Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe
Resource
win10v2004-20241007-en
General
-
Target
9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe
-
Size
3.3MB
-
MD5
0ad0b4a4a549230e090d712b5521bd96
-
SHA1
55690e0d976955e80f14c314efcaa34e3303a02b
-
SHA256
9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429
-
SHA512
b689ab2b7e3a59f760d3c6cb3b72927e3dc0eb9323aceb05c2571ca85863fc769098924b943e6e80edb1853c348451869996fd4c38a7dd10dc8e2970e5d4d027
-
SSDEEP
49152:dvE7aj/zSltwCUFFINtKAh/tIBs2htYmMoxqSeU843FULbiGLSkGHuIB6MlwALMV:9FzPFFIv7h/KVWYxVeE+i1FOIB6Mmkw
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation System.exe -
Executes dropped EXE 13 IoCs
pid Process 2440 System.exe 3804 System.exe 472 System.exe 3768 System.exe 3572 System.exe 3260 System.exe 3748 System.exe 1852 System.exe 3044 System.exe 1676 System.exe 848 System.exe 4312 System.exe 3624 System.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\MSBuild\Microsoft\22eafd247d37c3 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\RuntimeBroker.exe 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\RuntimeBroker.exe 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\9e8d7a4ca61bd9 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe File created C:\Program Files (x86)\Adobe\wininit.exe 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe File created C:\Program Files (x86)\Adobe\56085415360792 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe File created C:\Program Files\MSBuild\Microsoft\TextInputHost.exe 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 9 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5068 PING.EXE 216 PING.EXE 556 PING.EXE 4444 PING.EXE 1788 PING.EXE 368 PING.EXE 388 PING.EXE 3280 PING.EXE 2152 PING.EXE -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings System.exe -
Runs ping.exe 1 TTPs 9 IoCs
pid Process 556 PING.EXE 1788 PING.EXE 368 PING.EXE 2152 PING.EXE 216 PING.EXE 4444 PING.EXE 3280 PING.EXE 388 PING.EXE 5068 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe Token: SeDebugPrivilege 2440 System.exe Token: SeDebugPrivilege 3804 System.exe Token: SeDebugPrivilege 472 System.exe Token: SeDebugPrivilege 3768 System.exe Token: SeDebugPrivilege 3572 System.exe Token: SeDebugPrivilege 3260 System.exe Token: SeDebugPrivilege 3748 System.exe Token: SeDebugPrivilege 1852 System.exe Token: SeDebugPrivilege 3044 System.exe Token: SeDebugPrivilege 1676 System.exe Token: SeDebugPrivilege 848 System.exe Token: SeDebugPrivilege 4312 System.exe Token: SeDebugPrivilege 3624 System.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1832 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 87 PID 3460 wrote to memory of 1832 3460 9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe 87 PID 1832 wrote to memory of 1856 1832 cmd.exe 89 PID 1832 wrote to memory of 1856 1832 cmd.exe 89 PID 1832 wrote to memory of 216 1832 cmd.exe 90 PID 1832 wrote to memory of 216 1832 cmd.exe 90 PID 1832 wrote to memory of 2440 1832 cmd.exe 96 PID 1832 wrote to memory of 2440 1832 cmd.exe 96 PID 2440 wrote to memory of 3732 2440 System.exe 99 PID 2440 wrote to memory of 3732 2440 System.exe 99 PID 3732 wrote to memory of 3840 3732 cmd.exe 101 PID 3732 wrote to memory of 3840 3732 cmd.exe 101 PID 3732 wrote to memory of 556 3732 cmd.exe 102 PID 3732 wrote to memory of 556 3732 cmd.exe 102 PID 3732 wrote to memory of 3804 3732 cmd.exe 103 PID 3732 wrote to memory of 3804 3732 cmd.exe 103 PID 3804 wrote to memory of 1000 3804 System.exe 104 PID 3804 wrote to memory of 1000 3804 System.exe 104 PID 1000 wrote to memory of 4372 1000 cmd.exe 106 PID 1000 wrote to memory of 4372 1000 cmd.exe 106 PID 1000 wrote to memory of 672 1000 cmd.exe 107 PID 1000 wrote to memory of 672 1000 cmd.exe 107 PID 1000 wrote to memory of 472 1000 cmd.exe 109 PID 1000 wrote to memory of 472 1000 cmd.exe 109 PID 472 wrote to memory of 4592 472 System.exe 112 PID 472 wrote to memory of 4592 472 System.exe 112 PID 4592 wrote to memory of 1516 4592 cmd.exe 114 PID 4592 wrote to memory of 1516 4592 cmd.exe 114 PID 4592 wrote to memory of 2776 4592 cmd.exe 115 PID 4592 wrote to memory of 2776 4592 cmd.exe 115 PID 4592 wrote to memory of 3768 4592 cmd.exe 116 PID 4592 wrote to memory of 3768 4592 cmd.exe 116 PID 3768 wrote to memory of 4964 3768 System.exe 117 PID 3768 wrote to memory of 4964 3768 System.exe 117 PID 4964 wrote to memory of 3608 4964 cmd.exe 119 PID 4964 wrote to memory of 3608 4964 cmd.exe 119 PID 4964 wrote to memory of 3616 4964 cmd.exe 120 PID 4964 wrote to memory of 3616 4964 cmd.exe 120 PID 4964 wrote to memory of 3572 4964 cmd.exe 121 PID 4964 wrote to memory of 3572 4964 cmd.exe 121 PID 3572 wrote to memory of 3720 3572 System.exe 122 PID 3572 wrote to memory of 3720 3572 System.exe 122 PID 3720 wrote to memory of 1984 3720 cmd.exe 124 PID 3720 wrote to memory of 1984 3720 cmd.exe 124 PID 3720 wrote to memory of 4444 3720 cmd.exe 125 PID 3720 wrote to memory of 4444 3720 cmd.exe 125 PID 3720 wrote to memory of 3260 3720 cmd.exe 126 PID 3720 wrote to memory of 3260 3720 cmd.exe 126 PID 3260 wrote to memory of 4748 3260 System.exe 127 PID 3260 wrote to memory of 4748 3260 System.exe 127 PID 4748 wrote to memory of 2044 4748 cmd.exe 129 PID 4748 wrote to memory of 2044 4748 cmd.exe 129 PID 4748 wrote to memory of 3280 4748 cmd.exe 130 PID 4748 wrote to memory of 3280 4748 cmd.exe 130 PID 4748 wrote to memory of 3748 4748 cmd.exe 132 PID 4748 wrote to memory of 3748 4748 cmd.exe 132 PID 3748 wrote to memory of 4076 3748 System.exe 133 PID 3748 wrote to memory of 4076 3748 System.exe 133 PID 4076 wrote to memory of 752 4076 cmd.exe 135 PID 4076 wrote to memory of 752 4076 cmd.exe 135 PID 4076 wrote to memory of 1788 4076 cmd.exe 136 PID 4076 wrote to memory of 1788 4076 cmd.exe 136 PID 4076 wrote to memory of 1852 4076 cmd.exe 137 PID 4076 wrote to memory of 1852 4076 cmd.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe"C:\Users\Admin\AppData\Local\Temp\9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IIM9E92stD.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:216
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BD0ryYfNdr.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:3840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:556
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Z8EFjwB7Jj.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:4372
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:672
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BXcMvhxfI2.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:1516
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2776
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LsjJJiW2rn.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:3608
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:3616
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D1HctEwNfs.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\system32\chcp.comchcp 6500113⤵PID:1984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4444
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\G9JNvaemPW.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\system32\chcp.comchcp 6500115⤵PID:2044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3280
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\84x6wBxxuC.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\system32\chcp.comchcp 6500117⤵PID:752
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1788
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BD0ryYfNdr.bat"18⤵PID:224
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:3272
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:368
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fkvHkpsFQE.bat"20⤵PID:3940
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:1632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:388
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b2RsHXtgrT.bat"22⤵PID:4052
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:4548
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:1984
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SiGToND0AD.bat"24⤵PID:2996
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:2744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5068
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BXcMvhxfI2.bat"26⤵PID:2568
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:3840
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:4248
-
-
C:\Users\Default\Videos\System.exe"C:\Users\Default\Videos\System.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Qp3qGlURdT.bat"28⤵PID:1744
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:1584
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ee01a9d8d8d1ecf515b687bf5e354ca
SHA1c3b943dce30e425ae34e6737c7d5c3cdd92f79c5
SHA256c45f52a36b283b46aae313b5a4fcbfbfb67b3c5ac4ee3ecd921087ddadb691a1
SHA5126cb43253ddb3d2e5bdedcf76bc299e91ce970c6ccc53a2d9df7ba621435a6a704ce3990bdf59d939e513e609bab3daf8f110c1cca8485e1a9fe8536a67d41dda
-
Filesize
162B
MD5c89810aa71ac6900f51c52969cb80874
SHA16ebd2b47b7ba391c0bbb911ed03e529e8ef7f4ab
SHA256e9de2fe3f6843f0fccd7a2cd9b211d9632fee2bd5bc15d9b989b613eb6156157
SHA5120a3b206d3d1cb47e51028180032802897e0a34118c2fe64e5127472a091a4502286e1e8e48c2a070b5a5802575025a711b4255c8011b2c235fe609541cbb1330
-
Filesize
162B
MD51b28302006aa6cce835ad07c971bb6d2
SHA1ee630cf8b4383ce3701b40d8c5b0ef0f6ce52d72
SHA256f31e5e46839eac1e98e2f5a6ea83a4c11b35c28e00d4e352a85458add6339f49
SHA512fdc455bacc2a58a3df33efbad08e1983d324ecf48af202f44d943ba7677ec6134a7cce41d717e351a01f0c33502b1d250b1c030b5de976ddd465864c171f38ad
-
Filesize
210B
MD544d632cc4ef6155c23b0f9aa840a7d54
SHA14dcbe204821933fd06bc6039c4a0180d7228eb6f
SHA2564bfb9e64f0f12568647d82cc025ba1a630e771644d1de85e424235a561b08eb7
SHA51237eda995c750cfcbc9b7c4829f295873358f7ec368f46e32dd1141863fde71b6686002809eff9ca1b187060a8129cbee0a48f94f4941b4337a45a3455cc137c1
-
Filesize
162B
MD5f847bbbed6809ae78231bf3f7ac35163
SHA10e0682bd06ea5a32d3fd3b15ee00c0b5b62299aa
SHA2569ea319843d651da293aff2c6f2a34e73bbc3d20c3df8e3023dd27a81e1308a7c
SHA512212174dbed03d0f22ff7cbc2667b0bcffb22ac7d8a2431da9de7b875ae580e66705c0b16e29200823b3c547b38f7d6bfb6ae0e11795ec292463ef5baa1dcf9c2
-
Filesize
162B
MD5590129611fdc2901d60f5b6b62d61dba
SHA12d7b4464fb12056d228f0c015a4dd6905dc4efb6
SHA256032e1a2ff3dc2828cf88bdd82368bbe65220fc262c84178bb403d4a50d622607
SHA51248d9d5b299d6cccbcb50ee159b56a45ae22049becfda7d533baebb79d341d7b6c3afc9e9fc1b51de168c1e1c293fcd55d5c937e114a80cb9ed0d2e3d44fb8228
-
Filesize
162B
MD5e98e42ec9be2d5e8865d19560384bf29
SHA1d3aeb6cc8373055768ee7235eeb3eb570825a4f1
SHA2565d5dfc20f04e3d147c7745b5d785a36362adafedac3b2a4ab962abbd66ec4e74
SHA5127e1e090ec55ad3998562fedbc158468f094a04116e85a27ac2bd20f5495b8bb1bfbd2f5fcc0bcc123a074faae32c8936333492e60b2e61e2e3bbd2eccbedda44
-
Filesize
210B
MD5e8f2c8e00797cde8569ba46f5ed25139
SHA1681ff487b3e2b35018fa12aa580b1623be0f5fb1
SHA256dd15bf85af1b9f2ce926f06c1d0c2905be4b25a9b1bb0cb72c0db41345211f13
SHA512f9ba64cd32077753b31c65d2f037e514ecb72bafff58fe9a6d8b8b1a837331bbbe022926c594743a4b0c464dcc5affd5c13a8cb8251299e12c94bba1cef3b8d5
-
Filesize
162B
MD59f55cf10e6482f9062b85bc5b6c75267
SHA167961dc4bf96731fcac2e8c97dec6b0083bc5c03
SHA256d42778d65befd6b984b173c87cc737dd193ab866f401ab205c7e6bf3df60a15e
SHA512db3774f9a4a9c6f6b80a219c00f298cb51653a84f5059beb50861d92450a3a58a9649f2120a8c3a920e324f9f7790012313735a3adb86931884d1b2a54209ac3
-
Filesize
162B
MD54d36ca35fec18d22704f9a20f00102f0
SHA168339ad0210e1c716b0e74fdc769fe75362159ca
SHA256b16cebb1f12789ba710ed0da6520870958b1ed4c48f39b410deadc711dd0a8b8
SHA512700a9b9265e8992f5a42974ba5718ee47e7a68800a77d587fcc423caae890c17a4c87af90e3a57e83741c5d6d72589bc584efc3274e928ff91219680b8323f9c
-
Filesize
210B
MD5b923c6faa550456a6b87676c86201b03
SHA1e69108b7a5b2180c40d0ae53ee37030f1951d637
SHA256074e640e7252b90d221a13b8d39ecc3ef72f7148cc4a8617fa09b40fc466eb75
SHA512d5e1cab247b6a951a3863ec2ceda5075f6265bdacd5c5b1093175fd751e8608261c583ebbc3dec8d75996220c236e73864745e9b2a427b0626073414302d2371
-
Filesize
210B
MD51bdc9f7bf2d2b4cf447d95bcc863c459
SHA13bff1de98c0284baf29a98a0a22c61eed0a5b748
SHA2564a2d977d50dccc2f9f669f3a760a4f73481c88cbebd4fab63e2b60ef25a75aea
SHA512a391685c27f250c32402ac558f527d620afe6aa086a20377dcdaa1cb6d6ffd53f02b564627ceba77d15ed2a47ade108457f6f57d06236114360e5ae3eef0fbb3
-
Filesize
162B
MD535e7a280cc637cbfc6c4d9bdf2ba2685
SHA164dd0b6fa0f9f8e508701677b521209ef5d83c1a
SHA256fa687baed543233d63dffca5b49b982b4313915350686bf5eb5eb868e6aa5eac
SHA51237930258d7368f466d106f4a9c2d622330cfb68c8d0a183976fba6cd30a7fb24e31e36e422a742ffa4855a46013e823798b078a9042d842698e6c75430921479
-
Filesize
3.3MB
MD50ad0b4a4a549230e090d712b5521bd96
SHA155690e0d976955e80f14c314efcaa34e3303a02b
SHA2569882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429
SHA512b689ab2b7e3a59f760d3c6cb3b72927e3dc0eb9323aceb05c2571ca85863fc769098924b943e6e80edb1853c348451869996fd4c38a7dd10dc8e2970e5d4d027