15.dat dcrat behavioral1/memory/828-55-0x0000000000DA0000-0x0000000000EE4000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 624 powershell.exe 808 powershell.exe 2256 powershell.exe 572 powershell.exe 984 powershell.exe 2228 powershell.exe 784 powershell.exe 320 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 828 smss.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\Default User\\explorer.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\Default User\\explorer.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\MSOCache\\All Users\\sppsvc.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\ShellNew\\csrss.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\ShellNew\\csrss.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\Globalization\\Sorting\\wininit.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\lsm.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\smss.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\Globalization\\Sorting\\wininit.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\lsm.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\MSOCache\\All Users\\sppsvc.exe\"" 1954887cb3505d283c86d6e3379bb120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\smss.exe\"" 1954887cb3505d283c86d6e3379bb120.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\69ddcba757bf72 1954887cb3505d283c86d6e3379bb120.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe 1954887cb3505d283c86d6e3379bb120.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Globalization\Sorting\56085415360792 1954887cb3505d283c86d6e3379bb120.exe File created C:\Windows\ShellNew\csrss.exe 1954887cb3505d283c86d6e3379bb120.exe File opened for modification C:\Windows\ShellNew\csrss.exe 1954887cb3505d283c86d6e3379bb120.exe File created C:\Windows\ShellNew\886983d96e3d3e 1954887cb3505d283c86d6e3379bb120.exe File created C:\Windows\Globalization\Sorting\wininit.exe 1954887cb3505d283c86d6e3379bb120.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe 1948 schtasks.exe 2128 schtasks.exe 2704 schtasks.exe 2384 schtasks.exe 2216 schtasks.exe 1748 schtasks.exe 2428 schtasks.exe 1560 schtasks.exe 2092 schtasks.exe 1936 schtasks.exe 2348 schtasks.exe 2948 schtasks.exe 2144 schtasks.exe 2560 schtasks.exe 2556 schtasks.exe 2064 schtasks.exe 2184 schtasks.exe 2540 schtasks.exe 2616 schtasks.exe 2956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2648 1954887cb3505d283c86d6e3379bb120.exe 572 powershell.exe 2228 powershell.exe 320 powershell.exe 2256 powershell.exe 984 powershell.exe 808 powershell.exe 784 powershell.exe 624 powershell.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe 828 smss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 828 smss.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2648 1954887cb3505d283c86d6e3379bb120.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe Token: SeDebugPrivilege 984 powershell.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeDebugPrivilege 624 powershell.exe Token: SeDebugPrivilege 828 smss.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2648 wrote to memory of 624 2648 1954887cb3505d283c86d6e3379bb120.exe 52 PID 2648 wrote to memory of 624 2648 1954887cb3505d283c86d6e3379bb120.exe 52 PID 2648 wrote to memory of 624 2648 1954887cb3505d283c86d6e3379bb120.exe 52 PID 2648 wrote to memory of 808 2648 1954887cb3505d283c86d6e3379bb120.exe 53 PID 2648 wrote to memory of 808 2648 1954887cb3505d283c86d6e3379bb120.exe 53 PID 2648 wrote to memory of 808 2648 1954887cb3505d283c86d6e3379bb120.exe 53 PID 2648 wrote to memory of 2256 2648 1954887cb3505d283c86d6e3379bb120.exe 54 PID 2648 wrote to memory of 2256 2648 1954887cb3505d283c86d6e3379bb120.exe 54 PID 2648 wrote to memory of 2256 2648 1954887cb3505d283c86d6e3379bb120.exe 54 PID 2648 wrote to memory of 572 2648 1954887cb3505d283c86d6e3379bb120.exe 55 PID 2648 wrote to memory of 572 2648 1954887cb3505d283c86d6e3379bb120.exe 55 PID 2648 wrote to memory of 572 2648 1954887cb3505d283c86d6e3379bb120.exe 55 PID 2648 wrote to memory of 984 2648 1954887cb3505d283c86d6e3379bb120.exe 56 PID 2648 wrote to memory of 984 2648 1954887cb3505d283c86d6e3379bb120.exe 56 PID 2648 wrote to memory of 984 2648 1954887cb3505d283c86d6e3379bb120.exe 56 PID 2648 wrote to memory of 2228 2648 1954887cb3505d283c86d6e3379bb120.exe 57 PID 2648 wrote to memory of 2228 2648 1954887cb3505d283c86d6e3379bb120.exe 57 PID 2648 wrote to memory of 2228 2648 1954887cb3505d283c86d6e3379bb120.exe 57 PID 2648 wrote to memory of 784 2648 1954887cb3505d283c86d6e3379bb120.exe 58 PID 2648 wrote to memory of 784 2648 1954887cb3505d283c86d6e3379bb120.exe 58 PID 2648 wrote to memory of 784 2648 1954887cb3505d283c86d6e3379bb120.exe 58 PID 2648 wrote to memory of 320 2648 1954887cb3505d283c86d6e3379bb120.exe 59 PID 2648 wrote to memory of 320 2648 1954887cb3505d283c86d6e3379bb120.exe 59 PID 2648 wrote to memory of 320 2648 1954887cb3505d283c86d6e3379bb120.exe 59 PID 2648 wrote to memory of 828 2648 1954887cb3505d283c86d6e3379bb120.exe 68 PID 2648 wrote to memory of 828 2648 1954887cb3505d283c86d6e3379bb120.exe 68 PID 2648 wrote to memory of 828 2648 1954887cb3505d283c86d6e3379bb120.exe 68 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1954887cb3505d283c86d6e3379bb120.exe"C:\Users\Admin\AppData\Local\Temp\1954887cb3505d283c86d6e3379bb120.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1954887cb3505d283c86d6e3379bb120.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ShellNew\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\Sorting\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\lsm.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\explorer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe"C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellNew\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\ShellNew\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\ShellNew\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\Globalization\Sorting\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Globalization\Sorting\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\Globalization\Sorting\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51954887cb3505d283c86d6e3379bb120
SHA1ed20edd050b68986325e059240c6165736865db1
SHA25618851c5ea81a956ba94aa1df173349b05bb45865fe09bec6bf7e069ce6100f2e
SHA512753a025ef237078c3e64c2795002038d5cfdba8ac9d74d368131031249a645ff99b0c992fff059315ed036068c56650ffab293424ac02c33366d422e8ea2752e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51a93f1bf05fd2a9736cc814980328a57
SHA180816934c1b5f3eda9910b9c00d6872f2ba9ac90
SHA2561455d056c4b1a47dcf7d1007271bd1d8fa010084f84437491149b68e3205d5ac
SHA51276357e0b8c4c3e42d0d50680ba9b964d57fe7da65afc32ed9b02c557dd44ef5d09f38fdf37c1d57fe3308a27b9a08a32c4b62263ecfca43f43b4c321d2b60d54