Analysis Overview
SHA256
ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0
Threat Level: Known bad
The file ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe was found to be: Known bad.
Malicious Activity Summary
DcRat
DCRat payload
Process spawned unexpected child process
Dcrat family
Modifies WinLogon for persistence
DCRat payload
Executes dropped EXE
Checks computer location settings
Adds Run key to start application
Drops file in System32 directory
Drops file in Windows directory
Drops file in Program Files directory
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Uses Task Scheduler COM API
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-13 02:46
Signatures
DCRat payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Dcrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-13 02:46
Reported
2024-11-13 02:49
Platform
win7-20241010-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
DcRat
Dcrat family
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\", \"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\", \"C:\\Program Files (x86)\\Google\\Update\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\", \"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\", \"C:\\Program Files (x86)\\Google\\Update\\csrss.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\OSPPSVC.exe\", \"C:\\Windows\\inf\\ServiceModelEndpoint 3.0.0.0\\0000\\smss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\", \"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\", \"C:\\Program Files (x86)\\Google\\Update\\csrss.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\OSPPSVC.exe\", \"C:\\Windows\\inf\\ServiceModelEndpoint 3.0.0.0\\0000\\smss.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\spoolsv.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\", \"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\", \"C:\\Program Files (x86)\\Google\\Update\\csrss.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\OSPPSVC.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\", \"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\", \"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\sppsvc.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\", \"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\", \"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\", \"C:\\Windows\\System32\\0C0A\\dllhost.exe\", \"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\", \"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\", \"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\", \"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\", \"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\", \"C:\\Program Files (x86)\\Google\\Update\\csrss.exe\", \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\OSPPSVC.exe\", \"C:\\Windows\\inf\\ServiceModelEndpoint 3.0.0.0\\0000\\smss.exe\", \"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\spoolsv.exe\", \"C:\\Program Files\\Common Files\\Microsoft Shared\\OFFICE14\\Cultures\\dwm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
DCRat payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\inf\\ServiceModelEndpoint 3.0.0.0\\0000\\smss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Google\\Update\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\OSPPSVC.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\spoolsv.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\Vss\\Writers\\System\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\spoolsv.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\OFFICE14\\Cultures\\dwm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Program Files (x86)\\Microsoft Office\\Document Themes 14\\Theme Fonts\\System.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0 = "\"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\OFFICE14\\Cultures\\dwm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\Microsoft Games\\Mahjong\\es-ES\\audiodg.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0 = "\"C:\\Program Files\\Windows NT\\Accessories\\en-US\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Google\\Update\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default User\\sppsvc.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Public\\Pictures\\Sample Pictures\\lsass.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\0C0A\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\0C0A\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\MSOCache\\All Users\\{90140000-001B-0409-0000-0000000FF1CE}-C\\services.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Program Files (x86)\\Google\\Temp\\lsm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\OSPPSVC.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Users\\All Users\\Microsoft Help\\OSPPSVC.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\smss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\inf\\ServiceModelEndpoint 3.0.0.0\\0000\\smss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\f6a14ac2-8725-11ef-a9ab-dab21757c799\\winlogon.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default User\\sppsvc.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\System32\0C0A\dllhost.exe | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| File created | C:\Windows\System32\0C0A\5940a34987c991 | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
Drops file in Program Files directory
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Vss\Writers\System\dllhost.exe | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| File created | C:\Windows\Vss\Writers\System\5940a34987c991 | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| File created | C:\Windows\inf\ServiceModelEndpoint 3.0.0.0\0000\smss.exe | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| File created | C:\Windows\inf\ServiceModelEndpoint 3.0.0.0\0000\69ddcba757bf72 | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2932 wrote to memory of 1544 | N/A | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe |
| PID 2932 wrote to memory of 1544 | N/A | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe |
| PID 2932 wrote to memory of 1544 | N/A | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe
"C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe"
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\sppsvc.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\dllhost.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Pictures\Sample Pictures\lsass.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\Pictures\Sample Pictures\lsass.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Pictures\Sample Pictures\lsass.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\System32\0C0A\dllhost.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\0C0A\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\System32\0C0A\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\winlogon.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Temp\lsm.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\lsm.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Temp\lsm.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft Help\OSPPSVC.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\OSPPSVC.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Microsoft Help\OSPPSVC.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\smss.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\smss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\smss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Games\Mahjong\es-ES\audiodg.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\Mahjong\es-ES\audiodg.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Games\Mahjong\es-ES\audiodg.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Windows\Vss\Writers\System\dllhost.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\System\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Windows\Vss\Writers\System\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0a" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows NT\Accessories\en-US\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0a" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows NT\Accessories\en-US\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Update\csrss.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\csrss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\Update\csrss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\OSPPSVC.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\OSPPSVC.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\OSPPSVC.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Windows\inf\ServiceModelEndpoint 3.0.0.0\0000\smss.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\inf\ServiceModelEndpoint 3.0.0.0\0000\smss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Windows\inf\ServiceModelEndpoint 3.0.0.0\0000\smss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\dwm.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\dwm.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\dwm.exe'" /rl HIGHEST /f
C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe
"C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | a1038934.xsph.ru | udp |
| RU | 141.8.197.42:80 | a1038934.xsph.ru | tcp |
| RU | 141.8.197.42:80 | a1038934.xsph.ru | tcp |
Files
memory/1544-52-0x0000000000450000-0x0000000000462000-memory.dmp
memory/2932-51-0x000007FEF6170000-0x000007FEF6B5C000-memory.dmp
memory/1544-50-0x0000000001330000-0x000000000145E000-memory.dmp
C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\System.exe
| MD5 | 119ede06afc1b721278e8955fe8338f4 |
| SHA1 | 3917c6cfd13689a83e8410c157f54c0e05550bcf |
| SHA256 | ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0 |
| SHA512 | 72193ded81941ecef91da566d47e22667e98d927a18cbe06be3e4cbea6c1504664a7569fd9531ddbf1b4b019a953e53deb8da34938d1b879b4d74902eff3be78 |
memory/2932-6-0x0000000002060000-0x0000000002068000-memory.dmp
memory/2932-5-0x0000000000800000-0x000000000080E000-memory.dmp
memory/2932-4-0x00000000001D0000-0x00000000001E2000-memory.dmp
memory/2932-3-0x0000000000400000-0x000000000041C000-memory.dmp
memory/2932-2-0x000007FEF6170000-0x000007FEF6B5C000-memory.dmp
memory/2932-1-0x0000000000260000-0x000000000038E000-memory.dmp
memory/2932-0-0x000007FEF6173000-0x000007FEF6174000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-13 02:46
Reported
2024-11-13 02:49
Platform
win10v2004-20241007-en
Max time kernel
93s
Max time network
150s
Command Line
Signatures
DcRat
Dcrat family
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\Registration\\Idle.exe\", \"C:\\Users\\All Users\\Documents\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\Registration\\Idle.exe\", \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files\\7-Zip\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\upfc.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\Registration\\Idle.exe\", \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files\\7-Zip\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\taskhostw.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\Registration\\Idle.exe\", \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files\\7-Zip\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\upfc.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\taskhostw.exe\", \"C:\\Windows\\PrintDialog\\Assets\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\Registration\\Idle.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Windows\\Registration\\Idle.exe\", \"C:\\Users\\All Users\\Documents\\csrss.exe\", \"C:\\Program Files\\7-Zip\\Registry.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\", \"C:\\Recovery\\WindowsRE\\wininit.exe\", \"C:\\Recovery\\WindowsRE\\services.exe\", \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Recovery\\WindowsRE\\taskhostw.exe\", \"C:\\Users\\Public\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\Idle.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\", \"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe | |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\schtasks.exe |
DCRat payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\WindowsRE\\Idle.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\SearchApp.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Recovery\\WindowsRE\\services.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\All Users\\Documents\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0 = "\"C:\\Windows\\PrintDialog\\Assets\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Users\\Default User\\Registry.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Public\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\Registration\\Idle.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\taskhostw.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\Registration\\Idle.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\All Users\\Documents\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files\\7-Zip\\Registry.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Recovery\\WindowsRE\\Idle.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files\\dotnet\\shared\\fontdrvhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Public\\dllhost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0 = "\"C:\\Windows\\PrintDialog\\Assets\\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files\\7-Zip\\Registry.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Recovery\\WindowsRE\\upfc.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\uk-UA\\taskhostw.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Recovery\\WindowsRE\\upfc.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\WindowsRE\\wininit.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\WindowsRE\\wininit.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Recovery\\WindowsRE\\services.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Users\\Default User\\Registry.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\dwm.exe\"" | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
Drops file in Program Files directory
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\PrintDialog\Assets\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| File created | C:\Windows\PrintDialog\Assets\b6768d31d2a420 | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| File created | C:\Windows\Registration\Idle.exe | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| File created | C:\Windows\Registration\6ccacd8608530f | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3840 wrote to memory of 3604 | N/A | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe |
| PID 3840 wrote to memory of 3604 | N/A | C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe | C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe
"C:\Users\Admin\AppData\Local\Temp\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe"
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files\dotnet\shared\fontdrvhost.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\dotnet\shared\fontdrvhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files\dotnet\shared\fontdrvhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SearchApp.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SearchApp.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SearchApp.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\Registry.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\Public\dllhost.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Public\dllhost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\Registration\Idle.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\Registration\Idle.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Windows\Registration\Idle.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Documents\csrss.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Documents\csrss.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Registry.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Registry.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Registry.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\taskhostw.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\taskhostw.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\taskhostw.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0a" /sc MINUTE /mo 7 /tr "'C:\Windows\PrintDialog\Assets\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe'" /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0" /sc ONLOGON /tr "'C:\Windows\PrintDialog\Assets\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe'" /rl HIGHEST /f
C:\Windows\system32\schtasks.exe
schtasks.exe /create /tn "ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0a" /sc MINUTE /mo 5 /tr "'C:\Windows\PrintDialog\Assets\ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0.exe'" /rl HIGHEST /f
C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe
"C:\Program Files (x86)\Mozilla Maintenance Service\dwm.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | a1038934.xsph.ru | udp |
| RU | 141.8.197.42:80 | a1038934.xsph.ru | tcp |
| RU | 141.8.197.42:80 | a1038934.xsph.ru | tcp |
| US | 8.8.8.8:53 | 42.197.8.141.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
Files
memory/3840-0-0x00007FFB66543000-0x00007FFB66545000-memory.dmp
memory/3840-1-0x0000000000C20000-0x0000000000D4E000-memory.dmp
memory/3840-2-0x00007FFB66540000-0x00007FFB67001000-memory.dmp
memory/3840-3-0x0000000002DC0000-0x0000000002DDC000-memory.dmp
memory/3840-4-0x000000001BA00000-0x000000001BA50000-memory.dmp
memory/3840-5-0x0000000002DF0000-0x0000000002E02000-memory.dmp
memory/3840-6-0x000000001C5E0000-0x000000001CB08000-memory.dmp
memory/3840-8-0x000000001B9B0000-0x000000001B9B8000-memory.dmp
memory/3840-7-0x0000000002E00000-0x0000000002E0E000-memory.dmp
C:\Recovery\WindowsRE\wininit.exe
| MD5 | 119ede06afc1b721278e8955fe8338f4 |
| SHA1 | 3917c6cfd13689a83e8410c157f54c0e05550bcf |
| SHA256 | ad4072aa43c0fcac0cc0c5f86147c93fb16707a547d7760407a02be06bf9d8f0 |
| SHA512 | 72193ded81941ecef91da566d47e22667e98d927a18cbe06be3e4cbea6c1504664a7569fd9531ddbf1b4b019a953e53deb8da34938d1b879b4d74902eff3be78 |
memory/3840-53-0x00007FFB66540000-0x00007FFB67001000-memory.dmp
memory/3604-54-0x0000000000A50000-0x0000000000A62000-memory.dmp