Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 04:11
Behavioral task
behavioral1
Sample
6258C0D7C31A5BA4B2B0CB9C97606ACD.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6258C0D7C31A5BA4B2B0CB9C97606ACD.exe
Resource
win10v2004-20241007-en
General
-
Target
6258C0D7C31A5BA4B2B0CB9C97606ACD.exe
-
Size
2.8MB
-
MD5
6258c0d7c31a5ba4b2b0cb9c97606acd
-
SHA1
123138131fc33eeeedc82e795f201981232a55b1
-
SHA256
8d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4
-
SHA512
9e8248a258475bf8676b041073da7985a3b0a6e57cf7293415e3dd1e6e8fd6bd0056ba4d60b33f6d4c0cfec4b3f33c43e88881c6a0f6fc52f3654ff12022875e
-
SSDEEP
49152:rPloaBLYs0dLLXmgmQPDWSJNCQdi2GjyIlAd28nZbmsl+S2sJaOP:rPl7ZoLbFmsPNHi2GjLAdVlqO
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3940 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4980 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4636 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4104 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3684 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3660 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3536 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3688 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3856 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3136 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3644 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3428 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3208 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2136 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 2136 schtasks.exe 87 -
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exeRuntimeBroker.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe -
Processes:
resource yara_rule behavioral2/memory/2288-1-0x0000000000180000-0x0000000000452000-memory.dmp dcrat behavioral2/files/0x0008000000023c18-31.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Executes dropped EXE 1 IoCs
Processes:
RuntimeBroker.exepid Process 2620 RuntimeBroker.exe -
Processes:
RuntimeBroker.exe6258C0D7C31A5BA4B2B0CB9C97606ACD.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Drops file in Program Files directory 21 IoCs
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exedescription ioc Process File created C:\Program Files (x86)\Windows NT\Accessories\38384e6a620884 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Google\Temp\ea1d8f6d871115 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Windows Multimedia Platform\dwm.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Windows Multimedia Platform\6cb0b6c459d5d3 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files\Google\backgroundTaskHost.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\SearchApp.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files (x86)\Google\Temp\upfc.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\7-Zip\Lang\RuntimeBroker.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\7-Zip\Lang\9e8d7a4ca61bd9 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Windows NT\Accessories\SearchApp.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Google\Temp\upfc.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Internet Explorer\es-ES\System.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files\7-Zip\Lang\RuntimeBroker.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Google\eddb19405b7ce1 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\9e8d7a4ca61bd9 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Internet Explorer\es-ES\27d1bcfc3c54e0 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\System.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files\Windows Multimedia Platform\dwm.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Google\backgroundTaskHost.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Drops file in Windows directory 6 IoCs
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exedescription ioc Process File created C:\Windows\Cursors\9e8d7a4ca61bd9 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Windows\Cursors\RuntimeBroker.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Windows\INF\Windows Workflow Foundation 3.0.0.0\0409\SppExtComObj.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Windows\INF\Windows Workflow Foundation 3.0.0.0\0409\SppExtComObj.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Windows\INF\Windows Workflow Foundation 3.0.0.0\0409\e1ef82546f0b02 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Windows\Cursors\RuntimeBroker.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4428 schtasks.exe 1904 schtasks.exe 232 schtasks.exe 4372 schtasks.exe 4104 schtasks.exe 2584 schtasks.exe 2868 schtasks.exe 3136 schtasks.exe 2624 schtasks.exe 1416 schtasks.exe 3688 schtasks.exe 3236 schtasks.exe 8 schtasks.exe 3684 schtasks.exe 1532 schtasks.exe 2420 schtasks.exe 3252 schtasks.exe 3536 schtasks.exe 2900 schtasks.exe 1616 schtasks.exe 2432 schtasks.exe 1612 schtasks.exe 1480 schtasks.exe 4980 schtasks.exe 4636 schtasks.exe 3856 schtasks.exe 1040 schtasks.exe 2536 schtasks.exe 3644 schtasks.exe 1940 schtasks.exe 2272 schtasks.exe 2024 schtasks.exe 4692 schtasks.exe 956 schtasks.exe 1556 schtasks.exe 2660 schtasks.exe 3464 schtasks.exe 3428 schtasks.exe 1816 schtasks.exe 3940 schtasks.exe 1760 schtasks.exe 4312 schtasks.exe 1328 schtasks.exe 3660 schtasks.exe 3208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exepid Process 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RuntimeBroker.exepid Process 2620 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exeRuntimeBroker.exedescription pid Process Token: SeDebugPrivilege 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Token: SeDebugPrivilege 2620 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.execmd.exedescription pid Process procid_target PID 2288 wrote to memory of 3020 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 137 PID 2288 wrote to memory of 3020 2288 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 137 PID 3020 wrote to memory of 3656 3020 cmd.exe 140 PID 3020 wrote to memory of 3656 3020 cmd.exe 140 PID 3020 wrote to memory of 2620 3020 cmd.exe 142 PID 3020 wrote to memory of 2620 3020 cmd.exe 142 -
System policy modification 1 TTPs 6 IoCs
Processes:
6258C0D7C31A5BA4B2B0CB9C97606ACD.exeRuntimeBroker.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6258C0D7C31A5BA4B2B0CB9C97606ACD.exe"C:\Users\Admin\AppData\Local\Temp\6258C0D7C31A5BA4B2B0CB9C97606ACD.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NuLx4BY34C.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3656
-
-
C:\Users\Default User\RuntimeBroker.exe"C:\Users\Default User\RuntimeBroker.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2620
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Windows\INF\Windows Workflow Foundation 3.0.0.0\0409\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\INF\Windows Workflow Foundation 3.0.0.0\0409\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Windows\INF\Windows Workflow Foundation 3.0.0.0\0409\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Google\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\7-Zip\Lang\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\Accessories\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\Accessories\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\Temp\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\Temp\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\Cursors\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Cursors\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Windows\Cursors\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\es-ES\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\es-ES\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\es-ES\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Start Menu\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Start Menu\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Multimedia Platform\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD56258c0d7c31a5ba4b2b0cb9c97606acd
SHA1123138131fc33eeeedc82e795f201981232a55b1
SHA2568d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4
SHA5129e8248a258475bf8676b041073da7985a3b0a6e57cf7293415e3dd1e6e8fd6bd0056ba4d60b33f6d4c0cfec4b3f33c43e88881c6a0f6fc52f3654ff12022875e
-
Filesize
204B
MD51e9e32af5ee5ad7d7b2bce4d6ff171a9
SHA1f86a91953b74eec7580030a86d84a8d43f9ae1cc
SHA25629561ad04bcc41ab5a2c7601a07af658dfa9d9e5e2265f8af7a7d145648e71ca
SHA5123c82e369a92d633877321383e4d138951d35ed87f2610d928cee08efdf4106b970a5bcf89d2e5428bb62066280ac3cf5455c5c8148ec522a32ee935fe70c68d6