Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe
Resource
win10v2004-20241007-en
General
-
Target
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe
-
Size
1.5MB
-
MD5
8a3610882dcd50607fd3fa01d7a27b70
-
SHA1
3f3823159964a51f3e55decdbe83abaf79ba9d8a
-
SHA256
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781
-
SHA512
faca6c13605606e436ca4c78ce0fd2f8cbafaa5ef72f68aae880ee9528377aff69b58f5e16633ee3cf7bec4f732de86fcebafd1ba1490636d0676f9d0a32a444
-
SSDEEP
24576:dbfESdvMj6hoGDAQsJ+N6XcHQWq3QY2SrXQLdok0OjYS4mej+T1kJCv:ZEi6GDAQORcwW5/oBjme81
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription ioc pid Process 2236 schtasks.exe 828 schtasks.exe 1180 schtasks.exe 5560 schtasks.exe 1568 schtasks.exe 6108 schtasks.exe 1588 schtasks.exe 1760 schtasks.exe 4956 schtasks.exe 3708 schtasks.exe 2392 schtasks.exe 5032 schtasks.exe 880 schtasks.exe 3236 schtasks.exe 3700 schtasks.exe 5484 schtasks.exe 3852 schtasks.exe File created C:\Program Files\Uninstall Information\wininit.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 4076 schtasks.exe 3096 schtasks.exe 4864 schtasks.exe 2692 schtasks.exe 3228 schtasks.exe 1416 schtasks.exe 4832 schtasks.exe 2828 schtasks.exe 2820 schtasks.exe 968 schtasks.exe 804 schtasks.exe 4200 schtasks.exe 1008 schtasks.exe 5780 schtasks.exe 2288 schtasks.exe 4152 schtasks.exe 5000 schtasks.exe File created C:\Program Files\Uninstall Information\56085415360792 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 976 schtasks.exe 1668 schtasks.exe 4388 schtasks.exe 5240 schtasks.exe 2348 schtasks.exe 2056 schtasks.exe 2928 schtasks.exe 1828 schtasks.exe 4884 schtasks.exe 2428 schtasks.exe 3504 schtasks.exe 3440 schtasks.exe 4256 schtasks.exe 4212 schtasks.exe 4568 schtasks.exe 5100 schtasks.exe 2672 schtasks.exe 3944 schtasks.exe 4516 schtasks.exe 1324 schtasks.exe 3344 schtasks.exe 3372 schtasks.exe 1832 schtasks.exe 4960 schtasks.exe 752 schtasks.exe 2348 schtasks.exe 964 schtasks.exe 1908 schtasks.exe -
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 20 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\", \"C:\\Windows\\PolicyDefinitions\\uk-UA\\unsecapp.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\", \"C:\\Windows\\PolicyDefinitions\\uk-UA\\unsecapp.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Documents and Settings\\System.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\", \"C:\\Windows\\PolicyDefinitions\\uk-UA\\unsecapp.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Documents and Settings\\System.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\fontdrvhost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\", \"C:\\Windows\\PolicyDefinitions\\uk-UA\\unsecapp.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Documents and Settings\\System.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\fontdrvhost.exe\", \"C:\\Windows\\Sun\\Java\\Deployment\\RuntimeBroker.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\", \"C:\\Windows\\PolicyDefinitions\\uk-UA\\unsecapp.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\", \"C:\\ProgramData\\Adobe\\upfc.exe\", \"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\", \"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\", \"C:\\Windows\\PolicyDefinitions\\uk-UA\\unsecapp.exe\", \"C:\\Recovery\\WindowsRE\\Registry.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Uninstall Information\\wininit.exe\", \"C:\\Users\\Admin\\Recent\\Idle.exe\", \"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\", \"C:\\Windows\\debug\\backgroundTaskHost.exe\", \"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\", \"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\", \"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\", \"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\", \"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 968 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3708 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3280 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3944 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3344 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3868 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4576 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3852 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3504 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4516 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3696 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1372 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5032 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4076 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 804 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4832 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4972 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3372 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 828 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4804 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4960 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1404 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5000 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4200 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3700 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3440 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 752 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4884 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4256 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 460 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 2948 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2948 schtasks.exe 85 -
Command and Scripting Interpreter: PowerShell 1 TTPs 22 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4104 powershell.exe 5588 powershell.exe 4200 powershell.exe 4652 powershell.exe 392 powershell.exe 4884 powershell.exe 504 powershell.exe 3700 powershell.exe 1828 powershell.exe 1584 powershell.exe 1052 powershell.exe 3432 powershell.exe 1180 powershell.exe 5424 powershell.exe 436 powershell.exe 2904 powershell.exe 1036 powershell.exe 3248 powershell.exe 3440 powershell.exe 4068 powershell.exe 1912 powershell.exe 752 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exefontdrvhost.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation fontdrvhost.exe -
Executes dropped EXE 3 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exefontdrvhost.exefontdrvhost.exepid Process 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 5428 fontdrvhost.exe 220 fontdrvhost.exe -
Adds Run key to start application 2 TTPs 20 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\ProgramData\\Adobe\\upfc.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Windows\\PolicyDefinitions\\uk-UA\\unsecapp.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Documents and Settings\\System.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\fontdrvhost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\Sun\\Java\\Deployment\\RuntimeBroker.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\debug\\backgroundTaskHost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\ProgramData\\regid.1991-06.com.microsoft\\smss.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Schema\\dllhost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files (x86)\\Common Files\\Services\\wininit.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\SystemResources\\Windows.UI.Search\\pris\\StartMenuExperienceHost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Program Files\\Uninstall Information\\wininit.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\ProgramData\\WindowsHolographicDevices\\SpatialStore\\sysmon.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\ProgramData\\USOShared\\Logs\\sihost.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Program Files\\Microsoft Office\\Office16\\upfc.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Admin\\Recent\\Idle.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files\\Internet Explorer\\es-ES\\Idle.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\ProgramData\\SoftwareDistribution\\Idle.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Windows Portable Devices\\csrss.exe\"" 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe -
Drops file in Program Files directory 27 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exedescription ioc Process File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\dllhost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\5940a34987c991 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files (x86)\Windows Portable Devices\886983d96e3d3e 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files\Internet Explorer\es-ES\Idle.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files\Microsoft Office\Office16\ea1d8f6d871115 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files (x86)\Common Files\Services\RCXD53E.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\5b884080fd4f94 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\dllhost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files (x86)\Common Files\Services\wininit.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files\Microsoft Office\Office16\upfc.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files\Uninstall Information\56085415360792 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files\Internet Explorer\es-ES\6ccacd8608530f 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files\Microsoft Office\Office16\RCXCE55.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files\Microsoft Office\Office16\upfc.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files (x86)\Common Files\Services\56085415360792 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\RCXC5B6.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files (x86)\Common Files\Services\wininit.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files\Uninstall Information\RCXBDA4.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files\Uninstall Information\wininit.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\RCXD0C7.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\csrss.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files\Uninstall Information\wininit.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Program Files (x86)\Windows Portable Devices\csrss.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCXD743.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\Idle.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe -
Drops file in Windows directory 15 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exedescription ioc Process File opened for modification C:\Windows\debug\backgroundTaskHost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Windows\PolicyDefinitions\uk-UA\unsecapp.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\Sun\Java\Deployment\RuntimeBroker.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\Sun\Java\Deployment\9e8d7a4ca61bd9 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Windows\SystemResources\Windows.UI.Search\pris\StartMenuExperienceHost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Windows\PolicyDefinitions\uk-UA\RCXDB4C.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Windows\Sun\Java\Deployment\RuntimeBroker.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\debug\eddb19405b7ce1 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\SystemResources\Windows.UI.Search\pris\StartMenuExperienceHost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\SystemResources\Windows.UI.Search\pris\55b276f4edf653 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\PolicyDefinitions\uk-UA\unsecapp.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\debug\backgroundTaskHost.exe 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File created C:\Windows\PolicyDefinitions\uk-UA\29c1c3cc0f7685 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Windows\debug\RCXC3B2.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe File opened for modification C:\Windows\SystemResources\Windows.UI.Search\pris\RCXD947.tmp 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exefontdrvhost.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings fontdrvhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 2348 schtasks.exe 1832 schtasks.exe 2820 schtasks.exe 5780 schtasks.exe 4212 schtasks.exe 2288 schtasks.exe 3280 schtasks.exe 2056 schtasks.exe 2928 schtasks.exe 1568 schtasks.exe 4076 schtasks.exe 5100 schtasks.exe 1404 schtasks.exe 752 schtasks.exe 5560 schtasks.exe 3700 schtasks.exe 3440 schtasks.exe 2792 schtasks.exe 804 schtasks.exe 1180 schtasks.exe 460 schtasks.exe 1336 schtasks.exe 4516 schtasks.exe 1324 schtasks.exe 976 schtasks.exe 4804 schtasks.exe 2672 schtasks.exe 1008 schtasks.exe 5240 schtasks.exe 964 schtasks.exe 3944 schtasks.exe 3868 schtasks.exe 2236 schtasks.exe 4388 schtasks.exe 880 schtasks.exe 5528 schtasks.exe 4152 schtasks.exe 2392 schtasks.exe 4576 schtasks.exe 3696 schtasks.exe 5032 schtasks.exe 5484 schtasks.exe 1760 schtasks.exe 3504 schtasks.exe 5000 schtasks.exe 1668 schtasks.exe 2820 schtasks.exe 4960 schtasks.exe 2692 schtasks.exe 3096 schtasks.exe 1908 schtasks.exe 3344 schtasks.exe 4972 schtasks.exe 4568 schtasks.exe 628 schtasks.exe 2828 schtasks.exe 4956 schtasks.exe 4468 schtasks.exe 828 schtasks.exe 4864 schtasks.exe 3372 schtasks.exe 1584 schtasks.exe 2348 schtasks.exe 3708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exepid Process 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 3700 powershell.exe 3700 powershell.exe 2904 powershell.exe 2904 powershell.exe 436 powershell.exe 436 powershell.exe 4068 powershell.exe 4068 powershell.exe 1584 powershell.exe 1584 powershell.exe 1912 powershell.exe 1912 powershell.exe 752 powershell.exe 752 powershell.exe 4884 powershell.exe 3432 powershell.exe 4884 powershell.exe 3432 powershell.exe 4652 powershell.exe 4652 powershell.exe 1052 powershell.exe 1052 powershell.exe 3248 powershell.exe 3248 powershell.exe 1828 powershell.exe 1828 powershell.exe 1180 powershell.exe 1180 powershell.exe 392 powershell.exe 392 powershell.exe 4200 powershell.exe 4200 powershell.exe 3440 powershell.exe 3440 powershell.exe 1180 powershell.exe 2904 powershell.exe 2904 powershell.exe 3700 powershell.exe 3700 powershell.exe 1828 powershell.exe 4652 powershell.exe 3432 powershell.exe 1912 powershell.exe 1584 powershell.exe 4884 powershell.exe 752 powershell.exe 752 powershell.exe 3248 powershell.exe 4068 powershell.exe 4068 powershell.exe 392 powershell.exe 1052 powershell.exe 436 powershell.exe 436 powershell.exe 4200 powershell.exe 3440 powershell.exe 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exefontdrvhost.exefontdrvhost.exedescription pid Process Token: SeDebugPrivilege 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 4068 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 1912 powershell.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 3432 powershell.exe Token: SeDebugPrivilege 4652 powershell.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeDebugPrivilege 3248 powershell.exe Token: SeDebugPrivilege 1180 powershell.exe Token: SeDebugPrivilege 392 powershell.exe Token: SeDebugPrivilege 4200 powershell.exe Token: SeDebugPrivilege 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe Token: SeDebugPrivilege 5588 powershell.exe Token: SeDebugPrivilege 5424 powershell.exe Token: SeDebugPrivilege 4104 powershell.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 504 powershell.exe Token: SeDebugPrivilege 5428 fontdrvhost.exe Token: SeDebugPrivilege 220 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.execmd.exe5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.execmd.exefontdrvhost.exeWScript.exedescription pid Process procid_target PID 2712 wrote to memory of 4200 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 161 PID 2712 wrote to memory of 4200 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 161 PID 2712 wrote to memory of 3248 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 162 PID 2712 wrote to memory of 3248 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 162 PID 2712 wrote to memory of 1052 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 163 PID 2712 wrote to memory of 1052 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 163 PID 2712 wrote to memory of 3440 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 164 PID 2712 wrote to memory of 3440 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 164 PID 2712 wrote to memory of 3700 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 165 PID 2712 wrote to memory of 3700 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 165 PID 2712 wrote to memory of 4068 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 166 PID 2712 wrote to memory of 4068 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 166 PID 2712 wrote to memory of 1828 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 167 PID 2712 wrote to memory of 1828 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 167 PID 2712 wrote to memory of 4652 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 168 PID 2712 wrote to memory of 4652 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 168 PID 2712 wrote to memory of 1912 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 169 PID 2712 wrote to memory of 1912 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 169 PID 2712 wrote to memory of 752 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 170 PID 2712 wrote to memory of 752 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 170 PID 2712 wrote to memory of 436 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 171 PID 2712 wrote to memory of 436 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 171 PID 2712 wrote to memory of 1584 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 172 PID 2712 wrote to memory of 1584 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 172 PID 2712 wrote to memory of 2904 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 173 PID 2712 wrote to memory of 2904 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 173 PID 2712 wrote to memory of 3432 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 174 PID 2712 wrote to memory of 3432 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 174 PID 2712 wrote to memory of 1180 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 175 PID 2712 wrote to memory of 1180 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 175 PID 2712 wrote to memory of 392 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 176 PID 2712 wrote to memory of 392 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 176 PID 2712 wrote to memory of 4884 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 177 PID 2712 wrote to memory of 4884 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 177 PID 2712 wrote to memory of 4748 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 194 PID 2712 wrote to memory of 4748 2712 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 194 PID 4748 wrote to memory of 6024 4748 cmd.exe 197 PID 4748 wrote to memory of 6024 4748 cmd.exe 197 PID 4748 wrote to memory of 6008 4748 cmd.exe 199 PID 4748 wrote to memory of 6008 4748 cmd.exe 199 PID 6008 wrote to memory of 504 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 216 PID 6008 wrote to memory of 504 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 216 PID 6008 wrote to memory of 1036 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 217 PID 6008 wrote to memory of 1036 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 217 PID 6008 wrote to memory of 4104 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 218 PID 6008 wrote to memory of 4104 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 218 PID 6008 wrote to memory of 5588 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 219 PID 6008 wrote to memory of 5588 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 219 PID 6008 wrote to memory of 5424 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 220 PID 6008 wrote to memory of 5424 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 220 PID 6008 wrote to memory of 3772 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 226 PID 6008 wrote to memory of 3772 6008 5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe 226 PID 3772 wrote to memory of 4156 3772 cmd.exe 228 PID 3772 wrote to memory of 4156 3772 cmd.exe 228 PID 3772 wrote to memory of 5428 3772 cmd.exe 230 PID 3772 wrote to memory of 5428 3772 cmd.exe 230 PID 5428 wrote to memory of 2792 5428 fontdrvhost.exe 231 PID 5428 wrote to memory of 2792 5428 fontdrvhost.exe 231 PID 5428 wrote to memory of 3232 5428 fontdrvhost.exe 232 PID 5428 wrote to memory of 3232 5428 fontdrvhost.exe 232 PID 2792 wrote to memory of 220 2792 WScript.exe 240 PID 2792 wrote to memory of 220 2792 WScript.exe 240 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe"C:\Users\Admin\AppData\Local\Temp\5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe"1⤵
- DcRat
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Recent\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsHolographicDevices\SpatialStore\sysmon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\debug\backgroundTaskHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\es-ES\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\regid.1991-06.com.microsoft\smss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\SoftwareDistribution\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\USOShared\Logs\sihost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\Office16\upfc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Adobe\upfc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Services\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SystemResources\Windows.UI.Search\pris\StartMenuExperienceHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PolicyDefinitions\uk-UA\unsecapp.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\Registry.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PJAVlmCtXs.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:6024
-
-
C:\Users\Admin\AppData\Local\Temp\5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe"C:\Users\Admin\AppData\Local\Temp\5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Documents and Settings\System.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Sun\Java\Deployment\RuntimeBroker.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5424
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qnTAHDxf9x.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:4156
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5428 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7365bbf2-084e-43cf-b129-c9a65169ca05.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Recovery\WindowsRE\fontdrvhost.exeC:\Recovery\WindowsRE\fontdrvhost.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c13ed6fa-4e8e-4f05-9e15-8842084df484.vbs"6⤵PID:3232
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "58VOwininit" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vZSCwininit" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "LjDowininit" /sc ONSTART /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc MINUTE /mo 9 /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "qAqHIdle" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Recent\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Ac39Idle" /sc ONLOGON /tr "'C:\Users\Admin\Recent\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "L1QcIdle" /sc ONSTART /tr "'C:\Users\Admin\Recent\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Recent\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MfU5sysmon" /sc MINUTE /mo 5 /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "GqSLsysmon" /sc ONLOGON /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vcsgsysmon" /sc ONSTART /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc MINUTE /mo 10 /tr "'C:\ProgramData\WindowsHolographicDevices\SpatialStore\sysmon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1UZKbackgroundTaskHost" /sc MINUTE /mo 8 /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SZEtbackgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6JunbackgroundTaskHost" /sc ONSTART /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc MINUTE /mo 6 /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "W4OLIdle" /sc MINUTE /mo 8 /tr "'C:\Program Files\Internet Explorer\es-ES\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "hp5HIdle" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\es-ES\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bP2EIdle" /sc ONSTART /tr "'C:\Program Files\Internet Explorer\es-ES\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc MINUTE /mo 14 /tr "'C:\Program Files\Internet Explorer\es-ES\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Ixm7smss" /sc MINUTE /mo 9 /tr "'C:\ProgramData\regid.1991-06.com.microsoft\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vsdRsmss" /sc ONLOGON /tr "'C:\ProgramData\regid.1991-06.com.microsoft\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "823Ismss" /sc ONSTART /tr "'C:\ProgramData\regid.1991-06.com.microsoft\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc MINUTE /mo 5 /tr "'C:\ProgramData\regid.1991-06.com.microsoft\smss.exe'" /f1⤵
- Process spawned unexpected child process
PID:1372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "aGxwIdle" /sc MINUTE /mo 8 /tr "'C:\ProgramData\SoftwareDistribution\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pvFaIdle" /sc ONLOGON /tr "'C:\ProgramData\SoftwareDistribution\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "P7cIIdle" /sc ONSTART /tr "'C:\ProgramData\SoftwareDistribution\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc MINUTE /mo 7 /tr "'C:\ProgramData\SoftwareDistribution\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "iKt3sihost" /sc MINUTE /mo 10 /tr "'C:\ProgramData\USOShared\Logs\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "XQIisihost" /sc ONLOGON /tr "'C:\ProgramData\USOShared\Logs\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Z9fLsihost" /sc ONSTART /tr "'C:\ProgramData\USOShared\Logs\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc MINUTE /mo 12 /tr "'C:\ProgramData\USOShared\Logs\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Bi3Wupfc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\Office16\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Q3wBupfc" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office16\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "o7gMupfc" /sc ONSTART /tr "'C:\Program Files\Microsoft Office\Office16\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\Office16\upfc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "eTKidllhost" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "yOUldllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wF78dllhost" /sc ONSTART /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "pnw6upfc" /sc MINUTE /mo 9 /tr "'C:\ProgramData\Adobe\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wnJVupfc" /sc ONLOGON /tr "'C:\ProgramData\Adobe\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Np6uupfc" /sc ONSTART /tr "'C:\ProgramData\Adobe\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc MINUTE /mo 10 /tr "'C:\ProgramData\Adobe\upfc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lqt4wininit" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Services\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xeGpwininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Services\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Yg1swininit" /sc ONSTART /tr "'C:\Program Files (x86)\Common Files\Services\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:3236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\Services\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ppEgcsrss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "u8xdcsrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "XuT2csrss" /sc ONSTART /tr "'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sOkUStartMenuExperienceHost" /sc MINUTE /mo 8 /tr "'C:\Windows\SystemResources\Windows.UI.Search\pris\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lGJAStartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemResources\Windows.UI.Search\pris\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MzNtStartMenuExperienceHost" /sc ONSTART /tr "'C:\Windows\SystemResources\Windows.UI.Search\pris\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc MINUTE /mo 5 /tr "'C:\Windows\SystemResources\Windows.UI.Search\pris\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lR1Vunsecapp" /sc MINUTE /mo 11 /tr "'C:\Windows\PolicyDefinitions\uk-UA\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "mYWOunsecapp" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\uk-UA\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "8ZJCunsecapp" /sc ONSTART /tr "'C:\Windows\PolicyDefinitions\uk-UA\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc MINUTE /mo 8 /tr "'C:\Windows\PolicyDefinitions\uk-UA\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "yp4nRegistry" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "2QfvRegistry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "jz2nRegistry" /sc ONSTART /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fxmxfontdrvhost" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TfBffontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:5560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "M2k3fontdrvhost" /sc ONSTART /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xvmFSystem" /sc MINUTE /mo 5 /tr "'C:\Documents and Settings\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:5780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "CGaMSystem" /sc ONLOGON /tr "'C:\Documents and Settings\System.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ydiqSystem" /sc ONSTART /tr "'C:\Documents and Settings\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:5240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc MINUTE /mo 10 /tr "'C:\Documents and Settings\System.exe'" /f1⤵
- DcRat
PID:6108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "FpR4fontdrvhost" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "iDU5fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "b6sUfontdrvhost" /sc ONSTART /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'" /rl HIGHEST /f1⤵PID:5932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\fontdrvhost.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "04UbRuntimeBroker" /sc MINUTE /mo 10 /tr "'C:\Windows\Sun\Java\Deployment\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "niNCRuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Sun\Java\Deployment\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:4212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "xVTORuntimeBroker" /sc ONSTART /tr "'C:\Windows\Sun\Java\Deployment\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:3228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc MINUTE /mo 7 /tr "'C:\Windows\Sun\Java\Deployment\RuntimeBroker.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:5484
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD58a3610882dcd50607fd3fa01d7a27b70
SHA13f3823159964a51f3e55decdbe83abaf79ba9d8a
SHA2565f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781
SHA512faca6c13605606e436ca4c78ce0fd2f8cbafaa5ef72f68aae880ee9528377aff69b58f5e16633ee3cf7bec4f732de86fcebafd1ba1490636d0676f9d0a32a444
-
Filesize
1.5MB
MD5ffaa793566285aa9bc7a3c1a4469f120
SHA1fc338e7d99074702dfda6b68aefa6b72f62af5ab
SHA2560a427324169d35f6bc8b9b229b10692c4618ecc4197553c297597630bf5a3bba
SHA5121641cde0059aa572f63fd3c192ef0e0e99cf7d23010ca98c42de3687c871dcde01dfde7f87ec0e609664abbc4957e6a6cb1340d9a6e46a35af21346bbc2b2196
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\5f5b2304602874306bf4eb32b431d2b6e3ee7862dbc257e50c8f4c3b2f7ea781N.exe.log
Filesize1KB
MD57800fca2323a4130444c572374a030f4
SHA140c9b8e0e5e7d72a5293f4010f2ccf21e637b4aa
SHA25629f5645ac14353ac460858f52c856548f3aeb144b09eef672a6b4849bafe742e
SHA512c8a7ad930b8c07007c7a67d8c32a2a4a401dcc34ab966e0e80901655fcbe1f5c95b72a195e6381b1de56c2c987eeab093d8e89891bec9e9684785c5d824b3554
-
Filesize
1KB
MD53ad9a5252966a3ab5b1b3222424717be
SHA15397522c86c74ddbfb2585b9613c794f4b4c3410
SHA25627525f5fc7871c6828ab5173315e95b5c7e918d2ee532781c562c378584b5249
SHA512b1a745f7a0f33b777ffc34f74f42752144d9f2d06b8bc613e703570494762b3af87e153212c3274b18af14f17b8619e2f350b7c3cc11228f7d4208d4251e90e6
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
Filesize
944B
MD5e448fe0d240184c6597a31d3be2ced58
SHA1372b8d8c19246d3e38cd3ba123cc0f56070f03cd
SHA256c660f0db85a1e7f0f68db19868979bf50bd541531babf77a701e1b1ce5e6a391
SHA5120b7f7eae7700d32b18eee3677cb7f89b46ace717fa7e6b501d6c47d54f15dff7e12b49f5a7d36a6ffe4c16165c7d55162db4f3621db545b6af638035752beab4
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5aaaac7c68d2b7997ed502c26fd9f65c2
SHA17c5a3731300d672bf53c43e2f9e951c745f7fbdf
SHA2568724dc2c3c8e8f17aeefae44a23741b1ea3b43c490fbc52fd61575ffe1cd82bb
SHA512c526febd9430413b48bed976edd9a795793ad1f06c8ff4f6b768b4ad63f4d2f06b9da72d4fcfa7cb9530a64e2dc3554f5ad97fd0ab60129701d175f2724ef1ac
-
Filesize
944B
MD50aa63dbb46d451e47a7a682c64af776d
SHA13b0026f2dae8e9c491ccaa40133755779de35aaa
SHA2569158038718d41172c22a3c1a15852405e3e1c8e2c44fa066328eb1520e5d977b
SHA5124d2564850c2ab1bc71089412f19147df4a1cd3075aa2039aa894271b333cd9c510b7ba4d70889f24d45d8b366d8b5167abdcf24314e4753420337c7d34e7c43f
-
Filesize
944B
MD5a83ce2908066654f712d1858746bc3c4
SHA114887f0537ce076cdc91801fb5fa584b25f1089f
SHA2567c32ae0eaa4fef7404ce708744116ab8ea17d9575bbb3b06eb41a443f963456f
SHA512991b20116815c7db3497d0ede9a216c7b78795e65f898847ffec513692f0c24d146a123725d14a2e1e3efb5744a626dd025a364f2f55f581e21640794a0cc551
-
Filesize
713B
MD5a0d8dc49756cda0de4b7338d9d463263
SHA129322391584791ed6f8bbeb39dd111b8d2a60520
SHA256d45ee2329aa398536521d0a06e357d74f84b61ff6a30819b8b1d1bdfb5617e25
SHA5121f737c3a3cd7c320ec488bc5ae15308e244af15f9a9f495f6b15f393b014f467d8a21dfda09594d212b6552e86b0c6980b4e834da63dff5226824c081fe4da95
-
Filesize
267B
MD584739475e093360694adfb0b33fd3552
SHA1e561af56ca53a7ea42fc19872cca853768cb8ed6
SHA2561e103908ee33b17d349f55c5d3574ad858bb019eeffdaa97a48212c6788b8d2e
SHA512dedd7d4111a8b360c0130d85348b33c2304aa909dfb4b359267d285883ab17ff55e14f01369d4c0951ffc07c7d0856c4fd31f8a0784fd7bc0c13edfea354ed2f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
489B
MD5a96552175629ebb11236bde9255015d1
SHA16de966d82439c32f1c9810a5b4a6ea9fbcae3058
SHA256a9d9e674177c6cf1286b0e222ac9d94530fcac9b36b6fedc6c2dba3f10f3a94d
SHA512c456f2be83ffccabc8e621f0f394132fa353cce35f729447c90c4f3ddb4fc19bc254f1b950db738543771c9e94c8bbffb1a1bc281b53b8feb59c917adf062792
-
Filesize
201B
MD54bfb224e7f10fd056466486f35fc8b05
SHA17428ca1825b3a96f5bf6470dded202d24646cf5f
SHA25600f5b1f16b137dba2fabf86e1e9acf5f9eddd34c5f8bb4de511c16effd86c6fb
SHA512a1cafb062139becdfbb848a1b7421569c63cce3d8a44ccecfbee61a3d7d2fbfc22d1ba43760265aac2b71949d17a86b32f469b198457c23b9adc07464e78ad41