Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/10/2024, 02:26
Behavioral task
behavioral1
Sample
ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe
Resource
win10v2004-20241007-en
General
-
Target
ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe
-
Size
827KB
-
MD5
024abbb7e999cf09b8aee01979296d38
-
SHA1
f883c399426d39fa169078cd92ea3bf360bd0e6b
-
SHA256
ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12
-
SHA512
fd6cadc5814b1cd9617600f645ed304445960eb810ffd7c3e919c22bf7f80e1411354ef9a0a5183ef35aaf8e18b6e2c08a0a02e26428b78f12723b4e22a5b389
-
SSDEEP
12288:Qr5J4kXbiCU0qbEPGGoWfbDNz4ZH1z3gROZ84k4zizkx:3kXbiDEPGGoWbDNDEZ8342zO
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
pid Process 2704 schtasks.exe 2252 schtasks.exe 2688 schtasks.exe 2528 schtasks.exe 2904 schtasks.exe 2312 schtasks.exe 2276 schtasks.exe 2508 schtasks.exe 600 schtasks.exe 1868 schtasks.exe 2656 schtasks.exe 1648 schtasks.exe 2712 schtasks.exe 2372 schtasks.exe 2808 schtasks.exe 2632 schtasks.exe 2600 schtasks.exe 564 schtasks.exe 1580 schtasks.exe 2308 schtasks.exe 2052 schtasks.exe 2804 schtasks.exe 2932 schtasks.exe 2596 schtasks.exe 1740 schtasks.exe 2864 schtasks.exe 1104 schtasks.exe 2768 schtasks.exe 804 schtasks.exe 2940 schtasks.exe 284 schtasks.exe 1592 schtasks.exe 2172 schtasks.exe 2124 schtasks.exe 1568 schtasks.exe 2144 schtasks.exe 1796 schtasks.exe 1632 schtasks.exe 1328 schtasks.exe 2992 schtasks.exe 2340 schtasks.exe 1936 schtasks.exe 2748 schtasks.exe 2988 schtasks.exe 2432 schtasks.exe 2092 schtasks.exe 2812 schtasks.exe 836 schtasks.exe 1676 schtasks.exe 2176 schtasks.exe 2676 schtasks.exe 3052 schtasks.exe 2096 schtasks.exe 1872 schtasks.exe 2148 schtasks.exe 3064 schtasks.exe 1728 schtasks.exe 2228 schtasks.exe 2552 schtasks.exe 2588 schtasks.exe 1708 schtasks.exe 1376 schtasks.exe 1560 schtasks.exe 1876 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\", \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\audiodg.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\", \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\services.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\", \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Program Files (x86)\\Uninstall Information\\schtasks.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\schtasks.exe\", \"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\explorer.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\", \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Program Files (x86)\\Uninstall Information\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\", \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\", \"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Program Files (x86)\\Uninstall Information\\schtasks.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\", \"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\", \"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\", \"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\", \"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\", \"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\", \"C:\\MSOCache\\All Users\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\", \"C:\\Windows\\debug\\lsm.exe\", \"C:\\Users\\Default User\\schtasks.exe\", \"C:\\Users\\Admin\\Videos\\csrss.exe\", \"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2252 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2528 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1104 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 284 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 804 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 704 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 564 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3064 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 600 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2240 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2240 schtasks.exe 31 -
resource yara_rule behavioral1/memory/1992-1-0x0000000000DE0000-0x0000000000EB6000-memory.dmp dcrat behavioral1/files/0x0006000000019023-11.dat dcrat behavioral1/memory/2592-58-0x0000000000DF0000-0x0000000000EC6000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 2592 explorer.exe -
Adds Run key to start application 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\schtasks = "\"C:\\Users\\Default User\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\audiodg.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\en-US\\audiodg.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\services.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\MSOCache\\All Users\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\services.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\schtasks = "\"C:\\Program Files (x86)\\Uninstall Information\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\debug\\lsm.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\debug\\lsm.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\schtasks = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\WmiPrvSE.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Windows\\Installer\\{90140000-006E-0409-0000-0000000FF1CE}\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\MSOCache\\All Users\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Admin\\Videos\\csrss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\dllhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\explorer.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Microsoft Analysis Services\\AS OLEDB\\10\\smss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\schtasks = "\"C:\\Users\\Default User\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\schtasks = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12 = "\"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Admin\\Videos\\csrss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Mozilla Firefox\\defaults\\pref\\winlogon.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\schtasks = "\"C:\\Program Files (x86)\\Uninstall Information\\schtasks.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\Windows Portable Devices\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12 = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12 = "\"C:\\Users\\All Users\\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Microsoft Office\\audiodg.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12 = "\"C:\\Users\\Default\\Recent\\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\csrss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Recovery\\20e7eb62-69f6-11ef-be0c-62cb582c238c\\System.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\explorer.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files\\Mozilla Firefox\\fonts\\taskhost.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\smss.exe\"" ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\Uninstall Information\3a6fe29a7ceee6 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Windows Portable Devices\b75386f1303e64 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\smss.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Microsoft Office\audiodg.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\winlogon.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\audiodg.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Uninstall Information\schtasks.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\42af1c969fbb7b ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files\Mozilla Firefox\fonts\taskhost.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Windows Portable Devices\taskhost.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\69ddcba757bf72 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\explorer.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\7a0fd90576e088 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files\Mozilla Firefox\fonts\b75386f1303e64 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files (x86)\Microsoft Office\42af1c969fbb7b ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\cc11b995f2a76d ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\OSPPSVC.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\1610b97d3ab4a7 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Windows\debug\lsm.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File opened for modification C:\Windows\debug\lsm.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Windows\debug\101b941d020240 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe File created C:\Windows\Boot\Fonts\winlogon.exe ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1632 schtasks.exe 600 schtasks.exe 704 schtasks.exe 2712 schtasks.exe 2340 schtasks.exe 2864 schtasks.exe 2940 schtasks.exe 2228 schtasks.exe 1156 schtasks.exe 1376 schtasks.exe 2588 schtasks.exe 3052 schtasks.exe 1592 schtasks.exe 2676 schtasks.exe 2804 schtasks.exe 2748 schtasks.exe 1124 schtasks.exe 1328 schtasks.exe 1580 schtasks.exe 2508 schtasks.exe 2704 schtasks.exe 2528 schtasks.exe 2308 schtasks.exe 2768 schtasks.exe 2688 schtasks.exe 1708 schtasks.exe 2312 schtasks.exe 1432 schtasks.exe 2372 schtasks.exe 3064 schtasks.exe 1728 schtasks.exe 2656 schtasks.exe 2708 schtasks.exe 2600 schtasks.exe 1648 schtasks.exe 1796 schtasks.exe 2808 schtasks.exe 2552 schtasks.exe 1868 schtasks.exe 2852 schtasks.exe 2904 schtasks.exe 2988 schtasks.exe 1568 schtasks.exe 1936 schtasks.exe 1104 schtasks.exe 956 schtasks.exe 2172 schtasks.exe 2124 schtasks.exe 1872 schtasks.exe 804 schtasks.exe 2144 schtasks.exe 2176 schtasks.exe 2596 schtasks.exe 2148 schtasks.exe 2992 schtasks.exe 2252 schtasks.exe 836 schtasks.exe 284 schtasks.exe 564 schtasks.exe 1876 schtasks.exe 2052 schtasks.exe 1560 schtasks.exe 2932 schtasks.exe 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1992 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 2592 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1992 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Token: SeDebugPrivilege 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe Token: SeDebugPrivilege 2592 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1784 1992 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 74 PID 1992 wrote to memory of 1784 1992 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 74 PID 1992 wrote to memory of 1784 1992 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 74 PID 1784 wrote to memory of 2592 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 105 PID 1784 wrote to memory of 2592 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 105 PID 1784 wrote to memory of 2592 1784 ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe"C:\Users\Admin\AppData\Local\Temp\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe"C:\Users\Admin\AppData\Local\Temp\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Windows Photo Viewer\ja-JP\explorer.exe"C:\Program Files\Windows Photo Viewer\ja-JP\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft Help\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft Help\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\fonts\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\fonts\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\fonts\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12a" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12a" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12a" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Recent\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12" /sc ONLOGON /tr "'C:\Users\Default\Recent\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12a" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Recent\ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Office\audiodg.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Office\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Windows\debug\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\debug\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Windows\debug\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\schtasks.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Users\Default User\schtasks.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\schtasks.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Videos\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Videos\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Videos\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Mozilla Firefox\defaults\pref\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\audiodg.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Uninstall Information\schtasks.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\schtasks.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Uninstall Information\schtasks.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:2092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 9 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\schtasks.exe'" /f1⤵
- DcRat
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtasks" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\schtasks.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "schtaskss" /sc MINUTE /mo 7 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\schtasks.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\explorer.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5024abbb7e999cf09b8aee01979296d38
SHA1f883c399426d39fa169078cd92ea3bf360bd0e6b
SHA256ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12
SHA512fd6cadc5814b1cd9617600f645ed304445960eb810ffd7c3e919c22bf7f80e1411354ef9a0a5183ef35aaf8e18b6e2c08a0a02e26428b78f12723b4e22a5b389
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b