Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/10/2024, 04:17
Behavioral task
behavioral1
Sample
6258C0D7C31A5BA4B2B0CB9C97606ACD.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6258C0D7C31A5BA4B2B0CB9C97606ACD.exe
Resource
win10v2004-20241007-en
General
-
Target
6258C0D7C31A5BA4B2B0CB9C97606ACD.exe
-
Size
2.8MB
-
MD5
6258c0d7c31a5ba4b2b0cb9c97606acd
-
SHA1
123138131fc33eeeedc82e795f201981232a55b1
-
SHA256
8d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4
-
SHA512
9e8248a258475bf8676b041073da7985a3b0a6e57cf7293415e3dd1e6e8fd6bd0056ba4d60b33f6d4c0cfec4b3f33c43e88881c6a0f6fc52f3654ff12022875e
-
SSDEEP
49152:rPloaBLYs0dLLXmgmQPDWSJNCQdi2GjyIlAd28nZbmsl+S2sJaOP:rPl7ZoLbFmsPNHi2GjLAdVlqO
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 30 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2936 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1248 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 804 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2280 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2256 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2460 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 564 2460 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe -
resource yara_rule behavioral1/memory/2600-1-0x0000000000E80000-0x0000000001152000-memory.dmp dcrat behavioral1/files/0x0005000000018686-29.dat dcrat behavioral1/memory/1524-59-0x0000000001180000-0x0000000001452000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
pid Process 1524 csrss.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\System.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Common Files\System\System.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\dllhost.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\5940a34987c991 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\27d1bcfc3c54e0 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\System.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\csrss.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\dllhost.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Program Files\Common Files\System\System.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files\Common Files\System\27d1bcfc3c54e0 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\csrss.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\886983d96e3d3e 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\tracing\csrss.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Windows\tracing\886983d96e3d3e 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Windows\Microsoft.NET\assembly\csrss.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File created C:\Windows\Microsoft.NET\assembly\886983d96e3d3e 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Windows\tracing\csrss.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe File opened for modification C:\Windows\Microsoft.NET\assembly\csrss.exe 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2572 schtasks.exe 2472 schtasks.exe 1812 schtasks.exe 804 schtasks.exe 2960 schtasks.exe 2728 schtasks.exe 1796 schtasks.exe 564 schtasks.exe 2100 schtasks.exe 2116 schtasks.exe 1608 schtasks.exe 1248 schtasks.exe 1904 schtasks.exe 2688 schtasks.exe 2972 schtasks.exe 2756 schtasks.exe 2668 schtasks.exe 2280 schtasks.exe 2916 schtasks.exe 2936 schtasks.exe 1484 schtasks.exe 1968 schtasks.exe 2276 schtasks.exe 2776 schtasks.exe 2832 schtasks.exe 1380 schtasks.exe 2644 schtasks.exe 2084 schtasks.exe 1936 schtasks.exe 2256 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe 1524 csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1524 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Token: SeDebugPrivilege 1524 csrss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1072 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 62 PID 2600 wrote to memory of 1072 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 62 PID 2600 wrote to memory of 1072 2600 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe 62 PID 1072 wrote to memory of 1360 1072 cmd.exe 64 PID 1072 wrote to memory of 1360 1072 cmd.exe 64 PID 1072 wrote to memory of 1360 1072 cmd.exe 64 PID 1072 wrote to memory of 1524 1072 cmd.exe 65 PID 1072 wrote to memory of 1524 1072 cmd.exe 65 PID 1072 wrote to memory of 1524 1072 cmd.exe 65 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6258C0D7C31A5BA4B2B0CB9C97606ACD.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6258C0D7C31A5BA4B2B0CB9C97606ACD.exe"C:\Users\Admin\AppData\Local\Temp\6258C0D7C31A5BA4B2B0CB9C97606ACD.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\O9L14aTIEZ.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1360
-
-
C:\Windows\Microsoft.NET\assembly\csrss.exe"C:\Windows\Microsoft.NET\assembly\csrss.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1524
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Common Files\System\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\System\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\tracing\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\tracing\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\tracing\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Internet Explorer\de-DE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\Microsoft.NET\assembly\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\assembly\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\Microsoft.NET\assembly\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:564
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD5a9c94313fbd5d27b8ef8221611c0fe0e
SHA160a7c5373b68c3890fcdf4a0753f0c075f3de2bf
SHA2561f0fa148fbcf29be3874dd57c2037e727889eeac32f1af51f881cbb6076747f8
SHA5128240a82ba13ba9e7511cffca8cf1ffca9d7267f0357bda28175a9151e07263e23ccaae6f0fdd787de898cab83213c834729a49d1a3d47e11162c35cb3fd47523
-
Filesize
2.8MB
MD56258c0d7c31a5ba4b2b0cb9c97606acd
SHA1123138131fc33eeeedc82e795f201981232a55b1
SHA2568d5514730f330a6f4ae9b1807f0c77ed15975d469c7c92c10c690ed681210ed4
SHA5129e8248a258475bf8676b041073da7985a3b0a6e57cf7293415e3dd1e6e8fd6bd0056ba4d60b33f6d4c0cfec4b3f33c43e88881c6a0f6fc52f3654ff12022875e