Analysis
-
max time kernel
117s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe
Resource
win7-20240903-en
General
-
Target
690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe
-
Size
4.9MB
-
MD5
005277f6397a0a43ce9eca2c2910b750
-
SHA1
ac5f700488ba1ca531cb528e718412473eb7b948
-
SHA256
690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073
-
SHA512
21c819d180a218e375928e76fca735ee4746d803aca4cae04a5f82f9dcdd97510e1b88e9fb789f57a37ae904e38b40e257b0e03f785dfba8931f85c4b6d29215
-
SSDEEP
49152:rl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2588 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1332 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 840 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 832 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1424 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 400 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2724 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 628 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2848 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 2848 schtasks.exe 30 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe -
resource yara_rule behavioral1/memory/3028-3-0x000000001BAB0000-0x000000001BBDE000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1236 powershell.exe 2388 powershell.exe 2352 powershell.exe 1728 powershell.exe 2260 powershell.exe 1936 powershell.exe 1772 powershell.exe 1740 powershell.exe 2132 powershell.exe 1856 powershell.exe 280 powershell.exe 1992 powershell.exe -
Executes dropped EXE 8 IoCs
pid Process 1416 dwm.exe 2660 dwm.exe 1872 dwm.exe 2788 dwm.exe 1880 dwm.exe 2456 dwm.exe 532 dwm.exe 3060 dwm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\6cb0b6c459d5d3 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\27d1bcfc3c54e0 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\taskhost.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files\Reference Assemblies\RCX1E6F.tmp 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\wininit.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files (x86)\Windows NT\Accessories\it-IT\taskhost.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files (x86)\Windows NT\Accessories\it-IT\b75386f1303e64 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files\Reference Assemblies\lsm.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\System.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files\Reference Assemblies\101b941d020240 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\56085415360792 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files\Reference Assemblies\lsm.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\RCX3524.tmp 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RCX2EAC.tmp 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\RCX3321.tmp 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\wininit.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\System.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\RCX1A68.tmp 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\PLA\services.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Windows\PLA\c5b4cb5e9653cc 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Windows\addins\RCX2073.tmp 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Windows\addins\spoolsv.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Windows\PLA\RCX27C6.tmp 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File opened for modification C:\Windows\PLA\services.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Windows\addins\spoolsv.exe 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe File created C:\Windows\addins\f3b6ecef712a24 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 628 schtasks.exe 2660 schtasks.exe 2588 schtasks.exe 2352 schtasks.exe 2636 schtasks.exe 1988 schtasks.exe 880 schtasks.exe 2884 schtasks.exe 2216 schtasks.exe 2356 schtasks.exe 1424 schtasks.exe 1044 schtasks.exe 2028 schtasks.exe 2480 schtasks.exe 2184 schtasks.exe 1936 schtasks.exe 1652 schtasks.exe 1704 schtasks.exe 1644 schtasks.exe 1332 schtasks.exe 2300 schtasks.exe 2980 schtasks.exe 2584 schtasks.exe 2556 schtasks.exe 832 schtasks.exe 1492 schtasks.exe 2608 schtasks.exe 2896 schtasks.exe 1800 schtasks.exe 2832 schtasks.exe 1076 schtasks.exe 2024 schtasks.exe 400 schtasks.exe 2264 schtasks.exe 2168 schtasks.exe 756 schtasks.exe 1996 schtasks.exe 2764 schtasks.exe 1864 schtasks.exe 840 schtasks.exe 2196 schtasks.exe 2172 schtasks.exe 1816 schtasks.exe 2088 schtasks.exe 2724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 2132 powershell.exe 1740 powershell.exe 1236 powershell.exe 2260 powershell.exe 1772 powershell.exe 1856 powershell.exe 280 powershell.exe 1936 powershell.exe 2388 powershell.exe 2352 powershell.exe 1728 powershell.exe 1992 powershell.exe 1416 dwm.exe 2660 dwm.exe 1872 dwm.exe 2788 dwm.exe 1880 dwm.exe 2456 dwm.exe 532 dwm.exe 3060 dwm.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 1772 powershell.exe Token: SeDebugPrivilege 1856 powershell.exe Token: SeDebugPrivilege 280 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 1416 dwm.exe Token: SeDebugPrivilege 2660 dwm.exe Token: SeDebugPrivilege 1872 dwm.exe Token: SeDebugPrivilege 2788 dwm.exe Token: SeDebugPrivilege 1880 dwm.exe Token: SeDebugPrivilege 2456 dwm.exe Token: SeDebugPrivilege 532 dwm.exe Token: SeDebugPrivilege 3060 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1236 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 78 PID 3028 wrote to memory of 1236 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 78 PID 3028 wrote to memory of 1236 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 78 PID 3028 wrote to memory of 1936 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 79 PID 3028 wrote to memory of 1936 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 79 PID 3028 wrote to memory of 1936 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 79 PID 3028 wrote to memory of 1772 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 80 PID 3028 wrote to memory of 1772 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 80 PID 3028 wrote to memory of 1772 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 80 PID 3028 wrote to memory of 1740 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 81 PID 3028 wrote to memory of 1740 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 81 PID 3028 wrote to memory of 1740 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 81 PID 3028 wrote to memory of 2388 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 82 PID 3028 wrote to memory of 2388 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 82 PID 3028 wrote to memory of 2388 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 82 PID 3028 wrote to memory of 2352 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 83 PID 3028 wrote to memory of 2352 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 83 PID 3028 wrote to memory of 2352 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 83 PID 3028 wrote to memory of 1728 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 84 PID 3028 wrote to memory of 1728 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 84 PID 3028 wrote to memory of 1728 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 84 PID 3028 wrote to memory of 2132 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 85 PID 3028 wrote to memory of 2132 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 85 PID 3028 wrote to memory of 2132 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 85 PID 3028 wrote to memory of 1856 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 86 PID 3028 wrote to memory of 1856 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 86 PID 3028 wrote to memory of 1856 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 86 PID 3028 wrote to memory of 280 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 87 PID 3028 wrote to memory of 280 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 87 PID 3028 wrote to memory of 280 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 87 PID 3028 wrote to memory of 1992 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 88 PID 3028 wrote to memory of 1992 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 88 PID 3028 wrote to memory of 1992 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 88 PID 3028 wrote to memory of 2260 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 90 PID 3028 wrote to memory of 2260 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 90 PID 3028 wrote to memory of 2260 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 90 PID 3028 wrote to memory of 2148 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 102 PID 3028 wrote to memory of 2148 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 102 PID 3028 wrote to memory of 2148 3028 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe 102 PID 2148 wrote to memory of 2608 2148 cmd.exe 104 PID 2148 wrote to memory of 2608 2148 cmd.exe 104 PID 2148 wrote to memory of 2608 2148 cmd.exe 104 PID 2148 wrote to memory of 1416 2148 cmd.exe 105 PID 2148 wrote to memory of 1416 2148 cmd.exe 105 PID 2148 wrote to memory of 1416 2148 cmd.exe 105 PID 1416 wrote to memory of 3048 1416 dwm.exe 106 PID 1416 wrote to memory of 3048 1416 dwm.exe 106 PID 1416 wrote to memory of 3048 1416 dwm.exe 106 PID 1416 wrote to memory of 1620 1416 dwm.exe 107 PID 1416 wrote to memory of 1620 1416 dwm.exe 107 PID 1416 wrote to memory of 1620 1416 dwm.exe 107 PID 3048 wrote to memory of 2660 3048 WScript.exe 108 PID 3048 wrote to memory of 2660 3048 WScript.exe 108 PID 3048 wrote to memory of 2660 3048 WScript.exe 108 PID 2660 wrote to memory of 628 2660 dwm.exe 109 PID 2660 wrote to memory of 628 2660 dwm.exe 109 PID 2660 wrote to memory of 628 2660 dwm.exe 109 PID 2660 wrote to memory of 1788 2660 dwm.exe 110 PID 2660 wrote to memory of 1788 2660 dwm.exe 110 PID 2660 wrote to memory of 1788 2660 dwm.exe 110 PID 628 wrote to memory of 1872 628 WScript.exe 111 PID 628 wrote to memory of 1872 628 WScript.exe 111 PID 628 wrote to memory of 1872 628 WScript.exe 111 PID 1872 wrote to memory of 1092 1872 dwm.exe 112 -
System policy modification 1 TTPs 27 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dwm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe"C:\Users\Admin\AppData\Local\Temp\690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\32C0d90ThP.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2608
-
-
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1416 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d7eba0e8-dd86-486e-87cf-b3576b0dea07.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"5⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2660 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b03f3fa7-1d4b-4b49-8b2c-879ea8015870.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"7⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1872 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a47fd900-accd-4a57-b063-e6322186f84b.vbs"8⤵PID:1092
-
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"9⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2788 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5b4073ca-a6d8-44fb-a23d-b762b101643f.vbs"10⤵PID:1464
-
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"11⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1880 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\20b82c0f-92d6-4bbf-a7e0-5fb99b376ab7.vbs"12⤵PID:2188
-
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"13⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2456 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\807a6fcf-1eb6-4928-90ec-833fce13d9e5.vbs"14⤵PID:3004
-
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"15⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:532 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bbff20ac-63c8-4d2a-818e-d17fe0ec3abe.vbs"16⤵PID:756
-
C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe"17⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3060 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a08fc7b2-2496-4c65-a479-13f60c779ee6.vbs"18⤵PID:1828
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\740019eb-d24b-4767-92d2-52a042c5daf8.vbs"18⤵PID:800
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3cdaf5af-4117-4b63-bbbb-25e00ebcf6ab.vbs"16⤵PID:2388
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f0662445-ac1d-4db5-8eb8-8390d6a2188c.vbs"14⤵PID:2288
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fd876aae-916a-4ab6-8e59-106a1b0c8275.vbs"12⤵PID:552
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eeeb1f93-724d-4bad-8c84-9776a6894a7c.vbs"10⤵PID:2896
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\be18739a-8487-4551-82d9-023b694b051f.vbs"8⤵PID:2968
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2f8ea8dd-0d1b-41d2-bd61-09a9e5e8ef28.vbs"6⤵PID:1788
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\df2f7edb-2f4f-4933-bdd4-7bdd35cde543.vbs"4⤵PID:1620
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\it-IT\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\it-IT\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\Accessories\it-IT\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Program Files\Reference Assemblies\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Program Files\Reference Assemblies\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Windows\addins\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\addins\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\addins\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Videos\Sample Videos\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Public\Videos\Sample Videos\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Videos\Sample Videos\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Desktop\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default\Desktop\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Desktop\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Windows\PLA\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\PLA\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Windows\PLA\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\PrintHood\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\PrintHood\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Desktop\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Desktop\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N6" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N" /sc ONLOGON /tr "'C:\Users\Default User\690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N6" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\plugins\d3d11\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Office\Stationery\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Stationery\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Office\Stationery\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1076
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5bb74010b8bd89fce70a6ca6391baf78b
SHA11aabc2e97b9e2c4f4c3a7b556af29ba3f3b9f191
SHA256bc2d04d68da9856587c9fd7454022371eb9ddec358b55890faa3977fa91c0c05
SHA512885dc615aad766cc26aa4fc23c06d76d10e4053bce5529e62fed89c5e072faa159b68b2fc9c64d7e11647e1ed7c1a6c5c4780226725a1dc6f6a77a4fba126bee
-
Filesize
4.9MB
MD5005277f6397a0a43ce9eca2c2910b750
SHA1ac5f700488ba1ca531cb528e718412473eb7b948
SHA256690aa6b50c9b49879ee982069ca5dddb52d11256ed82b3bd011d34926a49b073
SHA51221c819d180a218e375928e76fca735ee4746d803aca4cae04a5f82f9dcdd97510e1b88e9fb789f57a37ae904e38b40e257b0e03f785dfba8931f85c4b6d29215
-
Filesize
727B
MD5a19e2fe9227026c5be75d12e5a104dcc
SHA18698427071393f4a1072a671f432224392c83885
SHA256c1c508af04cf90bcf8aae793390cc7a84ee05596a26989c3cbfc3beb619ca5c0
SHA512fbfefd208d4f583d3a9a2800c405a905a4eb6b560b957a28df71b13e63c48f338f8799aa8030b2bd62b2b2356a61a164ae6fb0c7977a9ad4fb747661466a7715
-
Filesize
216B
MD510ed2e0a2e639d2540e4c92c00799db4
SHA1dd48b8e5c727514e3ca694e273c0389efcbc7b4a
SHA256ec950c7b527e389beacd27c6a1d09f72f7aab005c56d4c4bd06db0710d1b9532
SHA51261b74a7f453a841ac75aeaa1501c02e62928b954d28b024388c089d79a7c7c89cb7ace02ea286f3d85ece7fffd49bef6840655e62614222d25000b74cbd219bd
-
Filesize
727B
MD58266d962f1a3fac2368715626a7c5018
SHA175580cc38d7733a51954ae6c081d0341afbef6a5
SHA2566caea687ce437f8e717f46224ffe5b48388a780f5b285fb48dea15294d071ef2
SHA5122af8d8ae958137b0f2c2becc4c25c9e7e270b996be8cd486a923a438e506aeb939466112d7a972a8aca95e6a3463f303963a421566a0da99c610ff40b1ddce85
-
Filesize
727B
MD5d150c30779246f194335afbbd50f1918
SHA1990087b1f33ddb16dd72d72ab64274847effd07b
SHA25685bc4a9b2e37525eda08a28f66122b5f925b656ac2b86246ae234ce6eac9e8d8
SHA51259ab550481fa9a8c2af43630a742d647ca7acf90e4495079e971595c59c070dce1a4df3fecb640f59bff99562c9ca612f089a0a389a65f823d0f0154be206511
-
Filesize
727B
MD59276771309e41d33f940f8dad523e283
SHA139c1861400fdab03d5d0af3ef2fb6e35ac9cec10
SHA256f51bceab4bbadfd8f968eb3b763c95c0b692432fdf7e0268c77557c4c54bc303
SHA5120cd4153b16fe6a7f010101ed202cd18af2023adb2c2b36bd8d786812efd6d038259e2dc0afa56626b1467ac00b2644f9d067ff72ace253c43fb1fe4c3f17a6f6
-
Filesize
727B
MD5e211e6e8cbb0dc011690f37b5425a383
SHA1b3f3f2200255a0e8604036d2cb6ee886b362620c
SHA256f19b4acd5069b36c22362798283477b4dd643cd9fb6b2cddb82b63a7106e1802
SHA51256831339bee34270d9b3de0c7258e469d27d7913b0a00e9e962e4b657d16ca38bfa4c7e462a188914ce7439cab50afc87393149a12a83b6ced717f2ed520e3fd
-
Filesize
727B
MD5a89fea7d94db604338e7b2c410830d31
SHA17b3dc59af4993c8870e32ab8621ce567f6380a3a
SHA256aa341fb6cd269db123a7e3b41b6ae719d39acb318879c5d5b66455f35e3ded67
SHA512041e8a2e66627f5e365990b1a293d46b80db8889278b3ead44c6c1c27d7b910b9080eadee734e3311f0b4dab225bb955ea75f64e40e17d220877c160a4125aa7
-
Filesize
726B
MD55d5bae9aed82b9b99ef6709d4db4f530
SHA19855944183d831f233ce1dd970e5cc9bdec27161
SHA256115f2239026c4845994ed4bb9fad6342ecce71d4bb02bb9a0f4a465ff4386348
SHA5122031672c58adebe98761d46da82448f74cc62a17990d1f3245f4cbb420ae92c5f4b594b5b48f9e03039c5858437130ad3dec6e4e39ca9f4d35cec9d68ec36ad5
-
Filesize
727B
MD572e7d54734bb5bfcdc898f4639e84495
SHA183e6de4f9b92085fc33867fe4dcedc950a8d2187
SHA256c7bcb63adf225c1854181de6ba46e20f02d0de891dc65795c2c16933e3db457a
SHA512460e3ccc82db8feb111ca32e7c434f5ff733d5f777c070f3bd50b5a537abf9b348295e3f428faa682a5d05935bc90fe114330d9c62deba194139c8597ddf7a53
-
Filesize
503B
MD59261456f7340dd96e488078d2250e197
SHA1ed8575b257420ef1f26438699fba4120d0fd2000
SHA256d677c4e80dbc673fea817b5f7d2d04d80dd793b33879e196ee5b1edfe112e56b
SHA512689570c50874d18aab1c38df6664602936d2748f511b40cd72feed06ab87a764abfb5aaa75dcd58456a13059e040dce977f4371355fa7dd4eb2e619342a6bbc3
-
Filesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cf21a0fe3ece240144a77dd5556b7ff8
SHA118e86fd4cdad6d7b757f1fb6bcba23dedb9e74fa
SHA256a96f2c3055b3cd356863b83d94f7e1eda7d4ad2b8d20f5f7c3b2fa255b21a3db
SHA512d36ded6ff0e0f4fd280166fbc8120c8fdc7af0eb3033f3e0abe849b92329e9ed36608022b168c49e43a7cfe7a57c76a9bda55cdd7345c653ebba0b60afe7e0b1