Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 09:00

General

  • Target

    d0cf3fa264692d7506b8bc0218f35aa8d1f061826119bfc3df8243ba8fcb776dN.exe

  • Size

    1.3MB

  • MD5

    b3de9c174771b39d49d63af31c8c24c0

  • SHA1

    8d673fa53f1bc4c89434a20a2af6d6a873d82c19

  • SHA256

    d0cf3fa264692d7506b8bc0218f35aa8d1f061826119bfc3df8243ba8fcb776d

  • SHA512

    e3e78aae4253d160086d6175ba6929354c8593f42fdfc26f9b1962f94d21c2710926526983753153e6748d41c02bf669c8e31addf3717bc06f87b3ae8da7300e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 33 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 11 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0cf3fa264692d7506b8bc0218f35aa8d1f061826119bfc3df8243ba8fcb776dN.exe
    "C:\Users\Admin\AppData\Local\Temp\d0cf3fa264692d7506b8bc0218f35aa8d1f061826119bfc3df8243ba8fcb776dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2284
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1316
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1620
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\conhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1052
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SoftwareDistribution\SelfUpdate\Handler\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:612
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:936
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1388
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1144
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\spoolsv.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1560
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\SIGNUP\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2580
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Templates\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1768
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\System\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1728
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1872
          • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
            "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1404
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Nc51i3GWIc.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:552
                • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                  "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2644
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Mv8e4zbUuN.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1340
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:1660
                      • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                        "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1776
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\n9GQh003RW.bat"
                          10⤵
                            PID:1160
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              11⤵
                                PID:2332
                              • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                11⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3036
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OVj8bjUD5N.bat"
                                  12⤵
                                    PID:2600
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      13⤵
                                        PID:2388
                                      • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                        "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                        13⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1544
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat"
                                          14⤵
                                            PID:2928
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              15⤵
                                                PID:1652
                                              • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                                "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                                15⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1592
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\z7AIE64VZ5.bat"
                                                  16⤵
                                                    PID:1060
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      17⤵
                                                        PID:1088
                                                      • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                                        "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                                        17⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:936
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Z7DRyUOV59.bat"
                                                          18⤵
                                                            PID:2688
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              19⤵
                                                                PID:2160
                                                              • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                                                "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                                                19⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2684
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xjNnGM38uG.bat"
                                                                  20⤵
                                                                    PID:2892
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      21⤵
                                                                        PID:1212
                                                                      • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                                                        "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                                                        21⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2664
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ay5NT8uJA6.bat"
                                                                          22⤵
                                                                            PID:1236
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              23⤵
                                                                                PID:1944
                                                                              • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                                                                "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                                                                23⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:864
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Gy1gqmGK9f.bat"
                                                                                  24⤵
                                                                                    PID:2932
                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      25⤵
                                                                                        PID:3000
                                                                                      • C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe
                                                                                        "C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe"
                                                                                        25⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:2972
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\providercommon\dllhost.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2796
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2892
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2900
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\conhost.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2768
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Admin\AppData\conhost.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2596
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\conhost.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2616
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\SoftwareDistribution\SelfUpdate\Handler\System.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2332
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\SelfUpdate\Handler\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2880
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Windows\SoftwareDistribution\SelfUpdate\Handler\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3056
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1480
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1740
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3060
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:776
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1648
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\lsass.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2584
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Java\winlogon.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2940
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Java\winlogon.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1788
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Java\winlogon.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2912
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\spoolsv.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:596
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\spoolsv.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2040
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\spoolsv.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2032
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\System.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1756
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2088
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Internet Explorer\SIGNUP\System.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2288
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Templates\smss.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1664
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default\Templates\smss.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1676
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Templates\smss.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1280
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Windows\PLA\System\lsm.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2152
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\PLA\System\lsm.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2112
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Windows\PLA\System\lsm.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:840
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2264
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2988
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\TableTextService\de-DE\smss.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1536

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        b680b384b14d3acce5bb727b6b8a67c6

                                        SHA1

                                        bc77940daa567ccc8e7c7168a9e9d6bf68b804bb

                                        SHA256

                                        2e627560a5606c3d55edc7b415e4202c6ddc0029d5117a9e3c45d7fad83121f3

                                        SHA512

                                        99e864cca8217adc0730f79bb05adb477b6a6c1f051572953a74e4729c2a79df777f813e852a323c9986d1d712170e23113945996f89f11c5a1de97e4a73a4c7

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        e51d3a07152696b8e311b285505efc4d

                                        SHA1

                                        f5a813ad9f2d904bd8491cc2f9e161060cd71709

                                        SHA256

                                        4b77c01609bfda45716e065e66a071fdc5137d38708a4b6b6ef6537d3b3fa825

                                        SHA512

                                        5bcec892f785cc2e2bd880185e7fd272422977baac1e2a2b9301145da289009b918ae58980cd9179bf0304f128385574994ae896e4a16fb76a23fca6b385baf9

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        5e01fe7403db00caa9cb3673f6c3f3ed

                                        SHA1

                                        14643ef8af126f2ec72c4df8c4a8ef7121c5fdc8

                                        SHA256

                                        ed75cca170e5b6c16243a9dc445111582e74d901627fc2e4446f8f869ce479b2

                                        SHA512

                                        7a32cf89f5b96154204370d8baa83634a880e4d913c477976f100c86998b5774278092b0d48f5d02ec61c9b9873b52968b82c06a102260889d3ef3ba173aef86

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        14637c49cae31d3876719a83af337418

                                        SHA1

                                        bf937227a0b2ddf3c392ae88d4303333bf30a1ac

                                        SHA256

                                        f410768c77bb70583ece77c5cf13e34dcebe29d669bce9b44fbc1341411eee77

                                        SHA512

                                        5adb628c075a0d909260441203450fd0418f8ba7af5e78070dce52c18707d45caa670868073b06dea2b7fd5cef312578b8bb3b1b4e0657d5ded14e265e66497a

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        e1e90211bf077af74178d3d9344e5cd8

                                        SHA1

                                        e37ad9b21574b755465191f1513ee27e95bd7f4e

                                        SHA256

                                        fad8d9b633b75b0eb08a760cb1a11a59bc2d20888e5e33845b11269514057252

                                        SHA512

                                        5627b3d4e040cfdb3c702b1e4bf2bf8004bc99e31ae8d662937ce28c0c420f5cdbeb4b10fef6bd9ff6aa4e5e222fe63b18e01561231765e45f831b27892f425b

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        2a652a5581d10f9453601897e411333c

                                        SHA1

                                        c66d74cf01c747d4d16932e6777b106ad887c867

                                        SHA256

                                        fab287ae2a9b6172a5393505b53ff598e2f868e2c2c98c2a6a0463976f4e54da

                                        SHA512

                                        b4c910e2b13320d18e9512df142734054fe4805c6d3f16708fc48e5ce5d7f3ed893c9184b95b6d80afc75096d3bb53343fa96058d0e01256e42b2358ffb92cd0

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        b4bd3ba92f2e55e81a70d0fd2dd99e12

                                        SHA1

                                        b41c4c36d2adcc4f50087246dd6b0878a99110ca

                                        SHA256

                                        474a833bf9f1ba3649d01cbc2e7f0cb3ca1590de7ac97370c543be4538ab347a

                                        SHA512

                                        1986b11a24f5eed93222c79b765e446aced31cfbf2d8a413460f0479c347a8f61ed9929aa3238f4065e6a6458f8afb11ae0de653d5f53a8a6d1e2dcee7c2d211

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        146fe49e4454927c7e823c6a334fb228

                                        SHA1

                                        fdb379654d6f82fab6e7f7bdf405dd79c3779365

                                        SHA256

                                        2944a854a5049a0d0cea69d7a76e003f4cad2fbe6f225ea9bce0ef60c2574817

                                        SHA512

                                        33442609c355cec4e7cfdc54598b782dd47595235d0d493f112bdd90291a7221e20a2d58c224916d10a42e7d395f1745d632b47629698198b0af8fb43225d819

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        342B

                                        MD5

                                        4e4b7e36aa93962c16188c2d69e414a5

                                        SHA1

                                        da6b97a2db510e1ff24eaaf225366845172b83ed

                                        SHA256

                                        ee6a5be18809c1c3e968e0750518beffb440ebab1e88f8c0924a9d1480fad22e

                                        SHA512

                                        c2ed6eda97db319fd1805f11c307986b8791e70a38736ec9d3be1d8da1c446ab668981d0480787e2763f688d565f9ce2197838b2f1c6922aa84fb6160311c29d

                                      • C:\Users\Admin\AppData\Local\Temp\CabE449.tmp

                                        Filesize

                                        70KB

                                        MD5

                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                        SHA1

                                        1723be06719828dda65ad804298d0431f6aff976

                                        SHA256

                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                        SHA512

                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                      • C:\Users\Admin\AppData\Local\Temp\Gy1gqmGK9f.bat

                                        Filesize

                                        224B

                                        MD5

                                        f89f389b9ab86d35a08080ff396ced42

                                        SHA1

                                        0afcf3f33c049228e5a512dbe00a157b1cd2db07

                                        SHA256

                                        524b772c1de8d894c4d21e393a1940f19a339ca57ccc33fc0dd1c2dc74d65424

                                        SHA512

                                        988717dde3534d44667f7c21707caa5b774ef3d32fdd054ad00b08c4f9855729d0a7eccab7a8719ea9dea32dd68f2c111f65fe252f07668ee617503668ab62f9

                                      • C:\Users\Admin\AppData\Local\Temp\Mv8e4zbUuN.bat

                                        Filesize

                                        224B

                                        MD5

                                        d7718db2f90bb8de3701be955473cd3a

                                        SHA1

                                        6209bbae495cc76703ba4f20e15f74f09ce61db2

                                        SHA256

                                        34baf01bf136716966bf2f734579e0732d5121f42ea97d947806ea42523bd5ee

                                        SHA512

                                        d815e58116d879e42701a287037c07f2d2b95560125fce89bb52e14ea0230315ad0739da507a673dabcf5412301bc5b4cc66c0022e220fe09c960b522763f596

                                      • C:\Users\Admin\AppData\Local\Temp\Nc51i3GWIc.bat

                                        Filesize

                                        224B

                                        MD5

                                        14770dfe3f4badb5e7f53de8a4a55a1d

                                        SHA1

                                        887bc3a17b2342dd7cb4b9da536ade723e165fdc

                                        SHA256

                                        bbe0edfe82b8a4a8dfe5608ccff377667ec6462d507ac3412e8c4d9aaf1a59ef

                                        SHA512

                                        03b45ea4426abbdad9b9fe039a4aa27031062bb10088c1e52628acf5e048cd5679dbe896217339e88f731628edad07453c84987a57188238ee9eb27f7f366671

                                      • C:\Users\Admin\AppData\Local\Temp\OVj8bjUD5N.bat

                                        Filesize

                                        224B

                                        MD5

                                        620024bef8e39cc9e5a515cb620de72e

                                        SHA1

                                        591668067bce6058874c02f500451d24dd4e20c0

                                        SHA256

                                        b29d15b34a033e857ba9618f21988f29e58f350f02c9d70d49003bc0836bf783

                                        SHA512

                                        a9496fa1b88696d4463ddb78d380fd6a49a6877fed2b0bfbbd80b83cfdf9c3eaf81921cb9bbaf129684c3fa33f3cef09eca031e1ee4dae4fcb3aebdb5edfd51f

                                      • C:\Users\Admin\AppData\Local\Temp\TarE46B.tmp

                                        Filesize

                                        181KB

                                        MD5

                                        4ea6026cf93ec6338144661bf1202cd1

                                        SHA1

                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                        SHA256

                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                        SHA512

                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                      • C:\Users\Admin\AppData\Local\Temp\Z7DRyUOV59.bat

                                        Filesize

                                        224B

                                        MD5

                                        4751339a9dcd122e4b0f09bf19e4f038

                                        SHA1

                                        7dc87f279cf437f529f7a70042752e0e4a944af2

                                        SHA256

                                        1aba6f1f7225cdf8d001821546168df892dd82bd4f8acb79000bfff0b739a1fa

                                        SHA512

                                        8e4ed63c337a273935e87af634e1324c151a0b00d8f8ecbf1bbc3550652b0661052a120abcf21455fd5658fd5f880bb90d06e8106a1e44c76e925d0395e90d1d

                                      • C:\Users\Admin\AppData\Local\Temp\ay5NT8uJA6.bat

                                        Filesize

                                        224B

                                        MD5

                                        fae7dbbf06780457adcdd89d4b33ee71

                                        SHA1

                                        0bd6ab02b1bdd550afb7473f9136919c16f37047

                                        SHA256

                                        2e63beb7221f5f1db388ebcf066de5e9dce3e9ba88a9465e3cc541b8f76cc4be

                                        SHA512

                                        ad5ef77bdebdd3b92a2d55823716f34c0a7af0fdeef5a5a6ca9f9b339446619aec6ae38bd2cc925d2a11d35274412b6af98c898fe989449c4665d070ac846906

                                      • C:\Users\Admin\AppData\Local\Temp\n9GQh003RW.bat

                                        Filesize

                                        224B

                                        MD5

                                        5e8101dea1b0bf92ba12b04101e78643

                                        SHA1

                                        c7ccf7fa4aac19017a69f1db087bf1961fc48371

                                        SHA256

                                        788f8a94af377f7cf37feaabb0c2dd982994123ab133c37cba26a2ac964195e7

                                        SHA512

                                        05d82f7819fe4a5240cd679b3fa4f9bcbca47cdd46fe1711add4b2619db3df334dca66d4b2bef1cd2b81a99801c91ed352874da2b17181d14e49e75ecea294d2

                                      • C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat

                                        Filesize

                                        224B

                                        MD5

                                        97543761a52f642aa6ff7794eaeae9dc

                                        SHA1

                                        5abb9927f33c2c863d1c40668f0f4fd1beffed02

                                        SHA256

                                        ac3523a2b292381ac193106e527b78b018d9645d7329fd5893f7440f4ba0225a

                                        SHA512

                                        8456257cc73eb0cb338cb103f386d2187de6791598bdfa45d29ed1f9f2be5219d4294ddca9babb469a04ee52b53b26d7603639d8fac239362976c968face5078

                                      • C:\Users\Admin\AppData\Local\Temp\xjNnGM38uG.bat

                                        Filesize

                                        224B

                                        MD5

                                        0a7e6979631fee794a3cf7f0f88f8d23

                                        SHA1

                                        4bc9284df399fb35dbc8b4f2c1dc74e45482ed6b

                                        SHA256

                                        539a15a0d5a9ff5d7e09b75a8dc0315b19581290e3ef50288fdcd919b676cd2d

                                        SHA512

                                        8c81564d9b677690d8f1301414ccd4b6f03a6bb4828eaf9e6f23db2c4ed918019844da699af8d2175c0f34c461ae069644c51d54b613d2805593bbf237b21129

                                      • C:\Users\Admin\AppData\Local\Temp\z7AIE64VZ5.bat

                                        Filesize

                                        224B

                                        MD5

                                        be45ae28797006632350de9348d1bf30

                                        SHA1

                                        6331ddf0fb56459b5744c0eff8ecb8cd2eb5d2f2

                                        SHA256

                                        f6dcc2084b10d7c139116d40776b1b952593da816630effc25a90afd6e17dae4

                                        SHA512

                                        f741e1ebd0f5497283d46d4c3801b67b9af7a89a3f2f735f3d26e20cca372c8f35ed33043e07799ae730b9bfbf49a8ec7b0542c72409693a2caf0f734b82b601

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XSZO95GY44MQFKW63Q5R.temp

                                        Filesize

                                        7KB

                                        MD5

                                        216e3da8282c0fd646b0dd42c1c9ff5c

                                        SHA1

                                        8bf61b396c497ca95fce2734c6a7e963ab10b884

                                        SHA256

                                        b0fda71bb3123bc641c4f54b0099015181423c3004a55ad20f2f15502dcffb3b

                                        SHA512

                                        25ba8891499be47dfcbcc53a926d0c9601a533d9f5e92b0cb0400484fb7ebce70d30b2eb5d476b829545299aae7b9859434062ae1df4d968d639103080b60d29

                                      • C:\providercommon\1zu9dW.bat

                                        Filesize

                                        36B

                                        MD5

                                        6783c3ee07c7d151ceac57f1f9c8bed7

                                        SHA1

                                        17468f98f95bf504cc1f83c49e49a78526b3ea03

                                        SHA256

                                        8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                        SHA512

                                        c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                      • C:\providercommon\DllCommonsvc.exe

                                        Filesize

                                        1.0MB

                                        MD5

                                        bd31e94b4143c4ce49c17d3af46bcad0

                                        SHA1

                                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                        SHA256

                                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                        SHA512

                                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                      • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                        Filesize

                                        197B

                                        MD5

                                        8088241160261560a02c84025d107592

                                        SHA1

                                        083121f7027557570994c9fc211df61730455bb5

                                        SHA256

                                        2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                        SHA512

                                        20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                      • memory/936-463-0x0000000001180000-0x0000000001290000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1404-46-0x0000000000EB0000-0x0000000000FC0000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1544-344-0x0000000001140000-0x0000000001250000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1620-58-0x0000000001F60000-0x0000000001F68000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1620-52-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/1776-224-0x00000000002A0000-0x00000000003B0000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2284-17-0x0000000000680000-0x000000000068C000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2284-15-0x0000000000670000-0x000000000067C000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2284-16-0x0000000000550000-0x000000000055C000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2284-14-0x0000000000540000-0x0000000000552000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2284-13-0x0000000000860000-0x0000000000970000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2644-164-0x0000000000130000-0x0000000000240000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2664-583-0x0000000001200000-0x0000000001310000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2684-523-0x0000000000360000-0x0000000000470000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2972-702-0x0000000001350000-0x0000000001460000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2972-703-0x0000000000510000-0x0000000000522000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/3036-284-0x0000000000B70000-0x0000000000C80000-memory.dmp

                                        Filesize

                                        1.1MB