Analysis
-
max time kernel
119s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/10/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe
Resource
win10v2004-20241007-en
General
-
Target
84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe
-
Size
2.1MB
-
MD5
24f297e399f1471c6dbdcc3963e5d66f
-
SHA1
5abc4979b83ca42241e55299e0ebf93c97a54c23
-
SHA256
84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719
-
SHA512
0c9adbaedde18b2213aab82bfabcad4af71a943751b434669c9df6b4c0fe13ca17e579ac6240bc2c966b8db26c85404af10fb1565953a101471062baf68af498
-
SSDEEP
24576:2TbBv5rUyXVlO8V8ikUJRQnpkPtG4HYy5hJoiJ4BUUCMmX8yvYs+UYFtaSlr3:IBJleiLOQNMbNqQs+UYF7
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\", \"C:\\Windows\\AppPatch\\de-DE\\audiodg.exe\", \"C:\\Windows\\Fonts\\dllhost.exe\", \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\cmd.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\", \"C:\\Windows\\AppPatch\\de-DE\\audiodg.exe\", \"C:\\Windows\\Fonts\\dllhost.exe\", \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\lsass.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\cmd.exe\", \"C:\\Providerinto\\webrefSession.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\", \"C:\\Windows\\AppPatch\\de-DE\\audiodg.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\", \"C:\\Windows\\AppPatch\\de-DE\\audiodg.exe\", \"C:\\Windows\\Fonts\\dllhost.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\", \"C:\\Windows\\AppPatch\\de-DE\\audiodg.exe\", \"C:\\Windows\\Fonts\\dllhost.exe\", \"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\lsass.exe\"" webrefSession.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1300 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1032 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2072 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2720 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2720 schtasks.exe 35 -
Executes dropped EXE 2 IoCs
pid Process 2692 webrefSession.exe 1508 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1036 cmd.exe 1036 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files (x86)\\Windows Portable Devices\\cmd.exe\"" webrefSession.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\"" webrefSession.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Windows\\AppPatch\\de-DE\\audiodg.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Windows\\AppPatch\\de-DE\\audiodg.exe\"" webrefSession.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Fonts\\dllhost.exe\"" webrefSession.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files (x86)\\Windows Portable Devices\\cmd.exe\"" webrefSession.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\webrefSession = "\"C:\\Providerinto\\webrefSession.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\webrefSession = "\"C:\\Providerinto\\webrefSession.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\cmd.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Fonts\\dllhost.exe\"" webrefSession.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\lsass.exe\"" webrefSession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Recovery\\1a287102-69f6-11ef-b2ff-62cb582c238c\\lsass.exe\"" webrefSession.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCFF2D0AEFFB704E71A430E9A86860D9B3.TMP csc.exe File created \??\c:\Windows\System32\3kmwe8.exe csc.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Portable Devices\cmd.exe webrefSession.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\cmd.exe webrefSession.exe File created C:\Program Files (x86)\Windows Portable Devices\ebf1f9fa8afd6d webrefSession.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\AppPatch\de-DE\42af1c969fbb7b webrefSession.exe File created C:\Windows\winsxs\amd64_microsoft-windows-userinit.resources_31bf3856ad364e35_6.1.7600.16385_it-it_789060fcb62e86f2\wininit.exe webrefSession.exe File created C:\Windows\Fonts\dllhost.exe webrefSession.exe File created C:\Windows\Fonts\5940a34987c991 webrefSession.exe File created C:\Windows\AppPatch\de-DE\audiodg.exe webrefSession.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 628 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 628 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe 1196 schtasks.exe 1336 schtasks.exe 2156 schtasks.exe 2072 schtasks.exe 1344 schtasks.exe 2392 schtasks.exe 1300 schtasks.exe 1288 schtasks.exe 1032 schtasks.exe 2844 schtasks.exe 2940 schtasks.exe 2336 schtasks.exe 2552 schtasks.exe 3000 schtasks.exe 1984 schtasks.exe 380 schtasks.exe 2384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 2692 webrefSession.exe 1508 cmd.exe 1508 cmd.exe 1508 cmd.exe 1508 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 webrefSession.exe Token: SeDebugPrivilege 1508 cmd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2476 2980 84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe 30 PID 2980 wrote to memory of 2476 2980 84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe 30 PID 2980 wrote to memory of 2476 2980 84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe 30 PID 2980 wrote to memory of 2476 2980 84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe 30 PID 2476 wrote to memory of 1036 2476 WScript.exe 32 PID 2476 wrote to memory of 1036 2476 WScript.exe 32 PID 2476 wrote to memory of 1036 2476 WScript.exe 32 PID 2476 wrote to memory of 1036 2476 WScript.exe 32 PID 1036 wrote to memory of 2692 1036 cmd.exe 34 PID 1036 wrote to memory of 2692 1036 cmd.exe 34 PID 1036 wrote to memory of 2692 1036 cmd.exe 34 PID 1036 wrote to memory of 2692 1036 cmd.exe 34 PID 2692 wrote to memory of 972 2692 webrefSession.exe 39 PID 2692 wrote to memory of 972 2692 webrefSession.exe 39 PID 2692 wrote to memory of 972 2692 webrefSession.exe 39 PID 972 wrote to memory of 1516 972 csc.exe 41 PID 972 wrote to memory of 1516 972 csc.exe 41 PID 972 wrote to memory of 1516 972 csc.exe 41 PID 2692 wrote to memory of 2304 2692 webrefSession.exe 57 PID 2692 wrote to memory of 2304 2692 webrefSession.exe 57 PID 2692 wrote to memory of 2304 2692 webrefSession.exe 57 PID 2304 wrote to memory of 1692 2304 cmd.exe 59 PID 2304 wrote to memory of 1692 2304 cmd.exe 59 PID 2304 wrote to memory of 1692 2304 cmd.exe 59 PID 2304 wrote to memory of 628 2304 cmd.exe 60 PID 2304 wrote to memory of 628 2304 cmd.exe 60 PID 2304 wrote to memory of 628 2304 cmd.exe 60 PID 2304 wrote to memory of 1508 2304 cmd.exe 61 PID 2304 wrote to memory of 1508 2304 cmd.exe 61 PID 2304 wrote to memory of 1508 2304 cmd.exe 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe"C:\Users\Admin\AppData\Local\Temp\84ffe1fe9ff878e3cf0a4f91a9a57964845dc96634fc11e95ee0ef8edb2ce719.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Providerinto\jxEdxGsN64kiOqEUGJ67IuxvNwoevsckopc9pvSU.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Providerinto\Bn5IdhR1tUpuTxK5hmOWWYzImaYN1V5cjqGFLj.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Providerinto\webrefSession.exe"C:\Providerinto/webrefSession.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yex3oiac\yex3oiac.cmdline"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES290.tmp" "c:\Windows\System32\CSCFF2D0AEFFB704E71A430E9A86860D9B3.TMP"6⤵PID:1516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\i6xrkkiY6W.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1692
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:628
-
-
C:\Program Files (x86)\Windows Portable Devices\cmd.exe"C:\Program Files (x86)\Windows Portable Devices\cmd.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Windows\AppPatch\de-DE\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\AppPatch\de-DE\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\AppPatch\de-DE\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Fonts\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "webrefSessionw" /sc MINUTE /mo 6 /tr "'C:\Providerinto\webrefSession.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "webrefSession" /sc ONLOGON /tr "'C:\Providerinto\webrefSession.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "webrefSessionw" /sc MINUTE /mo 8 /tr "'C:\Providerinto\webrefSession.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77B
MD553d8109386eeba065202d0cf2138f459
SHA1d5972faee3997246c7ffa5c53e1c2d8cc2b3803a
SHA2563e551e685fa443e19c1cef210062d7c4b960c9c5d538e692ac0eaeb47e09ee4f
SHA51255a0633b1d9c9d1b30f9efb0acff436c2a591f55c2dcf56c67038794ed31e06cb384ab8e1a0969903956789279a7d9b28c20a5e51c837b0c3bf24aa33ed23313
-
Filesize
229B
MD5e9b28a6c1dcf0251811da0e9b23eaa4b
SHA19cee1ece8bf61d4088e604697b0ef0662e27dce3
SHA256cfc6ef18996e238555dad4daa17f08ee502bc3e8f6a4c315939522b3944c54b0
SHA512eba575e7ff8ddacf8f2dad24ef99dc448b4abccaad05904c1a7156a1a04f5df87c8997795858ca980f340f11e4be9236fe7ffdd5f858634a0cf9a118d66f760c
-
Filesize
1KB
MD5f9850e7d16eaa34c18e3b10ddc2a81a2
SHA19af49d7e279a8648dd57eccc149b0b9bce5ce823
SHA25698d60d036f7ab1f9e0c1162dbefe5552d8447597cce710283a7602a412538ee8
SHA512c42e12365c38e7e7d0d5d184042527c4c49146216d9d962441483e26978155e33d42153c9efccfded115a1c0d8d54a6aa0573b03a8fafebc42f1581642b908f4
-
Filesize
183B
MD5262a3f5408dbbc20b47837c0dcd1e29f
SHA14bbc27661934f8c458fa72f956b54c5a7a81c049
SHA256fdc9cbede1c99b0022ce6f1579c5582d77d88447e6d9bce70c80a64e2be4f919
SHA512b67c4e584ec1095d5aa3136f1aa5d470efa379313b4fd1c42c6a0309823bd4dd9e164dc864489ec9b484fe9b9556b9fab2dcc1a040b8b3bf60c45806c7c73eac
-
Filesize
388B
MD5e3df5601863256a9b43e21371c366a20
SHA11ec3a12c2a14d4f736320c6e2a5be638bf156c3c
SHA25680fcbf02d928fa0cfbe4fbdb0f3b260cefe98878a1069446b3a330bfd5c55745
SHA5127bae45fbb5f1f1b581e0bec5adbc5ec5a425d0f1cf479bb33d883ca664c9bc12a6cf93b22064f09677ac826e2ba7e5acaf0befa5985e17a1209044d86e1e9736
-
Filesize
235B
MD5b999b4aba5d61934ed663054ff9eb6ba
SHA113dac50ef4e690329a72da2c3312db32a5619fad
SHA2567d33ef1d124c7d04464466dfe173e4a81c05f68bd9c06ca04c8b5468111f7b5d
SHA512e4fd3646e72fe9cd51c876e9d11e9885fcd3459e6edbd99d12a7430f5d3cb7483512a244b7036695667718609df69fe2833bf6a659f7c6f0df21b4ba7148e088
-
Filesize
1KB
MD58c85ef91c6071d33745325a8fa351c3e
SHA1e3311ceef28823eec99699cc35be27c94eca52d2
SHA2568db3e3a5515da1933036688a9b1918cfc3339fc687008c5325461271904b2d41
SHA5122bb89b07fe46b1c406ed6a560e88cb2b8402b1d61bb71e10887bad661751f64f1e5317fd6c1b301ea4766785b915da31b64e0475cfe36c1f950b32915b5dab7d
-
Filesize
1.8MB
MD5aa47cc8dc99f5a7b574343c64bb23044
SHA1047dbd74b8beaf914c5ca58ab53a6cae2e33e603
SHA25627cc2a9fb4fce7185c7a3ff203e7bfe7133fa3f489aab93bf63534b1b2615b99
SHA5127790eacbf8973d000e6e35210b165e7569446445c438a3761987d2fe90553218e5f999efe862ffeacd2d3065b6c4972cb045030b3f3ee0ce32772f532c34d628