Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 03:04
Behavioral task
behavioral1
Sample
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe
Resource
win10v2004-20241007-en
General
-
Target
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe
-
Size
1.0MB
-
MD5
5e45962bd393c13522e7c9311b6e86a0
-
SHA1
1ae02d2752979c4800ccd9c5a1c99c5a084211c8
-
SHA256
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15
-
SHA512
20fa7439c5eb76b91fa999f3f49e1d690bb66ded1d9400b781c39ba6558108a6563f9ad42d94e9ca02f9d979c427169e349fdc120eb85228b243eb73086714b7
-
SSDEEP
12288:kvOGN+Wr70uGCeYo5kuMri42BC26ms+Y9/Jdh3rUfSdJm/TJ8D/Xq7qLmKMa2:6+C700o5kuYswd7uSd4TaD/Xq3K/2
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3708 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3824 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4268 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3156 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4300 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1208 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4044 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3548 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 3052 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4336 3052 schtasks.exe 85 -
Processes:
winlogon.exe7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/3100-1-0x00000000009C0000-0x0000000000AC8000-memory.dmp dcrat behavioral2/files/0x000a000000023b75-15.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe -
Executes dropped EXE 1 IoCs
Processes:
winlogon.exepid Process 1016 winlogon.exe -
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exewinlogon.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Drops file in Program Files directory 6 IoCs
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exedescription ioc Process File created C:\Program Files\Windows Sidebar\backgroundTaskHost.exe 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe File created C:\Program Files\Windows Sidebar\eddb19405b7ce1 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe File created C:\Program Files (x86)\MSBuild\csrss.exe 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe File created C:\Program Files (x86)\MSBuild\886983d96e3d3e 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\fontdrvhost.exe 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\5b884080fd4f94 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe -
Drops file in Windows directory 2 IoCs
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exedescription ioc Process File created C:\Windows\DiagTrack\Settings\dllhost.exe 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe File created C:\Windows\DiagTrack\Settings\5940a34987c991 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 3824 schtasks.exe 4044 schtasks.exe 2208 schtasks.exe 2432 schtasks.exe 3156 schtasks.exe 4300 schtasks.exe 1208 schtasks.exe 3460 schtasks.exe 4268 schtasks.exe 3024 schtasks.exe 4252 schtasks.exe 5012 schtasks.exe 4336 schtasks.exe 1556 schtasks.exe 3708 schtasks.exe 928 schtasks.exe 1452 schtasks.exe 2640 schtasks.exe 2420 schtasks.exe 2512 schtasks.exe 3152 schtasks.exe 4292 schtasks.exe 1608 schtasks.exe 4896 schtasks.exe 1584 schtasks.exe 1932 schtasks.exe 3548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exewinlogon.exepid Process 3100 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe 3100 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe 3100 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe 3100 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe 1016 winlogon.exe 1016 winlogon.exe 1016 winlogon.exe 1016 winlogon.exe 1016 winlogon.exe 1016 winlogon.exe 1016 winlogon.exe 1016 winlogon.exe 1016 winlogon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
winlogon.exepid Process 1016 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exewinlogon.exedescription pid Process Token: SeDebugPrivilege 3100 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Token: SeDebugPrivilege 1016 winlogon.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.execmd.exedescription pid Process procid_target PID 3100 wrote to memory of 4084 3100 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe 113 PID 3100 wrote to memory of 4084 3100 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe 113 PID 4084 wrote to memory of 3300 4084 cmd.exe 115 PID 4084 wrote to memory of 3300 4084 cmd.exe 115 PID 4084 wrote to memory of 1016 4084 cmd.exe 124 PID 4084 wrote to memory of 1016 4084 cmd.exe 124 -
System policy modification 1 TTPs 6 IoCs
Processes:
7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exewinlogon.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe"C:\Users\Admin\AppData\Local\Temp\7b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kApsNJ3G3i.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3300
-
-
C:\Recovery\WindowsRE\winlogon.exe"C:\Recovery\WindowsRE\winlogon.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1016
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Sidebar\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Templates\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Users\All Users\Templates\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Templates\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\MSBuild\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\DiagTrack\Settings\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\DiagTrack\Settings\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\DiagTrack\Settings\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4336
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55e45962bd393c13522e7c9311b6e86a0
SHA11ae02d2752979c4800ccd9c5a1c99c5a084211c8
SHA2567b9ddd730758e941e2fb8284386135a2d507d424a7021490c9227d79d36e9f15
SHA51220fa7439c5eb76b91fa999f3f49e1d690bb66ded1d9400b781c39ba6558108a6563f9ad42d94e9ca02f9d979c427169e349fdc120eb85228b243eb73086714b7
-
Filesize
199B
MD5c47d36acdb2b87118e0fcb227047ca3b
SHA17db6666d4b15c86632d14b7bcf5b426be9b0e624
SHA256bc9694ac7c7a632bfe167694279036a7b7cc48dc059544de765ca6a20a558b17
SHA5124f0d5f9cb6cbacfb1c6a413e3eab321de7aec90ce4ff43c4f5b5a54e6a8c1211f4bd2113826c91ccc47d7925c8d1fad0f2cb68610159a8afe1a9a7d5c309dfbd